r2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000280)={0x2b, 0x6, {0xffffffffffffffff, 0x2, 0x3, 0x0, 0x4}, 0x10000}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x40002, 0x0) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, &(0x7f00000001c0), 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000000, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x101000, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x7fffffff) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000100)={0x2, [0x5, 0x1f]}, 0x8) r6 = socket(0x400000000000010, 0x802, 0x0) write(r6, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100020ba1080080002007f196be0", 0x24) r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x100000000004}, 0x1c) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000180)=0x57e, 0x4) sendmmsg(r7, &(0x7f00000002c0), 0x4000000000000d7, 0x1a0) 15:56:51 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0805b5055e0bcfe84740714ee8d55bc7948f3bfa3284584860b14ca9a2a6884f3908006e39e9160b56c42ffebfeff4d1a28819aa15532aa592a9ef87d788855f09b632fa04ca494cb66d2366112cc908c257c63d43d68c8dd43d323817021574148de2b22279a3f81d824cc873a0071ea6cbd7498b1710e6ffda13eca043") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000080)={0x6, r3, 0x2, 0x4000000}) r4 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0x0, 0x100000379) 15:56:51 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1080008915, &(0x7f0000000240)="08711200b2ed5f2189163d6f11f41ed2e1524a7777c71a1d554452b45bfbecc8a9919eaf12dd0e24e9c4c04f08000000000000007cb3b68c5f89d8bfcfd179260c220c1d8971e12704a333d54bbd4f380e46104dac929dbb2ad41e22262e189471330e847e38c5e6c8d6d9f375337887cd") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000000080)=""/165) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:56:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="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"], 0x4}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@remote, @remote, @rand_addr="224e9ec80e9093f3b87d52c58f60b01c", 0x0, 0x7}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@empty, @mcast2, @ipv4, 0x0, 0x0, 0x0, 0x0, 0x401, 0x400003}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de154bd8b44717c, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x8000000200036158, 0x800007b}, r5, 0x0, 0xffffffffffffffff, 0x818f492baf681a2c) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000200)=0xfffffeff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:56:51 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x5, 0x3}, 0x0, 0x0, &(0x7f0000000180)={0x3, 0xf, 0x1ff, 0x759dbcc0}, &(0x7f0000000200)=0x1f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0xfffffffffffeffff}}, 0x10) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 540.564024] kauditd_printk_skb: 3 callbacks suppressed [ 540.564042] audit: type=1804 audit(1577548611.412:1515): pid=18359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/440/memory.events" dev="sda1" ino=16913 res=1 15:56:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="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"], 0x4}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@remote, @remote, @rand_addr="224e9ec80e9093f3b87d52c58f60b01c", 0x0, 0x7}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@empty, @mcast2, @ipv4, 0x0, 0x0, 0x0, 0x0, 0x401, 0x400003}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de154bd8b44717c, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x8000000200036158, 0x800007b}, r5, 0x0, 0xffffffffffffffff, 0x818f492baf681a2c) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000200)=0xfffffeff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:56:51 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x40a02, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x7fffffff, @rand_addr="dfcf0eea28b894323321650552bf0654", 0x400}, 0x1c) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = syz_open_dev$mouse(&(0x7f00000006c0)='/dev/input/mouse#\x00', 0x1f, 0x101202) bind$alg(r2, &(0x7f0000000700)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f0000000080)={{0xfc, 0xdb}, {0x9, 0x24}, 0x80000001, 0x1, 0x2}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', &(0x7f0000000200), 0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:56:51 executing program 0: r0 = socket$inet6(0xa, 0x800, 0xcd) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) [ 540.598051] audit: type=1800 audit(1577548611.432:1516): pid=18359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16913 res=0 [ 540.678099] audit: type=1804 audit(1577548611.432:1517): pid=18359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/440/memory.events" dev="sda1" ino=16913 res=1 [ 540.725085] audit: type=1804 audit(1577548611.572:1518): pid=18376 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/440/memory.events" dev="sda1" ino=16913 res=1 15:56:51 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)={0x2, 'ip6gretap0\x00', {0x6}, 0x309e}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x1) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:56:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="0b4a1914200cc3ad134d722638676806c8290e7b562b6cf4fa7af6933aa62720930c5bde67868a7ae19a80ff6b106ddb9c0c311a7feda8455842b5365ce6d901001f090000006b3e43df416758c774ccb2812e65015ed0b8842bd64eaedb3091495364373194c8291924cde4eb65b0168d36955facea07381b9a4e74fa4c0f111cc2fbf6cd1ea6877a05f7d76dc889950a0af8a3942cf9e6364c087a3d48f2dfc7e7f89b7aa5060d8e3c2e7630e2a22d7e017e36c2e9fcd5e64ba064ca4f8e00a658f5fefd6b640a426762cd0f8368575b72e7b5a6431e3e326a41614b2f54f06fa19d4a475b9da7f71d8bdc5e22c3e9e6ddfe7b31706ad0e0e97bef4388bbbdb5e2cb77e43eb48248565888a7a67a38fe5344e4d43ddccca47ad855d1174aed891ab7cb13c7773d32cee8d2a16aca453da8165308f03920d7fd3c360ebb9451374df5632af7bcadf36fd435da0c0217370b4c9a6e1d63e0fa0ccaaee41f1f885ea0e9e58e9828a4b8ba15adf788ec35a8b7812ec90544402f24fd4aa56d6b6cc69503e0b9937ba71bd84d4ad99d88d26ebe9d2d1634f5db9ae05d89fcffd8aea9e4d611fde1ce2b86c0e738a8"], 0x4}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@remote, @remote, @rand_addr="224e9ec80e9093f3b87d52c58f60b01c", 0x0, 0x7}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@empty, @mcast2, @ipv4, 0x0, 0x0, 0x0, 0x0, 0x401, 0x400003}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8de154bd8b44717c, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x8000000200036158, 0x800007b}, r5, 0x0, 0xffffffffffffffff, 0x818f492baf681a2c) ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000200)=0xfffffeff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:56:51 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, 'cpuset'}, {0x20, 'vboxnet0'}, {0x20, 'eth1\x0e%{eth0d\x83vboxnet0mime_type.%&user@/)'}, {0x20, '^'}, {}, {}], 0xa, "d9d11061593ab6e18b09785a87667ad94b9ae299149bc6b34f34e610fa71f2ac720611ac56b62b775f6774224a20c467361728e7f7996e2f7a6cc205e94de667e41584d5c0c74c79737dc216a47c9457454d35a3cff6bc3d"}, 0xa0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 541.001709] audit: type=1804 audit(1577548611.842:1519): pid=18359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/440/memory.events" dev="sda1" ino=16913 res=1 [ 541.171474] audit: type=1800 audit(1577548611.882:1520): pid=18359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16913 res=0 [ 541.210924] audit: type=1804 audit(1577548611.882:1521): pid=18371 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/440/memory.events" dev="sda1" ino=16913 res=1 15:56:53 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1, &(0x7f0000000900)="b856f2713a880ab897ecae53ec70506d1bc150e859e2f67396631816bb3aa3166bada91f813c98372219e94947510624b184897069496798591b50297679655cfad785b433e57aa9b1b7043a654447cc5a2175ca90d7d710eb74116da164042149d1239608c352ea0eb25e32b029a5644ef02e4e9792af92fbc1766a6aaf38bf1a65d8d57bff2bb1c3a8a41d78f0dcf60c6701e83f2392a910a05a5b65de54ad24b6af9a3d3e4f64dde7f89875ea3c51178f17ec78dc501e31cbeb1d82572cd2bcc2aaec568f5ec5125a72f22fe8470f52e45946a8794b79a41bb0cce0d1eb5fc608393c854caf76971c8c9397bd01ebe2096464") openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000740)={0x0, 0x1636a4dae53dfeba, 0x3, 0x20, @scatter={0x8, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/210, 0xd2}, {&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000300)=""/228, 0xe4}, {&(0x7f0000000400)=""/127, 0x7f}, {&(0x7f0000000480)=""/128, 0x80}, {&(0x7f0000000100)=""/39, 0x27}, {&(0x7f0000000180)=""/43, 0x2b}, {&(0x7f0000000500)=""/148, 0x94}]}, &(0x7f0000000640)="588c01", &(0x7f0000000680)=""/74, 0x4, 0x10032, 0x2, &(0x7f0000000700)}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r1, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) sendfile(r0, r1, &(0x7f0000000000)=0x3, 0x5) r3 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:56:53 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000040ac7f9000000000000000000000400"], 0x14}, 0x1, 0xf000}, 0xe00000000000000) socketpair$unix(0x1, 0x0, 0x0, 0x0) 15:56:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x38aa0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7a, 0x4, [0x277, 0x0, 0x40000108], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) setsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f0000000140)=0x1, 0x4) r6 = dup3(r3, r4, 0x80000) ioctl$SG_SET_COMMAND_Q(r6, 0x2271, &(0x7f00000000c0)) 15:56:53 executing program 3: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x12, 0x40031, r0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000040), 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000140), 0xfffffe80) sendfile(r4, r3, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r6, 0x2276, &(0x7f0000000100)) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f0000000100)) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:56:53 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x100, 0x800) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)={0x5, 0x8, 0x0, 0x0, 0x1, [{0x4, 0x6, 0x3, [], 0x2100}]}) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000100)) mmap$usbmon(&(0x7f00002c8000/0x3000)=nil, 0x3000, 0x4000001, 0x30, r5, 0x0) r6 = fcntl$dupfd(r3, 0x406, r4) ioctl$VIDIOC_RESERVED(r6, 0x5601, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x40, 0xbadd, 0x7, 0x1}) 15:56:53 executing program 0: socket$inet6(0xa, 0x80003, 0x6b) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r0, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000080)={0x8000, {{0xa, 0x4e22, 0x2, @empty, 0x101}}, {{0xa, 0x4e23, 0x4, @local, 0x9f36}}}, 0x108) r1 = socket$tipc(0x1e, 0x5, 0x0) sched_setscheduler(0xffffffffffffffff, 0x6, &(0x7f0000000000)=0x2) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:56:53 executing program 2: getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000080)=0x4) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getxattr(0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x3f00) unlink(&(0x7f0000000040)='./file0\x00') [ 542.955379] audit: type=1804 audit(1577548613.802:1522): pid=18409 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/441/memory.events" dev="sda1" ino=17009 res=1 15:56:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x7) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e23, 0x4, @mcast1, 0x2}, {0xa, 0x4e23, 0x2, @rand_addr="bd7ffaaaa839104e7c864d0673e620e8", 0x3f}, 0x100, [0x3, 0x9, 0xc4a1, 0xfffffff9, 0x0, 0x4aa2, 0x8, 0x80]}, 0x5c) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r6, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c00000010000d0400"/20, @ANYRES32=r6, @ANYBLOB="03000000000000000c0001000200000000000000440f632470007b000000006ea1ceff6aef3f71af25c5"], 0x2c}}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002ec0)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x9, @empty, 0x2}, 0x0, &(0x7f0000000900)=[{&(0x7f0000000140)="e5cdb33b13bf6231e7cd6ab30a90abc23061807baf7cab91ab18fb40bc97ee788b90f5acdece01fa765f3c206ef08b43783f204dbfa3d5ce0c9ec8d557119f16cd1d32e501f7b9b4101ef83aed3fcc803bfd391e5af974fe2e7907b816e1d7a714ea14250ef0261ced279be5e9d9d95906e27559a360da5398215810c5f838e4afe4d5cee556af6e9cc6be65b2ce2027543b817c3703f1a63a3adb27ebb763d8676a6e49448565c3a9f7b27a8bcfb644f99bc1c8b6eabc07bb897d4ce62f561665be885f63ba2c06641b490d3fde7e5b61a45ba98ad0c87bf4160c139c9c4f7b4902876c18e7b156bdd6af6a"}, {&(0x7f0000000240)="236ade5f7e71dd67fc547c23b4e4eb7296eac21b3824c4db999cda86beeab56b6c836cc0e5a3e73bf3399c069b46c3f4804fd8d95d56bf230283b24d337b8dc1bec641d4287195bbf16e0ccfdc48f7069e4447c7701aa905f15a823d3e"}, {&(0x7f00000004c0)="7feefa180e4ae9a4ce3032faa4fb8db9f414479071a366c84b58ffcb5d5312eca040fc648f1798028845793c0f41b0e8a4a8ae680e89b2233c42b25eb0cc9993ee098291ef8ded6de5709a82e301b9b295b3cfb940422c9ec0604bca3d9d34daafd9ac87543eaed0791024efaeba1054daae30ea34b7200d0ca51978be8de57bd0b07cdca0e3d6b8c67bc625db5c58e63619876023b411864a8ffb0fab007f05f5bb79aae44b0191f0e185a8ac9d79e5ffb6d432bc09c1e18a51d119ad54822d4fa2f911bc35175e1107987670be43c56c1728c40f61b8d6420a762bcaae31e7bcd8b16fbcd13c1cfb8970a30f1257fee669"}, {&(0x7f00000005c0)="431dcbbc56acec0c5f661bfc1d5c718a06e8f9c952d981ed133c94d74ca1352ccdac1b8b9c9ae60434a650e95595c240ed4ff77463543f87f5428b783036a9435e199378e8829aaaffcdf460e3c8fc28b15f812fdb0b88b6c16cb0610c3b6892e746a17d0468d47022ce39ed93edee1439b62acd396804e01e74dbef99edd2964565cabea1ac09d98794695bbd238a8d959174a62dfd2a3eb6c5c92ab5854bc2f79344558d3a2cd7a97c7f3b719b049826a5b8c0856a22fb6363586d5f29c3ef6ab0c53ae89300347b53bedf9a779de8a7c5c89c14cf1e00dcab98920d2b597477621dc32c50a6b64e3d9e261073d14fdf"}, {&(0x7f00000006c0)="58178ac867fead31be601d88a38292d9d239dbea806f7b68c5c82f1bceaa1920387961d0f8d1fd05be3895964ee28296a4d8986ba27ea818440d86d91308a05428a2362cc829279fc12ef319ff10517b27b087ba15b60051ba055f1ad81a0a0184b75fe3a2066b38a7aa3917d2b750dcb21949985eb3eb9e5b2449b37c8b15d1b0ff0cd0fedcc24e34235e917b020183cc04c657f30b151cebfe7dea2e47ed1037debb4b897038120a25311340b8ceb6598cadf6d84ab4d3ad4675d8af6479b4f00f1d2d915b12330a2bdb"}, {&(0x7f00000007c0)="66180c4fa8bf2f3d123119e77e019d3a2ad55ed842ba45cf2e6c1084ac5509b5d26db58c8eabe5577c480eeacb3d4b30289989512b020e3473b8ad719785606575c3c668c38a476cf468aa694569893473745f7ae57864656e323cf78539ddb0356bf15226b5532521a0ffd0f5caadacf3892f1a4856af67eac040091ce891e94babca546ce55eb0e5ff5131eac4551c0cdbeccbbf9912139d690364f6a237a3d661ae70c4be49be02889419353fffcc80a2b533065cd4f38b37409150175f9717b16c9603"}, {&(0x7f00000002c0)="c618e4f7634ce1727765d70c8cbb9a7e8346529441db03c2c0d692d288bb187dd11bda064ee373c1e7aac1e1436f6288acc00f16d95c1f51e27d1dc58040fccb49a521f84015fef0929f801130c6"}, {&(0x7f00000008c0)="ac1eeb7dc46768f8cb8168b1ca4fae2aeb909a1241e77e5b006adfcb4570af8231ce5aadc2d19085b5d3b529d5"}], 0x0, &(0x7f0000000980)=[@dstopts={{0x0, 0x29, 0x37, {0x4, 0x0, [], [@hao={0xc9, 0x0, @rand_addr="26ee9fda54926d58af194e6f5b085faf"}, @generic={0xad}, @calipso={0x7, 0x0, {0x4b56, 0x0, 0x8, 0xffff, [0x3, 0xffffffffffffffff, 0x3, 0x4, 0x4, 0x1, 0x8, 0x9, 0x5]}}, @ra={0x5, 0x2, 0xffff}, @calipso={0x7, 0x0, {0x5, 0x0, 0x2, 0x25, [0x8000, 0x6]}}, @jumbo={0xc2, 0x4, 0x101}]}}}, @rthdrdstopts={{0x0, 0x29, 0x37, {0x33, 0x0, [], [@ra={0x5, 0x2, 0x400}]}}}, @pktinfo={{0x0, 0x29, 0x32, {@loopback, r6}}}, @pktinfo={{0x0, 0x29, 0x32, {@mcast2}}}, @tclass={{0x0, 0x29, 0x43, 0x180}}, @hoplimit={{0x0, 0x29, 0x34, 0x20}}]}}, {{&(0x7f0000000b00)={0xa, 0x4e24, 0x9, @rand_addr="ab7dade99474bdb3afcd61341218ea00", 0x1}, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000b40)="0adcc479"}, {&(0x7f0000000b80)="0573e962663f989724146f627e1b0fdddba99d4cef9f48dcbdbb73f1b6c9513c17b771883d1b87776571d91ea0745a6334c5877537a1436804eba6557c8bb58b3e806fb52fb77c23ed58cb6933291b97590d0ae735862a01b667177193c22d262c451d859bfc18a13b6e4702a102b5de6862a5585d89d14600510afe1612e9d08a36aea25b48a54abb732d1cf4d2c4e2cd0cb81add56cc37328afe0a9ada63c28c7343598d873560a400fc651801e02f0ea538e7affda5d3fa687b19d3a92e5525af3acb90831fb07bcbd8da7d5b302d31a1a4de73d457cb6c7b6d611ec17ba8ee5e36a543380e03ea6136e4702f05dc1bfe39"}, {&(0x7f0000000c80)="e7d8e4afa63f31b4ee35c5aa6ca9d18d049b9b328c15781767395cc900c519e91cf528eafe478f1c0bd2503e133ff67c31f844224cd36ad73b6831f42f383c1b86c8564eb12c78107a7e8e3c6652073dc8fef42070"}], 0x0, &(0x7f0000000d40)=[@rthdr={{0x0, 0x29, 0x39, {0x16, 0x0, 0x2, 0x1f, 0x0, [@ipv4={[], [], @broadcast}, @mcast1]}}}, @hopopts_2292={{0x0, 0x29, 0x36, {0x6c, 0x0, [], [@hao={0xc9, 0x0, @rand_addr="3a9199499137a0d3243fb73beb60eabd"}, @hao={0xc9, 0x0, @loopback}, @enc_lim={0x4, 0x1, 0x2}, @padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x1}, @padn]}}}, @hoplimit_2292={{0x0, 0x29, 0x8, 0x3}}, @dstopts={{0x0, 0x29, 0x37, {0x67, 0x0, [], [@padn={0x1, 0x0, [0x0, 0x0, 0x0, 0x0]}, @generic={0x0, 0x0, "b2bd103763ddc9e8bc16375ab6f5e28bb607f82e60454cc24779eef2378c99b44140b47412bd7e3484e6312d976eebf119264b5bd23cc813f57f8ea8ccbad8d19c9ccf0a518b846347cf72c431a8624f95ff1bdb5ab95d65e505eb09aedcdd2088f8de972508809578ef305170092948c94f58d1a9c234a9ee46fdd0ea108678a80e8f5c5683a645f5cb0c2ba29cbbb64ec6f6afea73b03fe6e6dfddc4acf9cf3695b783c4446310fe9ea6b2afd9c4ffcc09d1"}, @jumbo, @jumbo={0xc2, 0x4, 0x4}, @hao={0xc9, 0x0, @dev={0xfe, 0x80, [], 0x1d}}, @hao={0xc9, 0x0, @ipv4={[], [], @remote}}]}}}, @rthdrdstopts={{0x0, 0x29, 0x37, {0x2c, 0x0, [], [@ra={0x5, 0x2, 0x1000}, @pad1, @enc_lim={0x4, 0x1, 0x80}]}}}]}}, {{&(0x7f0000000f40)={0xa, 0x4e24, 0x5, @loopback, 0x2}, 0x0, &(0x7f0000001400)=[{&(0x7f0000000f80)="8a83ceb9146c90a82f7b00ec2d25262a1e92aa5628ac8a6a1ad581ca260bf0150234bdf6b20e84c6254ffad063fa2a2baa1e464fc05ee0b4934bb28b24a64fbebb95d389e01435ac8d53674fa501abe10138a98523861003279adaa42bef46efbb12cc52b9dec3f495fb80f35b998c748a"}, {&(0x7f0000001000)="ac82b01af173f86acf37d5ba272afce1f329d9c39527334e04f261da8feadb43bf6752e4237bf17a18ff4e345302b16fdbaabfa1affcdb1f1a798d5be51fb6971994d2b4e53cf6b4783398d6a80b4f833dde609bfe95e65d01cc272a260ea7d233727bf306c52d816345d8598c1da14ed2c7acc62be37031fb9baeb7aa16e456f3ebe20554f629d6672ac5525be9e820745a3de3ba3595d62fcb5933c76e9bbbec0b200637f89af718a085eb36848917fc7487b33e876c76"}, {&(0x7f00000010c0)="2aa69b7d4f2d53e1a805dd8be6304eb839cea90f42d556382c106a34bb3957b063d644f1c3f69bebe543465871df751233a423db2b0ed739ce145e"}, {&(0x7f0000001100)="14ab5c2716c9c1344594caedc45cc6401ee106637c75605261c3f1ce6586b5e903bcbcec55c16bcce443000ef0fa6f1718e7e16837b7951c9003eeb42dcc7dfe7c461da718345ad12a40bebd8a57947d805e9247eece93743a1dcb937d61ff350eac8807fa7b58ad85a8b0f4d03e"}, {&(0x7f0000001180)="bb6d27f6f8b859ab1b8983621cb127a93ba366b8bf3e0a891673bcdacee4e13b81949788da914fc22177bcd7bb6e3a782963f80e99c2e5742746b49f1ffac4fd2767157fb8f242b627e7ec293fd4fe21ef8f4d8eda1fcb7e7d1f5104abccbc9b7a22d7c072e269dc5927a663343b2df46d3bd0e7e0a281c4f0fd1ec2bea87a73c83be7a4fd053086431b614433859606a030c64f7a04d8984154a3952925c45e29ae91e50c7cd0b90cba"}, {&(0x7f0000001240)="bfc16a498b24a9cc35be3215563c80f0ab5c38c17852bfdea27f0290d15375409f71c2f9e91a12bdda1c2c942b898fd2f76c446c0130736aed38941fd6ba3d7eb22d0af5e9d01aa77b1624540e3f8be730360bc9d3b303db6f8287493dd8271e439bf3844a58023ab820ab903e0574dd35b075dd8ea618279ae9c92ac56f97fae95d6e9667b44e1ff426227707b4b28c33a2d34e"}, {&(0x7f0000001300)="91d6a0450f25db9bfc20c7ec274e75bd52eb65beaa2dad1aaaa21ad67b7bacefddace77844a802c235a6676b532438bc1665ce4be1ad1ed03a9c66f246c925b90755fdbea8ab33b4"}, {&(0x7f0000001380)="d4a68fa98260ea10508d7b14fb3b4c261cf1d7b450667778604c80db0f0c3eeaff89d0490f3439cfb2621197a5cfc40d79a4183534eca28cf75e26c0703c29030d9c97bc4383d43d6be8d418abe71f1583f59d0df53dcbb155faa9898847400b18a19417fa359f33cd5f0c9a1704bed00e1058"}, {&(0x7f0000001d40)="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"}], 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB="00000000000000002900000014000000c303000000000000000000000000000029000000360000008700000000000000c900fe80000000000000000000000000000f0401a40401c70502040000000000"]}}, {{&(0x7f0000001540)={0xa, 0x4e23, 0x20, @rand_addr="698a69257f25952c09cbf36a99725741"}, 0x0, &(0x7f0000001740)=[{&(0x7f0000001580)="0ad356a3f5de36e7024121dc507382a633286fa9038b81abacf4202963e2735b902c11e1ead1cb8026803e04bc367c70fe54ae6963f13195b2140506190f87828dc15a592e52d29f63284add9daac9b175d4d89e98e2f11622381070190376a6cab3338a56391d9222c9a507e5df46de6ea67330a6bf15e4418a185e38ad57f00898c190d1704b5f7eb6f7e1c4ef71583d365e7c9369b2eeaf135d9153a393e7a593ccbd2fb2b8f31436ccb53dcfdb8bc9680c987f2ab8c90da8c7df"}, {&(0x7f0000001640)="64cfc1f1feb128e81349e99d917616d7531cfcc0cad15b0bca20cf0e3c0b1df5fa2d468716bb5586d63c343960e73c"}, {&(0x7f0000001680)="a6d72ac4b3a6e91ba24e49ddc19d41d560d45585c175ad5232300c04485a64789bf9788cfd4f270a653f909f04d4355a574925fc4dfebb34c8e28c39e4455893df17cc1c0833508fd36587661141e0ae37e7dc55dd288c3e19d1ca58793dfabf808e8186f796ee94f737ac0802ebce66df384db727741232e33bc6272387cd5ebd05606a4fd7aed0bc9d2a9e28a1ae759145840fb3c9bd31609418f456c66889370876620e3974574cc8ece04619abdc16"}], 0x0, &(0x7f0000001780)=[@pktinfo={{0x0, 0x29, 0x32, {@mcast2, r6}}}, @hoplimit_2292={{0x0, 0x29, 0x8, 0x7fffffff}}, @tclass={{0x0, 0x29, 0x43, 0x7f}}, @hopopts={{0x0, 0x29, 0x36, {0x6c, 0x0, [], [@calipso={0x7, 0x0, {0xdd, 0x0, 0x3, 0x0, [0xff, 0x40]}}, @pad1, @ra={0x5, 0x2, 0x5}, @calipso={0x7, 0x0, {0x2, 0x0, 0xd9, 0x3ff, [0x5, 0x3, 0x18f3, 0x7, 0x2, 0x25, 0x4]}}, @padn={0x1, 0x0, [0x0]}, @calipso={0x7, 0x0, {0x39c2, 0x0, 0x1, 0x1f, [0x4, 0x8, 0x200, 0x6, 0x5, 0x1, 0x8]}}, @generic={0xfa}, @jumbo={0xc2, 0x4, 0xffffce8e}]}}}, @hoplimit={{0x0, 0x29, 0x34, 0x1}}, @dstopts={{0x0, 0x29, 0x37, {0x3a, 0x0, [], [@hao={0xc9, 0x0, @empty}, @pad1, @jumbo={0xc2, 0x4, 0x7}, @hao={0xc9, 0x0, @ipv4={[], [], @empty}}, @padn={0x1, 0x0, [0x0]}]}}}]}}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000001900)="35cffe2e0ec05a611b999f0323faa87540497bd23667ae287bd9532ae39037c934ad9c9da2296696a9f88f7fb4b48d8558"}, {&(0x7f0000001940)}, {&(0x7f0000001980)="2c59bd8ee4b177a9cc17c0022a545e22d4fe181a37523adcc1767a8b6e5242981c034c5c91538f6b5edd8f205ed0fce6cf955e84f2efc40db50c9a7a1033adfa227c123c4583d6eacdba69485dc75340a7e552399d17415fdee0e62c454dc4aba6e92b12abab9ff82771e8c40add7011ad6cfe5c19412a7bae65268561a30761e5e12d95bcdd66abec2ef423ead4b9317152309ca325aa118a4b9b8c6108fd304dbad4f06da86e561ba94420385108f11b41fdaee3c78eb081afe5e9fe6f46738cf4c0037640fb8589d7f407e9e9df4683eff211f7113bbbf865865fd19496266ba2fc48d6ea004f869ecd88"}, {&(0x7f0000001a80)="bf"}, {&(0x7f0000001ac0)="98d3b865162e60234293d54e316982785f6fb8026bb5fa6ae07821c46610b4261c4cea12e1f8a3c590bec77ffc4b76ad8dab7cd64a8f8a34aceb036b36efe36cd5949acaf2799752e76c27bcdd2de9413a9ae7932ba428b88849e45c9112e6ad91289815d018ad1a189f9abc0b7a52763143d219a3f5"}, {&(0x7f0000001b40)="10a5bc7007fae2be12459a3128c918c1e02cbd9517f3288ea4938c84277962fb"}, {&(0x7f0000001b80)="ef8d7c93e3af77f868211f55efc1edabc4f8e0863c4484d8d32fa9e82170c00ab7f7"}, {&(0x7f0000001bc0)="91b4a7f72b96ca84ffd3e89d9b5b5f7e0f8d1ae70ce5417ab3543733a6f46a165465d6a4a3708e8f60321e26cf6dec409145e9e16e6a234013241fb2b985afcf60a74534e754a3ef848276e8585eac44aff73cc5d30df953f8675d6ebc12a16f35f8f4dba4881a713385c06e008ecc208bebda4317c8a1f39f7e21e018e415b0b1a5254b8bd90506e253b193b2c8"}, {&(0x7f0000002d40)="25d193262733f08a968d53872678c1ef4f75188352be9e8688d188ead07491439f42e1e7d8af446dfebd910a936cae837eaeda1a70b33372523ed87354577311a2b1f80fb8e97692dd138d2b75781b7e69a14291c1f4732e4f03456ca0b9d8668562c5238b68b2b6142e52a94a1a235386e4b7b415d62d6f356cb1a023a34f3a30accf68145bd56170e4950a99b878c03a09c84d326ba21ebbb51d15d38a27f3ba10c3d2989379631a648f78000990653b57732d0af7844911"}], 0x0, &(0x7f0000001c80)=[@flowinfo={{0x0, 0x29, 0xb, 0xfffffeff}}]}}], 0x1, 0x4005808) [ 543.084886] audit: type=1800 audit(1577548613.832:1523): pid=18409 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17009 res=0 15:56:54 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000080)={0x7, 0x3, 0x7, 0x0, 0x7}) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) [ 543.217030] audit: type=1804 audit(1577548613.832:1524): pid=18409 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/441/memory.events" dev="sda1" ino=17009 res=1 15:56:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = syz_open_dev$audion(&(0x7f0000000540)='/dev/audio#\x00', 0x4, 0x20100) ioctl$TIOCSERGETLSR(r4, 0x5459, &(0x7f0000000740)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat(r6, &(0x7f0000000080)='./file0\x00', 0x0, 0x4) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000440)={0x647e, 0x2, 0x11, &(0x7f00000002c0)="8468328c119ab922a5339d2739163758a2"}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468000000001800020014000100000000002401eda87a926d8e606c6d5498cf42132b0b615e9e1b16b0a4d8b8a61ab7c53e4ab77cc7a14803bb01cad7bade544b72b99b6bad258cd9b8e6b44ef4dfb205", @ANYRES32=0x0, @ANYBLOB="00000000008433df6d6f6b577d4eaaf2000007"], 0x48}}, 0x0) r8 = socket$kcm(0x11, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r8, 0x8918, &(0x7f00000000c0)={'gretap0\x00', {0x2, 0x0, @broadcast}}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r8, 0x6612) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="7400000024000705000000000000000000010000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef67000000000000000000000000a750001a4e624d29a84abf0326570000000000000000000000000000000000000000faff0000000000000000000020000089b53c947244306a0216a3de887763df5b42498b13bb1938de859ee6d7ae7dd2224dc672b69b4358c71b000ea0b6ff01ffff152e5224ee3538f885b7abd9bc4a7ddbab915dc5f0428f661313a650e00cb3d9580ab38f4917b5acbd3af1997e22673c997fd8a9bb26d4b8c95b"], 0x74}}, 0x0) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x1a1002, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r9, 0xc05c5340, &(0x7f0000000780)={0x10000, 0xc4, 0x4, {0x1ff, 0x1de3}, 0x2, 0xdde}) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000001020898dde66057433b6ef3a41d22be225e0001b0000000000000000000000000017256ffc66e43a2484e1a912c5998bcbf0d0000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745ab00001a9f61f20500000000000000b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r13}}, 0x20}}, 0x0) [ 543.404270] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 15:56:54 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000080)) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000d57000/0x3000)=nil) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x8, 0x14000) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl$TIOCNOTTY(r0, 0x5422) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:56:54 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window={0x3, 0x2, 0x200}, @timestamp, @mss={0x2, 0x20}, @mss={0x2, 0x9}], 0x5) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r3, 0x0) r4 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="aa64237ef55c7eec310a51167047", 0xe, 0xfffffffffffffff8) keyctl$read(0xb, r4, &(0x7f0000000400)=""/183, 0xfffffffffffffefd) keyctl$restrict_keyring(0x1d, r3, &(0x7f00000003c0)='blacklist\x00', 0x0) prctl$PR_SET_FPEMU(0xa, 0x3) request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000140)='ppp0.--\x00', r3) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x3d, 0x6f, 0x2, {0x4, [{0xa4, 0x1, 0x5}, {0x20, 0x1, 0x1}, {0x80, 0x1, 0x2}, {0x61, 0x3, 0x6}]}}, 0x3d) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 543.509777] IPv6: ADDRCONF(NETDEV_UP): bond2: link is not ready [ 543.528501] 8021q: adding VLAN 0 to HW filter on device bond2 [ 543.962903] protocol 88fb is buggy, dev hsr_slave_0 [ 543.968153] protocol 88fb is buggy, dev hsr_slave_1 [ 544.104227] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 544.122938] protocol 88fb is buggy, dev hsr_slave_0 [ 544.128065] protocol 88fb is buggy, dev hsr_slave_1 15:56:55 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x420000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x1) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000100)={0xa30000, 0x5, 0x10000, r3, 0x0, &(0x7f00000000c0)={0x990a94, 0x80000000, [], @p_u16=&(0x7f0000000080)=0xfffb}}) [ 544.723679] device bridge_slave_1 left promiscuous mode [ 544.729216] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.793292] device bridge_slave_0 left promiscuous mode [ 544.798911] bridge0: port 1(bridge_slave_0) entered disabled state [ 548.345770] device hsr_slave_1 left promiscuous mode [ 548.388125] device hsr_slave_0 left promiscuous mode [ 548.436128] team0 (unregistering): Port device team_slave_1 removed [ 548.448258] team0 (unregistering): Port device team_slave_0 removed [ 548.458491] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 548.498383] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 548.585892] bond0 (unregistering): Released all slaves [ 548.651113] IPVS: ftp: loaded support on port[0] = 21 [ 548.735005] chnl_net:caif_netlink_parms(): no params data found [ 548.775074] bridge0: port 1(bridge_slave_0) entered blocking state [ 548.781515] bridge0: port 1(bridge_slave_0) entered disabled state [ 548.789082] device bridge_slave_0 entered promiscuous mode [ 548.796454] bridge0: port 2(bridge_slave_1) entered blocking state [ 548.802910] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.810289] device bridge_slave_1 entered promiscuous mode [ 548.831155] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 548.840609] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 548.857768] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 548.865451] team0: Port device team_slave_0 added [ 548.871122] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 548.878745] team0: Port device team_slave_1 added [ 548.884617] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 548.892462] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 549.025926] device hsr_slave_0 entered promiscuous mode [ 549.063241] device hsr_slave_1 entered promiscuous mode [ 549.103822] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 549.111133] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 549.141565] bridge0: port 2(bridge_slave_1) entered blocking state [ 549.147991] bridge0: port 2(bridge_slave_1) entered forwarding state [ 549.154690] bridge0: port 1(bridge_slave_0) entered blocking state [ 549.161046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 549.249908] 8021q: adding VLAN 0 to HW filter on device bond0 [ 549.259584] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 549.271238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 549.281065] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.299161] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.328581] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 549.335077] 8021q: adding VLAN 0 to HW filter on device team0 [ 549.355402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 549.371711] bridge0: port 1(bridge_slave_0) entered blocking state [ 549.378130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 549.393504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 549.401207] bridge0: port 2(bridge_slave_1) entered blocking state [ 549.407638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 549.435019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 549.444238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 549.452085] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 549.461656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 549.479093] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 549.487778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 549.495422] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 549.511628] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 549.520785] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 549.530843] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 549.545318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 549.617040] kauditd_printk_skb: 8 callbacks suppressed [ 549.617054] audit: type=1400 audit(1577548620.432:1533): avc: denied { write } for pid=18469 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 15:57:00 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000040ac7f9000000000000000000000400"], 0x14}, 0x1, 0xf000}, 0xe00000000000000) socketpair$unix(0x1, 0x0, 0x0, 0x0) 15:57:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x4020aea5, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/\x00\x00\xe7\xff\x00', 0x0, 0x0) flistxattr(r4, 0x0, 0x1000000e1) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000300)={0xd3, {{0x2, 0x4e22, @dev}}}, 0x88) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000040)={0x5, [0x0, 0x7, 0x0, 0x0, 0x4]}, 0xe) openat$kvm(0xffffffffffffff9c, 0x0, 0x684400, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x400500, 0x0) setsockopt$inet_buf(r7, 0x0, 0x9, &(0x7f0000000280)="8bdbf3dd1130951dc42c7efe652a8659cd06bad1a66d8e7da2eebdef80ead14c1f9b2fa47eef03f680d21577fa98a504e17f468f2b4666e6da53db5a567fa820cf3f5742f7370dee86a499bb6a1d5f1af56e0f452bf3b064", 0x58) ioctl$KVM_SET_IRQCHIP(r6, 0x4020aea5, &(0x7f0000000a40)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x40}]}}) 15:57:00 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x603, 0x8443) write$nbd(r0, &(0x7f0000000300)={0x67446698, 0x0, 0x1, 0x4, 0x4, "9426aad84c3396a27f42b65ebe2246fc7c77ad9d0ddff60f901dd94ab31977c54e51b6ccb15c5a88f3041d166995de909c626056fa640dffd9e868905e33c6ecacfff545ef5ed0b9280782ec42ad110dec3ad021f1eddfa1db64454d517863da3e4a"}, 0x72) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) dup2(r3, r4) 15:57:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) prctl$PR_MCE_KILL(0x21, 0x1, 0x2) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:00 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0xfffffee7, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000100)) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r5, 0x28, 0x0, &(0x7f00000000c0)=0xfff, 0x8) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) r6 = openat$cgroup_ro(r4, &(0x7f0000000300)='meMos\x00\xee\xc2\xb7\"\xde\xdf\x04\xf9\xa1\xa2-\xd43\x99\xbc%\x00\xd2\x1cNX\xed\xfb(D\x8b#\xdd#e\xdf\xfb\xbf\\\xa1\":\xcbu\x9by\x9a\xae\x12\x93\x99\xf2Z\xe7y=\xa3\xc1\v\xd1\x94Y~5\t\x91;\xb6N@\xe0LZ\xff\x7f\x00\x00\x03\x04\xa3c\xda\x1e\x15\xafr\x9c\x85\xc4Z0\xa2hWw\x94]\vU\xa3\xdc\xcf\x0e\xc5\xba\x9d\vjKO\x9a`\xc2W\xd5[\xa7_#\xaf5n~\xc1\x90\x0f2\f\x0eO\x8c\xf8I\xee\xf9\xfa\xe7C\xbdb\xa2\xab\xbf\f\xcb\xd0\xed4\x1c\xfeTo\xd6\x99\xd2\xb0\xb41\xf3\xdf\xee\x84K\xc6\x9f\xfe\x13\x01p\x19\xcdN\xefy9\x88)\xc3,\xd1E6X%6\xcb>t\xcb.\xe5N', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r8, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r8, 0x40106614, &(0x7f0000000080)) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000140), 0xfffffe80) sendfile(r9, r7, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r9, r7, &(0x7f0000000040), 0x100000001) r10 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r10, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 15:57:00 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) fcntl$addseals(r2, 0x409, 0xd) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000001c0)={0x6, 0xa40, 0x8202, 0x1, 0x3, 0x10001, 0x10000, 0x8, r6}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r6, 0x56, "a0aed5f5c81bcd5352ca6138ccdc57360c39db3a666e27ed25719bc28399a96fd81a101e59964d965d951d4501cec0f90e324263d32cae5bd4a78fb5a6ebe6a4c29eb848b046b2611683d27d0ccb6c749e6fd5d504af"}, &(0x7f0000000340)=0x5e) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000140)={r6, 0x5}, 0x8) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r7, 0x2276, &(0x7f0000000100)) ioctl$sock_inet6_udp_SIOCOUTQ(r7, 0x5411, &(0x7f00000000c0)) 15:57:00 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="e847407100000000000000") r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x7263, 0x2, 0x1, 0x0, 0x20, 0x7}, &(0x7f0000000100)=0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$USBDEVFS_GETDRIVER(r6, 0x41045508, &(0x7f0000000200)={0x6, "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"}) 15:57:00 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r5 = dup3(r0, r4, 0x1c0000) mmap$perf(&(0x7f0000143000/0x4000)=nil, 0x4000, 0x800000, 0x20010, r5, 0x9) 15:57:00 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = socket$inet6(0xa, 0x4, 0x7) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x21}, 0xfffffffd, 0x0, 0xfe, 0x2, 0x4, 0x0, 0x1}, 0x20) r2 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) ftruncate(r4, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000001b80)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1, &(0x7f0000003680)=""/187, 0xbb}}], 0x2, 0x0, &(0x7f0000005480)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 15:57:00 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000040ac7f9000000000000000000000400"], 0x14}, 0x1, 0xf000}, 0xe00000000000000) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 550.023443] audit: type=1804 audit(1577548620.862:1534): pid=18500 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/444/memory.events" dev="sda1" ino=17154 res=1 15:57:01 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc210000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)=@ipv4_getaddr={0x38, 0x16, 0x8, 0x70bd2c, 0x25dfdbfd, {0x2, 0x0, 0x40, 0xff, r1}, [@IFA_BROADCAST={0x8, 0x4, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x200}, @IFA_LOCAL={0x8, 0x2, @broadcast}, @IFA_FLAGS={0x8, 0x8, 0x80}]}, 0x38}}, 0x40000) r2 = socket(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f0000000040), 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000140), 0xfffffe80) sendfile(r5, r4, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r5, r4, &(0x7f0000000040), 0x100000001) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 550.195671] audit: type=1800 audit(1577548620.872:1535): pid=18500 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17154 res=0 15:57:01 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x100000000, &(0x7f0000000080)="0805908613d3b67805a5055e0bcfe85740718676a376b823a1d954544995d06acdbc130855fec2c82b0db5fcab033b912d5ccd5fe274fc905935e305e32071ed4c3ce449283692390aa36c8b26c0508ce9a2205a0e20d880066fc62188cb519f1e7a56a55440d9ff99cb736031d654bd8777e4346ee40320542ce70491b17cb97d600b45372a164c985c6e9454394add527878bb7f3dca5246a79651d06801d5cdce9ccd2960d2fad5d5d6ff16f84bd516e26a4943b9aa") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = semget$private(0x0, 0x1, 0xa3d0945744db8bf1) semctl$GETVAL(r2, 0x0, 0xc, &(0x7f0000000440)=""/140) semctl$SETVAL(r2, 0x2, 0x10, &(0x7f0000000000)=0x4) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 550.351785] audit: type=1804 audit(1577548620.872:1536): pid=18500 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/444/memory.events" dev="sda1" ino=17154 res=1 [ 550.490907] audit: type=1800 audit(1577548620.902:1537): pid=18500 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17154 res=0 [ 550.596638] audit: type=1804 audit(1577548620.912:1538): pid=18505 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/444/memory.events" dev="sda1" ino=17154 res=1 15:57:01 executing program 4: creat(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'-\x12\xe6\xc8\xf1\x8be\xb6', 0x0}, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2010060, &(0x7f00000001c0)={[{@commit={'commit', 0x3d, 0x7}}]}) 15:57:01 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff81, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="1fe0ed", 0x3, 0x33}], 0x12405, &(0x7f0000000140)={[{@ssd='ssd'}], [{@dont_hash='dont_hash'}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x39, 0x38, 0x19, 0x61, 0x35, 0x5, 0x34], 0x2d, [0x37, 0x56, 0x33], 0x2d, [0x34, 0x57, 0x36, 0x3b], 0x2d, [0x61, 0x39, 0x53, 0x62], 0x2d, [0x61, 0x63, 0x33, 0x35, 0x6a30f0682dc3450b, 0x64, 0x35, 0x36]}}}, {@smackfshat={'smackfshat', 0x3d, 'cpuset\'em1mime_type'}}, {@euid_gt={'euid>'}}]}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x40) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:01 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r3, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x2, 0x3, 0x4, 0x40000000, 0x0, {}, {0x0, 0x8, 0x4, 0xa, 0x3, 0x0, "302f99fa"}, 0x3, 0x2, @userptr, 0x40, 0x0, r3}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000080)=0x101, 0x4) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000000)={0x9a, 0x4, 0x6, 0x7, 0xffff, 0x80, 0x8}) 15:57:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r6, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r11}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r11, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r10, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r12, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r12, &(0x7f00000001c0), 0x0}, 0x20) 15:57:01 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000140)) readv(r0, &(0x7f0000000040)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) read$dsp(r0, &(0x7f0000000000)=""/148, 0x94) delete_module(&(0x7f00000000c0)='/dev/audio\x00', 0x200) 15:57:01 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) getpeername(r2, &(0x7f0000000200)=@nfc, &(0x7f0000000100)=0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r4, r3, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(r5, 0xab08) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 550.671010] audit: type=1804 audit(1577548621.192:1539): pid=18520 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/445/memory.events" dev="sda1" ino=17329 res=1 [ 550.815393] audit: type=1800 audit(1577548621.192:1540): pid=18520 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17329 res=0 15:57:01 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000080)={0x5, 0x1, [{0x401, 0x0, 0x1}, {0x5, 0x0, 0xfffffffffffffffc}, {0x40, 0x0, 0x53ab}, {0xffffffff, 0x0, 0x3f0000000000}, {0x3f, 0x0, 0x800}]}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:01 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x1, 0xe1, 0x1, 0x1, 0xf4, 0x2, 0x66, 0x9, 0xff, 0x4, 0x4, 0x4, 0x3f, 0xe4}, 0xe) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = getpid() r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) fcntl$getownex(r4, 0x10, &(0x7f0000000000)={0x0, 0x0}) rt_tgsigqueueinfo(r3, r5, 0xb, &(0x7f0000000100)={0x0, 0xfffffffd, 0xffffff46}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r6, 0x2276, &(0x7f0000000100)) ioctl$KVM_GET_VCPU_MMAP_SIZE(r6, 0xae04) r7 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x88002) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r7, 0x40a85323, &(0x7f0000000040)) sched_getscheduler(r3) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) [ 550.912396] audit: type=1804 audit(1577548621.192:1541): pid=18520 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/445/memory.events" dev="sda1" ino=17329 res=1 [ 550.949247] audit: type=1804 audit(1577548621.282:1542): pid=18520 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/445/memory.events" dev="sda1" ino=17329 res=1 15:57:01 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0xfffffffffffffe98) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000001c0)={0x6, 0xa40, 0x8202, 0x1, 0x3, 0x10001, 0x10000, 0x8, r6}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r6, 0x56, "a0aed5f5c81bcd5352ca6138ccdc57360c39db3a666e27ed25719bc28399a96fd81a101e59964d965d951d4501cec0f90e324263d32cae5bd4a78fb5a6ebe6a4c29eb848b046b2611683d27d0ccb6c749e6fd5d504af"}, &(0x7f0000000340)=0x5e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={r6, 0x87, "a3e412ec605e056857e36008b9238cf858e3bb147ea13e4bd99420639ae8a47847c92fe06069069a2c25eaeab5273d393225b08a51ed1d97a576759b8511bf9733d0b52cba7f1367600ed0d2bf8828d7c0fbdd4694d2286cdcba27b964d397c6df9227b02a7d87f194a3350265407187c490307c0a5948a67bc456d8520a00b304c639200b1493"}, &(0x7f0000000080)=0x8f) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0x6, 0x8, 0xffff7ffd, 0x3, r7}, 0xfffffffffffffed2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) [ 551.003413] protocol 88fb is buggy, dev hsr_slave_0 [ 551.008646] protocol 88fb is buggy, dev hsr_slave_1 15:57:02 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 551.082914] protocol 88fb is buggy, dev hsr_slave_0 [ 551.082923] protocol 88fb is buggy, dev hsr_slave_0 [ 551.082967] protocol 88fb is buggy, dev hsr_slave_1 [ 551.088054] protocol 88fb is buggy, dev hsr_slave_1 [ 551.103231] protocol 88fb is buggy, dev hsr_slave_0 [ 551.108309] protocol 88fb is buggy, dev hsr_slave_1 15:57:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r6, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r11}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r11, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r10, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r12, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r12, &(0x7f00000001c0), 0x0}, 0x20) 15:57:02 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) clone(0x14000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) ptrace$getregset(0x4205, r3, 0x2, &(0x7f0000001140)={0xffffffffffffffff, 0x68}) close(0xffffffffffffffff) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x800000, 0x0) mmap(&(0x7f000009b000/0x4000)=nil, 0x4000, 0x3, 0x1010, r4, 0x9766d000) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r2, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) pipe(&(0x7f00000000c0)) fallocate(r2, 0x0, 0x101, 0x2) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:02 executing program 0: ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000100)={r0, 0x21}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r1, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)={0x4}) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$NS_GET_PARENT(r4, 0xb702, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:02 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000000)={0x1, 0x80000001, 0x1, 0x5}, 0x10) 15:57:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r6, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r11}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r11, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r10, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r12, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r12, &(0x7f00000001c0), 0x0}, 0x20) 15:57:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r6, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r11}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r11, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r10, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r12, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r12, &(0x7f00000001c0), 0x0}, 0x20) 15:57:02 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r1, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000000)) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r6, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r11}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r11, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r10, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r12, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r12, &(0x7f00000001c0), 0x0}, 0x20) [ 551.962914] protocol 88fb is buggy, dev hsr_slave_0 [ 551.968064] protocol 88fb is buggy, dev hsr_slave_1 15:57:02 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000100)=0x1) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) mlock2(&(0x7f000009c000/0x2000)=nil, 0x2000, 0x1) r1 = socket(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000040), 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000140), 0xfffffe80) sendfile(r4, r3, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r6, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r11}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r11, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r10, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r12, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r12, &(0x7f00000001c0), 0x0}, 0x20) 15:57:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) pipe(&(0x7f0000000000)) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:03 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x80003, 0x6b) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r1, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r2, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl(r0, 0x13e5, &(0x7f00000000c0)="0805b4055e0bcfe8474071e929bcfc793e02310faae974d31aa44e51eaa564a036468e53c0e0edb4d27b2c482787f230ae7861787e89c203094d573624cb") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:03 executing program 2: getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) move_pages(0x0, 0x2, &(0x7f0000000300)=[&(0x7f0000005000/0x2000)=nil], &(0x7f0000000380)=[0x1], 0x0, 0x0) ioctl$MON_IOCX_GET(r1, 0x40189206, &(0x7f00000001c0)={&(0x7f0000000040), &(0x7f0000000100)=""/130, 0x82}) socket(0x3, 0x40804, 0x4) 15:57:03 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) write$P9_RFSYNC(r0, &(0x7f0000000000)={0x7, 0x33, 0x1}, 0x7) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) syslog(0x2, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101000, 0x0) mq_timedreceive(r2, &(0x7f00000010c0)=""/4096, 0x1000, 0x6, &(0x7f0000000080)={0x0, 0x1c9c380}) 15:57:04 executing program 5: lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "f664008cab7462374f336bf8dada57ff"}, 0x11, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={{0x3, 0x0, @descriptor="f11ab237f71e46a3"}}) 15:57:04 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x1010, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r4, 0x84, 0x74, &(0x7f0000000200)=""/255, &(0x7f0000000080)=0xff) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r6, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r11}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r11, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r10, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r12, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r12, &(0x7f00000001c0), 0x0}, 0x20) 15:57:04 executing program 3: time(&(0x7f0000000080)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 554.606251] IPVS: ftp: loaded support on port[0] = 21 [ 554.911851] chnl_net:caif_netlink_parms(): no params data found [ 555.159922] bridge0: port 1(bridge_slave_0) entered blocking state [ 555.167161] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.174371] device bridge_slave_0 entered promiscuous mode [ 555.181279] bridge0: port 2(bridge_slave_1) entered blocking state [ 555.187770] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.194779] device bridge_slave_1 entered promiscuous mode [ 555.431970] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 555.442173] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 555.460294] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 555.467917] team0: Port device team_slave_0 added [ 555.585483] bridge0: port 3(gretap0) entered disabled state [ 555.700285] bridge0: port 3(gretap0) entered disabled state [ 555.709295] device gretap0 left promiscuous mode [ 555.714260] bridge0: port 3(gretap0) entered disabled state [ 555.748507] device gretap0 left promiscuous mode [ 555.753443] bridge0: port 3(gretap0) entered disabled state [ 555.814903] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 555.822174] team0: Port device team_slave_1 added [ 555.829099] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 555.836881] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 555.894712] device hsr_slave_0 entered promiscuous mode [ 555.933157] device hsr_slave_1 entered promiscuous mode [ 556.189150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 556.196430] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 556.212734] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 556.477057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 556.486299] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 556.496106] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 556.502559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 556.510148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 556.518906] device bridge_slave_1 left promiscuous mode [ 556.525093] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.553589] device bridge_slave_0 left promiscuous mode [ 556.559153] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.614890] device bridge_slave_1 left promiscuous mode [ 556.620366] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.674248] device bridge_slave_0 left promiscuous mode [ 556.679742] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.734054] device bridge_slave_1 left promiscuous mode [ 556.739505] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.793603] device bridge_slave_0 left promiscuous mode [ 556.799069] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.224596] device hsr_slave_1 left promiscuous mode [ 563.265982] device hsr_slave_0 left promiscuous mode [ 563.306175] team0 (unregistering): Port device team_slave_1 removed [ 563.318000] team0 (unregistering): Port device team_slave_0 removed [ 563.327922] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 563.369303] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 563.455884] bond0 (unregistering): Released all slaves [ 563.535961] device hsr_slave_1 left promiscuous mode [ 563.586054] device hsr_slave_0 left promiscuous mode [ 563.626137] team0 (unregistering): Port device team_slave_1 removed [ 563.637794] team0 (unregistering): Port device team_slave_0 removed [ 563.648610] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 563.706344] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 563.794129] bond0 (unregistering): Released all slaves [ 563.856496] bond1 (unregistering): Released all slaves [ 563.914744] device hsr_slave_1 left promiscuous mode [ 563.967802] device hsr_slave_0 left promiscuous mode [ 564.009516] team0 (unregistering): Port device team_slave_1 removed [ 564.020017] team0 (unregistering): Port device team_slave_0 removed [ 564.030257] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 564.076819] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 564.162280] bond0 (unregistering): Released all slaves [ 564.218610] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 564.224877] 8021q: adding VLAN 0 to HW filter on device team0 [ 564.235987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 564.243155] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 564.250956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 564.259373] bridge0: port 1(bridge_slave_0) entered blocking state [ 564.265783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 564.276788] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 564.285117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 564.292197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 564.301047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 564.308753] bridge0: port 2(bridge_slave_1) entered blocking state [ 564.315121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 564.325105] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 564.334768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 564.348412] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 564.355554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 564.368321] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 564.375793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 564.384289] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 564.391972] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 564.401595] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 564.414458] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 564.421283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 564.429139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 564.437142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 564.445133] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 564.456273] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 564.466375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 564.474473] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 564.484438] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 564.490487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 564.504851] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 564.512133] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 564.518602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 564.526516] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 564.538202] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 564.713013] net_ratelimit: 4 callbacks suppressed [ 564.713026] protocol 88fb is buggy, dev hsr_slave_0 [ 564.723012] protocol 88fb is buggy, dev hsr_slave_1 [ 564.762935] protocol 88fb is buggy, dev hsr_slave_0 [ 564.768099] protocol 88fb is buggy, dev hsr_slave_1 [ 564.832989] protocol 88fb is buggy, dev hsr_slave_0 [ 564.838094] protocol 88fb is buggy, dev hsr_slave_1 15:57:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000280)=""/145, 0x91}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e0051e) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f00000006c0)=[{&(0x7f0000000400)=""/179, 0xb3}, {0x0}, {0x0}, {0x0}], 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfffffecb, 0x0, 0x0, 0x800e00515) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) recvmsg(r6, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000380)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) shutdown(r4, 0x0) dup2(r1, r2) shutdown(r2, 0x0) 15:57:15 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$getregs(0xe, 0xffffffffffffffff, 0x3, &(0x7f0000000040)=""/22) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000100)='\xae\xd0_\xf13F\x92\xb1\x1d\\\x9f4\x00\x00\x00\x00\x00', 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r4, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) mmap(&(0x7f0000238000/0x2000)=nil, 0x2000, 0x0, 0x80010, r4, 0x2871d000) sendfile(r0, r1, 0x0, 0x320f) 15:57:15 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{}, [@bcast, @rose, @netrom, @netrom, @null, @null, @netrom]}, &(0x7f0000000000)=0x48, 0x800) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:15 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80c20, 0x0) ioctl$TUNSETOWNER(r1, 0x400454cc, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r2, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) r3 = accept4(r2, &(0x7f0000000080)=@nfc, &(0x7f0000000100)=0x80, 0x100000) ioctl$SIOCRSGCAUSE(r3, 0x89e0, &(0x7f0000000140)) r4 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:15 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x0, 0x1}}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x100) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.Wvents\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000140), 0xfffffe80) sendfile(r4, r3, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r6, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r11}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r11, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r10, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r12, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r12, &(0x7f00000001c0), 0x0}, 0x20) 15:57:15 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x4000000000014, &(0x7f0000000100)) syz_open_procfs(r2, &(0x7f0000000000)='net/psched\x00') getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:15 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@empty, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:15 executing program 1: 15:57:16 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000080)={@empty}, &(0x7f0000000100)=0x14) [ 565.205270] kauditd_printk_skb: 19 callbacks suppressed [ 565.205287] audit: type=1804 audit(1577548636.052:1562): pid=18676 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/451/memory.events" dev="sda1" ino=16563 res=1 15:57:16 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000100)=0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x3, 0x7f, 0xf9, 0x3, 0x0, 0xf7b, 0x85104, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xba17, 0x6, @perf_bp={&(0x7f0000000000), 0xb}, 0x8, 0x800, 0x9, 0x0, 0xffffffffffff7fff, 0x10000, 0x3}, r3, 0xe, r4, 0x8) 15:57:16 executing program 1: [ 565.346324] audit: type=1800 audit(1577548636.052:1563): pid=18676 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16563 res=0 15:57:16 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x1}, 0xfffffe90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) ioctl$SNDRV_PCM_IOCTL_DRAIN(0xffffffffffffffff, 0x4144, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 565.440110] audit: type=1804 audit(1577548636.052:1564): pid=18676 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/451/memory.events" dev="sda1" ino=16563 res=1 [ 565.533225] audit: type=1804 audit(1577548636.152:1565): pid=18679 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/451/memory.events" dev="sda1" ino=16563 res=1 [ 567.167764] IPVS: ftp: loaded support on port[0] = 21 [ 567.228694] chnl_net:caif_netlink_parms(): no params data found [ 567.256127] bridge0: port 1(bridge_slave_0) entered blocking state [ 567.262607] bridge0: port 1(bridge_slave_0) entered disabled state [ 567.269896] device bridge_slave_0 entered promiscuous mode [ 567.277168] bridge0: port 2(bridge_slave_1) entered blocking state [ 567.283649] bridge0: port 2(bridge_slave_1) entered disabled state [ 567.290679] device bridge_slave_1 entered promiscuous mode [ 567.306848] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 567.316212] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 567.333858] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 567.341081] team0: Port device team_slave_0 added [ 567.346830] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 567.354391] team0: Port device team_slave_1 added [ 567.359802] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 567.582928] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 567.625945] device hsr_slave_0 entered promiscuous mode [ 567.684224] device hsr_slave_1 entered promiscuous mode [ 567.743791] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 567.947336] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 567.960471] IPVS: ftp: loaded support on port[0] = 21 [ 567.972637] IPVS: ftp: loaded support on port[0] = 21 [ 568.107589] bridge0: port 2(bridge_slave_1) entered blocking state [ 568.114116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 568.120766] bridge0: port 1(bridge_slave_0) entered blocking state [ 568.127161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 568.296239] bridge0: port 1(bridge_slave_0) entered disabled state [ 568.305137] bridge0: port 2(bridge_slave_1) entered disabled state [ 568.613825] chnl_net:caif_netlink_parms(): no params data found [ 568.622082] chnl_net:caif_netlink_parms(): no params data found [ 568.810489] 8021q: adding VLAN 0 to HW filter on device bond0 [ 568.851325] bridge0: port 1(bridge_slave_0) entered blocking state [ 568.858438] bridge0: port 1(bridge_slave_0) entered disabled state [ 568.865989] device bridge_slave_0 entered promiscuous mode [ 568.873744] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 568.879885] bridge0: port 2(bridge_slave_1) entered blocking state [ 568.886484] bridge0: port 2(bridge_slave_1) entered disabled state [ 568.894087] device bridge_slave_1 entered promiscuous mode [ 568.900956] bridge0: port 1(bridge_slave_0) entered blocking state [ 568.907578] bridge0: port 1(bridge_slave_0) entered disabled state [ 568.914747] device bridge_slave_0 entered promiscuous mode [ 568.926439] bridge0: port 2(bridge_slave_1) entered blocking state [ 568.932782] bridge0: port 2(bridge_slave_1) entered disabled state [ 568.940158] device bridge_slave_1 entered promiscuous mode [ 569.079897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 569.090808] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 569.099600] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 569.107870] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 569.122374] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 569.131376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 569.138600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 569.288692] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 569.295624] 8021q: adding VLAN 0 to HW filter on device team0 [ 569.302121] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 569.310261] team0: Port device team_slave_0 added [ 569.316759] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 569.324894] team0: Port device team_slave_0 added [ 569.331802] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 569.341757] team0: Port device team_slave_1 added [ 569.347371] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 569.358074] team0: Port device team_slave_1 added [ 569.364509] device bridge_slave_1 left promiscuous mode [ 569.369992] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.424698] device bridge_slave_0 left promiscuous mode [ 569.430160] bridge0: port 1(bridge_slave_0) entered disabled state [ 569.464591] device bridge_slave_1 left promiscuous mode [ 569.470066] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.524056] device bridge_slave_0 left promiscuous mode [ 569.529513] bridge0: port 1(bridge_slave_0) entered disabled state [ 569.583976] device bridge_slave_1 left promiscuous mode [ 569.589428] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.633685] device bridge_slave_0 left promiscuous mode [ 569.639196] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.856136] device hsr_slave_1 left promiscuous mode [ 572.895884] device hsr_slave_0 left promiscuous mode [ 572.956045] team0 (unregistering): Port device team_slave_1 removed [ 572.967846] team0 (unregistering): Port device team_slave_0 removed [ 572.977698] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 573.006885] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 573.091380] bond0 (unregistering): Released all slaves [ 573.156219] bond2 (unregistering): Released all slaves [ 573.171040] bond1 (unregistering): Released all slaves [ 573.245713] device hsr_slave_1 left promiscuous mode [ 573.287862] device hsr_slave_0 left promiscuous mode [ 573.348786] team0 (unregistering): Port device team_slave_1 removed [ 573.359723] team0 (unregistering): Port device team_slave_0 removed [ 573.371031] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 573.408974] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 573.491878] bond0 (unregistering): Released all slaves [ 573.585943] device hsr_slave_1 left promiscuous mode [ 573.635957] device hsr_slave_0 left promiscuous mode [ 573.676001] team0 (unregistering): Port device team_slave_1 removed [ 573.687679] team0 (unregistering): Port device team_slave_0 removed [ 573.697148] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 573.746216] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 573.842293] bond0 (unregistering): Released all slaves [ 573.907613] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 573.915866] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 573.925012] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 573.932272] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 573.940433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 573.948817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 573.956945] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.963368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 573.970668] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 573.996436] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 574.006770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 574.014722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 574.022243] bridge0: port 2(bridge_slave_1) entered blocking state [ 574.028614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 574.074819] device hsr_slave_0 entered promiscuous mode [ 574.113239] device hsr_slave_1 entered promiscuous mode [ 574.193562] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 574.200663] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 574.255908] device hsr_slave_0 entered promiscuous mode [ 574.293320] device hsr_slave_1 entered promiscuous mode [ 574.353869] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 574.362404] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 574.378399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 574.387059] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 574.402787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 574.411656] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 574.418551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 574.436849] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 574.446337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 574.455308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 574.468504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 574.479534] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 574.486753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 574.494977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 574.511280] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 574.519832] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 574.531696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 574.539764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 574.549532] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 574.559634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 574.567453] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 574.584874] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 574.590906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 574.609984] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 574.620844] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 574.628294] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 574.635881] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 574.659695] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 574.795155] 8021q: adding VLAN 0 to HW filter on device bond0 [ 574.808717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 574.826243] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 574.860137] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 574.869068] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 574.883477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 574.891007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 574.908237] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 574.922242] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 574.931806] 8021q: adding VLAN 0 to HW filter on device team0 [ 574.953305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 574.960333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 574.977525] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 574.989566] 8021q: adding VLAN 0 to HW filter on device team0 [ 575.005614] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 575.013521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 575.021396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 575.066161] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.072540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 575.091571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 575.101598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 575.112447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 575.120301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 575.134611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 575.142387] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.148811] bridge0: port 1(bridge_slave_0) entered forwarding state [ 575.165187] audit: type=1400 audit(1577548646.012:1566): avc: denied { map } for pid=18703 comm="syz-executor.2" path="socket:[74380]" dev="sockfs" ino=74380 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=socket permissive=1 [ 575.165387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 575.211406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 575.220883] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.227319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 575.243585] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 575.256771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 575.266563] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 575.274436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 575.282043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 575.297242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 575.308645] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.315054] bridge0: port 2(bridge_slave_1) entered forwarding state [ 575.329993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 575.338125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 15:57:26 executing program 2: 15:57:26 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) connect$llc(r1, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x593343ef0dd2fbd9, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="25ee7ff6000300", @ANYRESHEX=r1, @ANYBLOB=',cache=mmap,cache=fscache,access=any,smackfshat=lovboxnet0%*ppp1em0!+,\x00']) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$SG_IO(r6, 0x2285, &(0x7f00000004c0)={0x53, 0xfffffffffffffffc, 0xcf, 0x3f, @buffer={0x0, 0x65, &(0x7f0000000280)=""/101}, &(0x7f0000000300)="be28c788729b43eb2166243eb14976afcbbd3d4f67c8548a88c758bd13ef98eb8edb608e9bafec148106b908625f293abb36e6fba1c93b907ceae3367827bc643e8de048a7987f8272f5ec5bb6eb3db734d2482f451a4c5a4633b50e407e06067739dbd362f45a0b3c6decd967d8976e38dd8e66e9db45401d266e2cd162bf1a684571787814918e228e28420687fa96e3628375e401c605e56ddb23888b22e16a9b483b99b90979a5a154eb94e42c6e2db8133312168deeb6c5a43c4c42007065bea09f530b3c44e605ad52399a73", &(0x7f0000000400)=""/103, 0x0, 0x10, 0x1, &(0x7f0000000480)}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r6, 0x4020565a, &(0x7f0000000540)={0x5, 0x8, 0x2}) ioctl$PPPIOCSMRU(r5, 0x40047452, &(0x7f0000000240)=0x1) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, 0x0, 0xdfd859448be46e64) 15:57:26 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x4000000000014, &(0x7f0000000100)) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180), 0x10) bind$tipc(r0, &(0x7f0000000040), 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_user\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000140), 0xfffffe80) sendfile(r5, r4, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r5, r4, &(0x7f0000000040), 0x100000001) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) connect$pppoe(r1, &(0x7f0000000200)={0x18, 0x0, {0x3, @dev={[], 0x10}, 'bridge0\x00'}}, 0x1e) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) r4 = getuid() setreuid(0xffffffffffffffff, r4) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000080)=""/77) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000100)) perf_event_open(&(0x7f0000000140)={0xa, 0x70, 0x3, 0x1, 0x1, 0x0, 0x0, 0x8, 0x10700, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xad, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x1, 0xea, 0x36e, 0x1, 0x800, 0x9, 0x2}, 0x0, 0x4, r5, 0x2) r6 = socket$tipc(0x1e, 0x5, 0x0) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r7, 0x2276, &(0x7f0000000100)) ioctl$PPPIOCSCOMPRESS(r7, 0x4010744d) getsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) [ 575.365853] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 575.375683] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 575.389096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 575.402750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 575.438589] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 575.462981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 575.473568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 575.481554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 575.514294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 575.528712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 575.555330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 575.565994] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 575.602026] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 575.621640] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 575.660746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 575.678747] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 575.687769] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 575.706346] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 575.719731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 575.738262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 575.749288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 575.760805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 575.771616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 575.782791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 575.798858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 575.810725] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 575.822080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 575.832643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 575.846718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 575.856667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 575.871250] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 575.889049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 575.907706] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 575.916501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 575.947618] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 575.962465] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 575.970429] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 575.981181] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 575.988855] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 575.999282] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 576.010365] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 576.019711] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 576.035369] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 576.044456] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 576.222945] protocol 88fb is buggy, dev hsr_slave_0 [ 576.228046] protocol 88fb is buggy, dev hsr_slave_1 [ 576.252961] protocol 88fb is buggy, dev hsr_slave_0 [ 576.258106] protocol 88fb is buggy, dev hsr_slave_1 [ 576.342963] protocol 88fb is buggy, dev hsr_slave_0 [ 576.348080] protocol 88fb is buggy, dev hsr_slave_1 [ 576.372993] protocol 88fb is buggy, dev hsr_slave_0 [ 576.378127] protocol 88fb is buggy, dev hsr_slave_1 15:57:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r6, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r11}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r11, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r10, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r12, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) 15:57:27 executing program 1: 15:57:27 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x80003, 0x6b) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@bcast) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) socket$inet(0x2, 0x6, 0x8) 15:57:27 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r5, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r5, r2, &(0x7f0000000040), 0x100000001) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r7, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r7, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r8, &(0x7f0000000200)=ANY=[@ANYBLOB="230000006f02004a0002030000000c0000e1ffffffff080000000000000090e70aaf61"], 0x23) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000080)=0x0) fcntl$lock(r7, 0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, r9}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:27 executing program 2: 15:57:27 executing program 0: ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000080)={0xfffffffe, 0x7, 0x4, 0x400000, 0x2, {}, {0x0, 0xc, 0x4, 0x1f, 0x8b, 0x9, "da45b987"}, 0x5, 0x2, @offset=0x5, 0x16, 0x0, 0xffffffffffffffff}) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0xdbc4, &(0x7f0000000100)=0x4) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0xc0400) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r1, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) ioctl$SNDCTL_DSP_GETODELAY(r2, 0x80045017, &(0x7f0000000a40)) sendmsg$alg(r1, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000009c0)="85b1848b60df1d6688d3a84928ceedfd942c06e6ad3b047b868e04bc77f96ef81ab1285c949cccb71e7ac6f331645f1d96e500aa67903f939d069399fee2e69e74f0e01b2d1b", 0x46}, {&(0x7f0000000200)="a2db62147ac52288c21b05c550f8eb14d05df083fff81736972047ad8448ea2e802da70447678a599ca2051761a9f682eefc67e89b45d614ad72ece2e8fa436a4e57ec97e61adcca84bc4b0f6588ff5f1a69acf277621ce40f1ce7b329f26bbebb7bb837e9a25f52809a1c19609043bbd05c7f4a245f4646345a0f864f7cd5eaa253289f246e74d29a953ab716679db4cb", 0x91}, {&(0x7f00000002c0)="ede2272ab932c8aa769216afbd2ac7585ef43df57c5fd3e34d49e7d8c7d73d3e1c7abaae4b8f72767f266b111e9128aa8bf199c1f0de64a6dee26c53b9971f353236579a67fcdc2770b3c19f8c93b65b8f5df4a8060f16881b9ab299a3405dfa2e73e6cbaca542bad1170bac7910f3781abc215d1aa752bb039c0d8ca2f8aee63cf02bfe777eaa227c5cfa69fdb312be19771a", 0x93}, {&(0x7f0000000380)="9285414f242a855c269efc9a411e0ffb4a374020c2b67603dab15be68644a0f3951460f50a44b1263e1cca53ad6bbf8b968594898a61f58c8e47cd6cba161aade3341a1a9364344b2e35c8ddaf599eb4d66482cd8d329963cb79df42ed1c3dc3a4d23be5f47ea3b04e9edcaa49a84fbc77088b855cbe4a9db4e223def957b26fb42f196d41fb263add105e797bddd52f74e53e4a489121bd345458ab5bcc39c2bf08b1a27ed741760772d143bffeaea0736981b89baa2ffab1c96b83119c53efb661b067fb191919444346bcf783994ebbfa1380a742b266fa86d6818347", 0xde}, {&(0x7f0000000180)="476feb8c04802c6564039c52363d4f3c6822152af0e08f0b", 0x18}, {&(0x7f0000000480)="433a71f7c31da311413d75abd6ce24cc2b8c2cbe9f24b82662086e1018e75e7800509b5d900e09d8211872b7ffe6b9e0980bcf01d2b3a54e87ac1f133ab9e2eddb6f87c450e77e7f9e5abee60f8d40e5a25237615b687d04481391dc50759c53364bfba4cc380d784f7c2f014b66beb5569b8f29a68dcd7f4f42d6904734b9b875cd649accdc918ae47727f68f2b443fc208739923dd21852bfc76df71c7b3beccfc78f149d575810518eea00859b39ef28f2748480e85868c202b69162be04616", 0xc1}, {&(0x7f0000000580)="588ad11e6c671e988d9eab92adcacf1c992df4c616b943e172a23883b273e36c310944fb596f1aefa417019130cfd77776976ddafdab95a9d6f0559c5e4314a1f51b158e69e488ffc43e00f45caa374e1f33d165b0cdd12c07662c1874329c4247babe6ac00548cb0b475b4543adf6dd17612615849a28663019a3db3e98b321bcd64fb3da2aa530f976aae89c0ed1a429055ad86130cae79db7a22ece70b87b4c0fdd710534f88e220bc8f1c67f0ab2a74d45faf78e243e0782d7c3006815ac128866243459fa2060661bebda03b53e5d97fe55dcb557ce3df7b5e96048a5", 0xdf}, {&(0x7f00000020c0)="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", 0x100f}, {&(0x7f0000000680)="e6956b61efe6ed7c9cbf4d784cec077772ab13b690a5176af73eb8182cd56a243eb97105fdd1aa6c7a23210aaa5dedcf7e7900ecdb004de878264e48e0ae2e43c1ca0c5a7c986693fc676a1df984f7f446afda169df7e05fb874fe9a17726a59f53b7d2ef35909576c4603a72ffafd0f7fde35a8e3833f5f814b1b4c6de59063ea3c93d2b267f59f5553160bebf3d20e75985d48ac1ea68af5974b1abcaa49402e04", 0xa2}, {&(0x7f0000000740)="47ccd6a02f4d94e5cfa22cf19f2e0c00c0364bd852a34c449c1ce1bb15db8a3d68b0b40c796057d3d5bbb1ef8945a1db9a8a65e6f320f92fff2cf22555f5366537da4c8a34c07ae261e7c481c05e79e5210ee17ab62e11990398103f22bff1b008ab46d433412ace3b9836c0b25e1b67017ca0e2e376928cc3d92130be1f3bcfd90310c26a65db7473029bedd9772110e32354a40c8aaa705870cf4520f34011a3237a6ea58839c873923b36af3a1d32a0f5e0051e6c96b27980a701974186a9ddea678b7bc3af94f2f1e0", 0xcb}], 0xa, &(0x7f0000000900)=ANY=[@ANYBLOB="180000000000000017010000030000000100000000000000180020000000000017010000030000000100000000000000180000000000000017010000030000000100000000000000300000000000000017010000020000001a000000de5fae052117606ea54594b0723706254f772125956dc4f7d3fb0000"], 0x78, 0x80}, 0x44000) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000da2000/0x4000)=nil, 0x4000, 0xa, 0x31, 0xffffffffffffffff, 0xa263b000) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000140)={0x87, 0x14, 0x81, 0x1, 0x1, 0x6, 0x3, 0x1, 0x67, 0x9, 0x3f, 0x1, 0x0, 0x8}, 0xe) getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:27 executing program 1: 15:57:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000006000)={{0x2, 0x0, @loopback}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast1}, '\x00\x00\xf1\x00\xe3\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}) 15:57:27 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) socketpair(0x24, 0x0, 0x0, &(0x7f00000000c0)) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r6, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r11}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r11, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r10, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r12, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) 15:57:27 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000080)={{0x4, @name="42da1da5909c80ff4f2d279197f10571f4ff69da20a57008770e270bd71c77b1"}, 0x8, 0x72c, 0x6}) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) r3 = accept(r0, &(0x7f0000000140)=@generic, &(0x7f0000000200)=0x80) ioctl$USBDEVFS_RESETEP(r1, 0x80045503, &(0x7f0000000000)={0x8, 0x1}) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f00000000c0)=0x9, 0x4) 15:57:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@local, @in6=@rand_addr="fec7086bc44f2c681a415a359d344d9a", 0x4e20, 0xf001, 0x4e20, 0x1, 0xa, 0x150, 0x20, 0x8, 0x0, r8}, {0x4, 0xf1, 0x1, 0x5, 0x4877, 0x0, 0x0, 0x5}, {0x1ff, 0x5, 0x2, 0x100}, 0x10000, 0x6e6bb1, 0x4, 0x0, 0x3, 0x3}, {{@in=@loopback, 0x4d2, 0x6c}, 0x2, @in6=@local, 0x3505, 0x2, 0x1, 0x1, 0x4, 0xf74, 0x7}}, 0x379) 15:57:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msync(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0xa) [ 576.752162] audit: type=1804 audit(1577548647.592:1567): pid=18750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/455/memory.events" dev="sda1" ino=16584 res=1 15:57:27 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x8, 0xcd, 0x1f, 0xff, 0x0, 0x0, 0x7, 0x8, 0x9, 0x40, 0x7, 0x45, 0xf8, 0xff}, 0xe) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r6, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f0000000100)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r9}}, 0x20}}, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r11}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r10, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r11, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r10, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r12, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) ioctl$KVM_GET_VCPU_MMAP_SIZE(r3, 0xae04) [ 576.941875] audit: type=1800 audit(1577548647.592:1568): pid=18750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16584 res=0 15:57:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x8000) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f0000000080)}, 0x23044, 0x0, 0xfffffffd, 0x0, 0x0, 0x32}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x129a226632abbeea, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0x6) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000006d00), 0xffffffffffffff92, 0x1ffffffe) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) ioprio_get$uid(0x3, 0x0) lchown(0x0, 0x0, 0x0) getresgid(0x0, 0x0, &(0x7f0000000180)=0x0) setresgid(0x0, 0x0, r1) 15:57:27 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x6, 0x810, 0xffffffffffffffff, 0x3358f000) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2f87, 0x200180) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x18, r4, 0x401, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4}]}, 0x18}}, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="230000006f02faad8cbb00028232037ef70000ef8a28c153407861010001000000000049836cf4bce92bcda74fa95e4c207abbb8b1608a6289b6aeb1ac8e2c987610ef3a3386b4b56ca8cbf3605fcf9470c0760219928ae4afa4aa41a04cbb855fb86fee8747a6a0a6f21cb1de5a44b26948f86a6f6916b33cf1e6b4ec6fca18f60c7842a5e958b70b595649563684dd27adc56967074cd551625431a9a1f7d2189113ada2904c3f7fd7da45cfb6cfa3ec752ad83d00e8677965d148a7fb41fc115e0e1a171b42f365b7c715d25d54815ed3de"], 0x23) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r7, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r8, &(0x7f00000001c0)={0x0, 0x3f00, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="3f0200000000000000000100000000000000060000000014001462726f6164636173742d6c696e6b00001967e3b499f89d95f686615f2e276921a09bc0c05a8f22bfdca0c39d76d87c988df019aeb50d53042a41554623e396870fcaef28f639d0778f7437d765a4daf1f21031d25bcb5c10cc02000000000000008b6f5a508500eaf18d78715bf607c81005290b0873859de371ec6cfdf011f49b0abcc78cade8ff461f6a5f3d26fdc95e9961e44d6a53e8d424ec77adf0831f24d3ed336c78095acd71e6819305a9f505376673fe6704f757d2b60c0e7c"], 0x30}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r9, 0x300, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x14, 0x17, {0x1, 0x7f, @l2={'ib', 0x3a, 'lo\x00'}}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x545e2e9224a71bb5}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r10}}, 0x18) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40c80100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r4, 0x100, 0x70bd29, 0x25dfdbfb}, 0x14}}, 0x800) [ 577.032020] audit: type=1804 audit(1577548647.602:1569): pid=18750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/455/memory.events" dev="sda1" ino=16584 res=1 15:57:27 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000100)) fcntl$F_GET_FILE_RW_HINT(r5, 0x40d, &(0x7f0000000080)) 15:57:28 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000200)={0x9, 0x6f, 0x2}, 0x9) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x1aed, 0x7, 0x6, 0x400, 0x10, 0xfffffff8, 0xeb}, &(0x7f0000000000)=0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r3, @in={{0x2, 0x4e23, @loopback}}, 0x7fffffff, 0x3, 0x9, 0x4, 0x40, 0x5, 0x81}, 0x9c) r4 = getpgrp(0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000100)) perf_event_open(&(0x7f00000002c0)={0x9, 0x70, 0x1c, 0x1, 0x1, 0x66, 0x0, 0x1, 0x40f64, 0xc5bb15fb5df61a7c, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000140), 0x5}, 0x20a82, 0x0, 0xfffffffe, 0xa, 0x53, 0x3, 0xe250}, r4, 0x8, r5, 0x2) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@local, @in6=@rand_addr="fec7086bc44f2c681a415a359d344d9a", 0x4e20, 0xf001, 0x4e20, 0x1, 0xa, 0x150, 0x20, 0x8, 0x0, r8}, {0x4, 0xf1, 0x1, 0x5, 0x4877, 0x0, 0x0, 0x5}, {0x1ff, 0x5, 0x2, 0x100}, 0x10000, 0x6e6bb1, 0x4, 0x0, 0x3, 0x3}, {{@in=@loopback, 0x4d2, 0x6c}, 0x2, @in6=@local, 0x3505, 0x2, 0x1, 0x1, 0x4, 0xf74, 0x7}}, 0x379) 15:57:28 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x6935d000) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 577.293176] audit: type=1804 audit(1577548647.712:1570): pid=18757 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/455/memory.events" dev="sda1" ino=16584 res=1 15:57:28 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x0, &(0x7f0000000300)="0805a6b594c20bb5055e0bcfe847407147c12a6a5495f5bf5112326303e659b0a9770e3d4ecc61a21423b1189d45511e28dca4ffc6baf6e4761af104d3d3a506d63f1f22e33859d957fbee7cbbd8431300000000000000000000000000000000dd63a36e77a11dc1232fab06136f5aa3a9611ed2a5f4d53cadf9ca5d8ccc70d3a379d6425ac4e480bf6f3c4edae5378ffdb9810b3daab6102324c3558838b5d127ccd9508ee6d179a7171050cff202bb3c77fac339d0694a8d75c5d847f4a9f93da1625cf3570152ce00da99c4495476ccae4c67ce6aa9c1f123268607e1122420c54aa5f3a2b4c6ad013afc158d174bfb14255a3301d6f8a6") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 577.451306] audit: type=1800 audit(1577548647.742:1571): pid=18750 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16584 res=0 15:57:28 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sigaltstack(&(0x7f0000911000/0x4000)=nil, 0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000001c0)={0x6, 0xa40, 0x8202, 0x1, 0x3, 0x10001, 0x10000, 0x8, r5}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r5, 0x56, "a0aed5f5c81bcd5352ca6138ccdc57360c39db3a666e27ed25719bc28399a96fd81a101e59964d965d951d4501cec0f90e324263d32cae5bd4a78fb5a6ebe6a4c29eb848b046b2611683d27d0ccb6c749e6fd5d504af"}, &(0x7f0000000340)=0x5e) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000000)={r5, 0xd}, &(0x7f0000000080)=0x8) [ 577.503874] audit: type=1804 audit(1577548647.742:1572): pid=18757 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/455/memory.events" dev="sda1" ino=16584 res=1 15:57:28 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r5, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r5, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) r6 = accept4$llc(r5, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x10, 0x100400) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000240)={'vlan0\x00', &(0x7f0000000200)=@ethtool_sfeatures={0x3b, 0x2, [{0x93ea, 0x3}, {0xfffffffe, 0x1b}]}}) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bind$llc(0xffffffffffffffff, &(0x7f0000000280)={0x1a, 0x312, 0x6, 0x8, 0x7, 0x3, @broadcast}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r8, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$SG_GET_SCSI_ID(r8, 0x2276, &(0x7f00000002c0)) ioctl$TIOCNXCL(r7, 0x540d) [ 577.537649] audit: type=1804 audit(1577548647.742:1573): pid=18757 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/455/memory.events" dev="sda1" ino=16584 res=1 [ 577.623892] audit: type=1804 audit(1577548647.992:1574): pid=18782 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/456/memory.events" dev="sda1" ino=16577 res=1 15:57:28 executing program 2: pipe2(&(0x7f00000006c0)={0xffffffffffffffff}, 0x84800) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000700)={0x4, 0x3, {0x2, 0x2, 0x4, 0x1, 0x4}, 0x6}) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f00000048c0)=[{{&(0x7f0000000600)=@caif=@rfm, 0x80, &(0x7f0000000780), 0x0, &(0x7f00000007c0)=""/100, 0x64}}, {{&(0x7f0000000840)=@nl=@proc, 0x80, 0x0}, 0x10001}, {{0x0, 0x0, &(0x7f0000002b40), 0x0, &(0x7f0000002b80)}}, {{0x0, 0x0, 0x0}, 0x8}, {{&(0x7f00000047c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000004840), 0x0, &(0x7f0000004880)=""/39, 0x27}, 0x6}], 0x5, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000ac0)=ANY=[@ANYBLOB="580000007d020000005100ff03000000001704000000020000000000000000002400090000001d00000000000000000000001700757365727b73656c666367726f7570747275737465642801007d03007368000300736800d975cb5f9475ff90878db1bcc12960625478fc02c8db97d83c653b9c46e99eb00b3f760b6bc5713fbcd4e78bd058bd67f4e8c00e0e63b0c386645ff965ea45261c8b6863bfa050c6eeac90ce1f99ecb78dd401e3e8147ce563c1e714154a7b841926503f0b9dbea5fb00a317a346d131a523559af0f59a789893c9a3ea02011c0350877a9a6ecc702e621a15d800"/239], 0x58) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x1000, 0xffffffffffffffff, 0x1b) socket(0xa, 0x2400000002, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000180)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcsa\x00', 0x0, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000680)='/dev/zero\x00', 0x14000, 0x0) sendmsg$kcm(r4, &(0x7f0000000a80)={&(0x7f00000008c0)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000940)="ddaee9b7a94e6de78d34d3ecf5f19a3e86e6cee692b54da48adfe71af3ab27f73f0b57bb3b07f54096227bc907b421bd83660af900d169437637e40d42effc15ef7d96ee9f9755a66c559d7541f9809594e2228093a1f1a7b1a4a1a991e65072279b33e3bd5ea220f4e9abce6a12955366eca6316ba3461c77a27f5fbcfc86868b9fb5963c1b4cf08adacc0432865c30a865a14d1d2946ca25907423df06f2a8f2185fe47b5c99572251b77e66ab6231b0a79fe7c2c49a3e9b62c362e778a00afed1c6e24c99549fcca2de692a200b129b187ca82e9177e372d1d73420c064837be90231a66f0c8d8ff50095e8828b988fe9ca365637760aa068a544af", 0xfd}], 0x1, &(0x7f0000000a40)=[{0x28, 0x196, 0x8, "5a803ee50995eda66525ae69fb946a6354b004f7bb"}], 0x28}, 0x80) getsockopt$inet6_buf(r6, 0x29, 0x45, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$uinput_user_dev(r7, &(0x7f00000001c0)={'syz1\x00\x00\xff\xff\xff\x94\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51e80c42], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4202]}, 0x117) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) [ 577.822892] audit: type=1800 audit(1577548647.992:1575): pid=18782 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16577 res=0 15:57:28 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x80003, 0x6b) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r1, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x70, 0x9, 0xba, 0x1, 0x37, 0x0, 0x100000000, 0x28080, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0xa0, 0xc}, 0x30, 0x1ff, 0x2, 0x8, 0x454, 0x0, 0x20}, r1, 0x5, 0xffffffffffffffff, 0x8) ioctl(r2, 0x3, &(0x7f0000000300)="0805b5055e32cee8474071f03fbe873d297242ac6c5d43c684415d0053d337ee551f5e2301346fa1b60666ffb86439ba8f8c1e25c241476cdbf44425ffff1a72ba7491e6e9ff07") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 578.083688] device bridge_slave_1 left promiscuous mode [ 578.092270] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.137002] device bridge_slave_0 left promiscuous mode [ 578.142541] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.358001] device hsr_slave_1 left promiscuous mode [ 578.420097] device hsr_slave_0 left promiscuous mode [ 578.479603] team0 (unregistering): Port device team_slave_1 removed [ 578.494632] team0 (unregistering): Port device team_slave_0 removed [ 578.508529] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 578.568516] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 578.632167] bond0 (unregistering): Released all slaves [ 579.615608] IPVS: ftp: loaded support on port[0] = 21 [ 579.684457] chnl_net:caif_netlink_parms(): no params data found [ 579.716077] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.722496] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.729838] device bridge_slave_0 entered promiscuous mode [ 579.737251] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.743711] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.750637] device bridge_slave_1 entered promiscuous mode [ 579.766854] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 579.777219] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 579.792897] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 579.800270] team0: Port device team_slave_0 added [ 579.806206] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 579.813906] team0: Port device team_slave_1 added [ 579.819333] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 579.827020] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 579.884839] device hsr_slave_0 entered promiscuous mode [ 579.923192] device hsr_slave_1 entered promiscuous mode [ 579.963615] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 579.970704] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 579.986624] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.993020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.999599] bridge0: port 1(bridge_slave_0) entered blocking state [ 580.005985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 580.040601] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 580.047759] 8021q: adding VLAN 0 to HW filter on device bond0 [ 580.057876] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 580.066937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 580.075475] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.082132] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.089393] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 580.100632] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 580.107098] 8021q: adding VLAN 0 to HW filter on device team0 [ 580.118662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 580.126675] bridge0: port 1(bridge_slave_0) entered blocking state [ 580.133081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 580.153722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 580.161437] bridge0: port 2(bridge_slave_1) entered blocking state [ 580.167875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 580.175979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 580.184236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 580.192549] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 580.206516] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 580.216446] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 580.227813] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 580.234540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 580.242136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 580.249936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 580.262366] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 580.270709] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 580.280772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 580.292394] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 580.342984] protocol 88fb is buggy, dev hsr_slave_0 [ 580.348129] protocol 88fb is buggy, dev hsr_slave_1 15:57:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r10, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r9, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r11, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 15:57:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4d3e3b6c41672495, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) ioctl$SOUND_MIXER_WRITE_VOLUME(r1, 0xc0044d1e, &(0x7f0000000000)=0xd) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@local, @in6=@rand_addr="fec7086bc44f2c681a415a359d344d9a", 0x4e20, 0xf001, 0x4e20, 0x1, 0xa, 0x150, 0x20, 0x8, 0x0, r8}, {0x4, 0xf1, 0x1, 0x5, 0x4877, 0x0, 0x0, 0x5}, {0x1ff, 0x5, 0x2, 0x100}, 0x10000, 0x6e6bb1, 0x4, 0x0, 0x3, 0x3}, {{@in=@loopback, 0x4d2, 0x6c}, 0x2, @in6=@local, 0x3505, 0x2, 0x1, 0x1, 0x4, 0xf74, 0x7}}, 0x379) 15:57:31 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) syz_open_dev$dmmidi(&(0x7f0000000440)='/dev/dmmidi#\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x254cc334}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="bc47e0f6e7ddb5a3366ae063604df498c76fc749fdc8eff01c02d3f6c20310c8b7fe2be28ce2ecad56b91893bff72d87e5e4b8ada65f427b914bffd3d7375894b25366dbe16d8666bc42b404d69bdab83b7ef5250c3508a8f20bd66fe1b5636a3f8a0e77bc3ff77b583ddfc5bce42bde0cf40fcce403f86864707e74db82bc82d70600000000000000e1ec6e1ff260cb792630e9d04d93c344dc23a18538d5f486b576884a1279602e0b88cdfa25140798985dec7e48ec363227793e88df9aa15ff6279e50fc3ea8c738b36e1f4113f98d36fef8f4060b7cecf24428407e891c0abbc4e4540b017515bcd34a7b087800"/254, @ANYRES32=0x0, @ANYBLOB="10000000000000002000000000000000"], 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xc000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) socket$netlink(0x10, 0x3, 0x3) getuid() r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r0, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r1 = socket(0x4, 0x800, 0x0) dup3(r0, r1, 0x80000) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) accept4$netrom(r2, &(0x7f0000000480)={{0x3, @bcast}, [@remote, @netrom, @rose, @remote, @null, @default, @bcast, @null]}, &(0x7f0000000140)=0x48, 0xc1c00) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x40096101, &(0x7f0000000040)) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x200000c, 0x8010, r3, 0x40d60000) ioctl$KDGKBLED(0xffffffffffffffff, 0xc0046d00, &(0x7f0000000100)) 15:57:31 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r0, 0x0, 0x4) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x800, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 15:57:31 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x40, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 580.587747] kauditd_printk_skb: 9 callbacks suppressed [ 580.587765] audit: type=1804 audit(1577548651.432:1585): pid=18848 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/458/memory.events" dev="sda1" ino=16603 res=1 [ 580.638861] overlayfs: conflicting lowerdir path 15:57:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r10, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r9, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r11, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 580.739729] audit: type=1800 audit(1577548651.432:1586): pid=18848 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16603 res=0 [ 580.775596] overlayfs: workdir and upperdir must reside under the same mount 15:57:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x4, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000380)=0x4, 0x4) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000280)={0x1, 0x7, 0x4, 0x20000000, 0xe9d, {r2, r3/1000+10000}, {0x2, 0x2, 0x20, 0x6, 0x4, 0x0, "985d55c2"}, 0x5, 0x2, @planes=&(0x7f0000000240)={0x5, 0x4, @mem_offset=0xf4a, 0xffffffff}, 0x5502, 0x0, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000300)={0x0, 0x2, 0xfffffff7, 0x7f, 0x7}, 0x14) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="230000006f020003000000000000080000000000000022040000000800000000000000"], 0x23) getsockopt$nfc_llcp(r5, 0x118, 0x0, &(0x7f0000000100)=""/132, 0x84) r6 = socket$tipc(0x1e, 0x5, 0x0) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x660e02, 0x0) write$P9_RWALK(r7, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) write$apparmor_current(r7, &(0x7f0000000080)=@hat={'changehat ', 0x2, 0x5e, ['@\x00', 'md5sumwlan0!%eth0\x00', '+uservmnet0vmnet1em0@\x00', '\x00', '/[\x00', '\x00', ')+keyring\'md5sumeth1\x00', 'eth1$vboxnet0:\x00', '-proct\x00', '\x00']}, 0x78) getsockopt$TIPC_SRC_DROPPABLE(r6, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:31 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) socket(0x1e, 0x2, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r1, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000180)={0x9f0000, 0x200000, 0x4, r1, 0x0, &(0x7f0000000100)={0x1ac1b1b, 0x300, [], @p_u8=&(0x7f0000000080)=0xb9}}) bind$tipc(r2, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x1}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) socket$caif_seqpacket(0x25, 0x5, 0x4) write$cgroup_int(r3, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r4, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r5, r4, &(0x7f0000000040), 0x100000001) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@local, @in6=@rand_addr="fec7086bc44f2c681a415a359d344d9a", 0x4e20, 0xf001, 0x4e20, 0x1, 0xa, 0x150, 0x20, 0x8, 0x0, r8}, {0x4, 0xf1, 0x1, 0x5, 0x4877, 0x0, 0x0, 0x5}, {0x1ff, 0x5, 0x2, 0x100}, 0x10000, 0x6e6bb1, 0x4, 0x0, 0x3, 0x3}, {{@in=@loopback, 0x4d2, 0x6c}, 0x2, @in6=@local, 0x3505, 0x2, 0x1, 0x1, 0x4, 0xf74, 0x7}}, 0x379) [ 580.930150] audit: type=1804 audit(1577548651.432:1587): pid=18848 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/458/memory.events" dev="sda1" ino=16603 res=1 15:57:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @multicast2}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000240)={0x0, 0xf8, "4c7f2f6ec7d92f6e640a5616f096111cd1fd26c3d1d92e752c0b2c2fb94fb85723c79a78a616d535533f7cc2fc16eb62113db4486250a419d6c8dc2c852a5ab1b731d3bf0cc435bda5c6a4bc352d138bd643fe1e2ba3b35784a5ce09262ad11bf1efd4fba102e516d204bf00e5f25024c7f9b6a7baa67d8b59a76d6f7f25bcd39c125d655bb7218a4b49f0e7cc475c32c8726cba9b259c0e4ad7872cb614fe219fa64acd7f5d5a27592e8f9e24d3636326bd22c61d6aebd83992845fcd7e642b54dd83e5ef40b6c372a182204432a86779f4ab4dd97a1bb6d166a5e874d390e2170c5dbb1c96aa12e99af90c8c7d9e3258c82798dec361f9"}, &(0x7f0000000080)=0x100) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000180)={r5, 0xbb, 0x3f, 0x7, 0x9, 0x1}, &(0x7f0000000340)=0x14) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg(r2, &(0x7f000000a900)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000001740)="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", 0x8c1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000380)='a', 0x1}, {&(0x7f0000000640)='\n', 0x1}, {&(0x7f0000000140)="cd", 0x1}, {&(0x7f00000007c0)="ed", 0x1}, {&(0x7f0000000880)="c6", 0x1}, {&(0x7f00000008c0)="06", 0x1}], 0x6}}, {{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000001c0)="d3", 0x1}, {&(0x7f0000000c00)="f3", 0x1}, {&(0x7f0000000cc0)="87", 0x1}, {&(0x7f0000000040)="ff", 0x1}, {&(0x7f0000000dc0)='f', 0x1}, {&(0x7f0000000a00)="9c", 0x1}, {&(0x7f00000000c0)="f7", 0x1}, {&(0x7f0000000e80)="03", 0x1}, {&(0x7f0000002740)="283d10aa114f9f162feb777f45f3eddf67b5a5fb47c3921fed1972e458d05bdbc49bfa587a0e3ab30c09b29b7e549467514474e2948ba0b6cf105c4d4fad8b1474b516ba5b6d78595a71387462d403a4bb2a283341b88467e272074b6e8438ec138bc1ba536e92eaf7011a7f9316a9bfeabb88cca131679aa3fa745b167a90bc504b122bed89292849883eaf1e8ef07528bbcda7737e98ef8ce6c031b2b11d79b3d95df62dfa58d61a6ba856627f2f2c3d9505eb46b3b927bf53a4a2161e1e8808889cab06ba7731cf3dea750f5f7e49e4670214606393f86644e4d28c658a588fd4f2d9e5b267f7bb848c7963836a300b7277f1d67a874156e95cfee1a495f0c1aa425e3df5cf95b717b8cedafdf7973e9f7cd79e06b57180ce7b18caccdc6f749a563409ed2f19bd6589b311f6e23276b8e7e33938a10761016bea87b1323f1ceb7314b9934b0c7e3c2bad1dbb7e990bc5b4807bddeaa54996fed1349ac50b3987823b99d8ac9ad7bfd2cc48a130423858ff1467e23b2066886a1ac4d15eb716267de674a26df5fbf36dbbed4399f9e08fd07c34b74a454e346973d369712d8e81f2f0e01d51f58398782d09a586769c26ad726225e93f50b2336d21967f841d901f0a51d09f600d07e70f9d7284b46a13bab0eb9c11dfda300dc47fd59eb47054e258803231bd800fdc6bdbbaeed2c6b50f18c34172acf25b3d8f2fba882baf22a884c1a2811f9d0342d7401f5fd0de0f17a76fae281373f9b4b46df1a130bde183557b52e25aa18cce7eb5b621afc4746eff5b0c5876b69c1d63200747031e7ae7ab13305f065fa812738f028c97821106d21b7a14bc9fd5f2843d9d7ca7d71c70c6d01bf41990c01544c422792cc1df83cafe2bf89ab34aa42b9ca37df5dd32b07922a296482a1823e96f5938b0fb8b08127214583c065841bc6878580eaef64a2beaad11a5b687a8cb48d70d2d58b6b434a9648433688ae4e7b1419299025de100e0f410e1406a31c783cb566a3fa65dc03cb86b435a8262fd8a2e2fd5ff7c3ea73915c45b6819df2c53704bc66f3dfc56d61821bea340418e1df833a2ac23ac3d121b188d189bb1a00f5fe6c6c1b50dee377bca407342a659f55fa768587bbb1e62e6e0f7505d6ec414eb3b8597bff5e4b90e4a489f855e5be43f0eb083b64e53b2c30414fb431580e78b385276966cbe259a71b5f0bca6f31825f34e42c47044c7ea0fccd458a4cc823434bb4654f30ecd858c74e70bd9df10a191edc718138cb82e45b5ff3dfeb5217ed6f4adc516eab2c4a9f74a9503ab9aa298549c6e9fc1a5bd21d67931055e78e61264d36377c509d4525a3bb558dd650de247b4daf24d0d56ff5cf23b562c88e284caf2017248e31c157669ab85f698e1836c90bd8cd162aaae6636c83d4f4023270f65cff9735f845a1390d18db395c49dd948622edd73270ea4571c6e4a34a46ed0c95a960e62fb5a683f4b08d3368ee30456e1bf5fbfd7dbd7475a5143cb7a13117b132ba6ba74c6bb285e22ed99b29fabda7a177517eacccb587bf13915d212d46692ce1195246ff76f38d3443b6fb7e8751e1b2d60a6ba0eb93294e71278f5d25e596cdff2effe82c6890c11be2365f29ccaa96e61afe02e01b68a8e953250566236176f9810a4fb521ca01fbd6882f56e9570291a11ca09a05c0992ad27391b66a241ba3cba7ac0ac6bb642fcf58eea80432a48e0fdeee21b50f91d00de3aa42738a5f17905f0b3a79766f2d006d862fca37b94eb7a643f8f8d94f44fd0917ef898cffee6bae7b5be7784a5c89931d606affbe4217029109b399dd58aa3f1f590fc96d742f85a762e3b041f8cc63e702eaa5b760373dc9bd370128c9f8df823aab3a1fb182b1b3659aa57dc72fb50138ebaba65bb7fcf2fd5088a755de4790fe9d7d0ee8e39a9700c99090f314975bff712cfe12dadb1879221d8e2a42235799d820c52a82be72d515f8b8a46bae04e4e1978cec6d3e74fe0344d21fdfaa9fcb192af627dacf87fb360126ecea3e2d30cb08aca339c24a03e679d87aaf5baf88cda5396c48bc7bbc6464f22b8a1767bdfd6e608a54c864e185038397730b1d53f7352f7cd6d72d6eef5300abe92cc02bc3ac45d1fbebbf0f0a64d8771a7fa8627138d2d589472afd592382f96e7252ded975a74bc079160e7c4d6fd8cdbfd05397e7504b973cb65c6f41603e26deba6d0834aa32d41554db185688c0211903071a0f33f9318e945465867aa6d22f988e1368503a5c79251fe97fa98ff990ab5e2882e1ae915935f0162bc203afbbec17117b544159cdd018d7ae43db3a01a3e198d2032dc8816f1d39bf40f7087268c5a5de2cc2a84022f88a3a357045acc5c6179bf32428d8f10ad0322e6d39ca68477c908c64d497750faa59a2840e1784866dbc220efa29394d812acd8f762dd3016a708b43c7e9a80ee5a2e629aad73d4d54cb6d9f8a4ce4cd72562f75ddc224da0e8e2b3a6ae9b748c7884c53c0fe82e39d4aa5d6ec4ba0d0d91c50af0f39c681b973ca73f239e120cde25e656d0038cd02e52972e36c83ecb9e06d3f21bc67d4963c65602a756e7b5c01117e21d1112de7574c4a91ef5fce517773993da738dd3ec34deb9f85779d3da4db67bffa1f121b0356bbe8c7c51c9833cc231316f1165de6d4f8b13262e989f3747c42bf14fbe08eff73c70120c3c919a7104f11048e8740424a5b923e961e527949c69abd040fb58fbf745ba5cd9df7f1552556d5b171cdf7bb112bc641937787fcb4dac8f5c47b896fff7ba84ea04b4cc72b6a0705b36bcefcda12a26b6b1f450fb2cdb7bb223fab1df24acebe079e4751c7afcc1ed4d1a7cade0f3af8125465ff107d9d4e04f4b5f609f2e4fd49fe652691fe3f5dfc39fddfa9364f974aa197000abeb29436e2d013306de64595c00dd87cc4be263b637f8e3b585e18f03d77d03a3f005f09b5b94c3757d44dce5cad0a9ae1fce4da2d39482640ee6a3329fe9e08d609aa0601a8d732ba72c0b0b0ae39ea12d8e897c25f1734fec6315a081c89e2e37a990dae326c35778ed22afa21ab4afd2c2d208ac1d3991bec491a51e9d82952182e8dcb3973c8fff6a42c89095b696f18c07c5fffec28997b9f3d3777faf5d0a50e34636c8914471bec6d558b37b8a0e1da6", 0x8c1}], 0x9}}], 0x3, 0x4028014) 15:57:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x3000) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r10, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r9, 0x5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r11, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 15:57:31 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000200)={0x7, 0x0, [{0x6, 0x2, 0x0, 0x0, @adapter={0x100000001, 0x80000000, 0x6, 0x7, 0x2}}, {0xfffffffc, 0xee2a09516cbd6ab2, 0x0, 0x0, @adapter={0x7f, 0x4, 0x6, 0x2, 0x40c}}, {0x8, 0x2, 0x0, 0x0, @adapter={0x3, 0x0, 0x200, 0x0, 0x9}}, {0x0, 0x2, 0x0, 0x0, @irqchip={0x6, 0x20}}, {0x8, 0x2, 0x0, 0x0, @irqchip={0x8, 0xe2d}}, {0x8001, 0x3, 0x0, 0x0, @irqchip={0x2, 0x6}}, {0x2, 0x1, 0x0, 0x0, @sint={0x6aa, 0x10000}}]}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x5, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000180)=0x4) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f00000000c0)) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000100)) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$BINDER_GET_NODE_DEBUG_INFO(r6, 0xc018620b, &(0x7f0000000480)={0x1}) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r7, 0x2276, &(0x7f0000000100)) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @remote}, @in=@loopback}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r8, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r9 = accept(r8, &(0x7f0000002600)=@in={0x2, 0x0, @initdev}, &(0x7f0000002680)=0x80) setsockopt$bt_l2cap_L2CAP_CONNINFO(r9, 0x6, 0x2, &(0x7f00000026c0)={0x5, "70a55e"}, 0x6) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) newfstatat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000540), 0x1000) r10 = accept$netrom(r4, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r10, 0x8982, &(0x7f0000000080)={0x1, 'syz_tun\x00', {}, 0x7fff}) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 581.055901] audit: type=1804 audit(1577548651.502:1588): pid=18860 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/458/memory.events" dev="sda1" ino=16603 res=1 [ 581.080479] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:57:32 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0x20e) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x1) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockopt$TIPC_CONN_TIMEOUT(r4, 0x10f, 0x82, &(0x7f0000000080), &(0x7f0000000100)=0x4) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x0, 0x80000) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 581.237923] audit: type=1800 audit(1577548651.532:1589): pid=18848 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16603 res=0 15:57:32 executing program 2: ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x931773df73a5843e, 0x2) connect$bt_sco(r5, &(0x7f0000000040)={0x1f, {0x2, 0x6, 0x0, 0x39, 0x80, 0x81}}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="ff1a26974f1faa884c78fb0a0a0f1f49078c0ccb0e6ed65eb8fffb41b8b5ef8f1515942e4cd6fb7877661f6f230aa3c07f1d43126d2e6ce6470cc872aed4df2a5fd9c7e7fde39c96654be26e38bf479e3d98d3b747a2c1"], 0x6}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffd7) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) 15:57:32 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) setsockopt$inet6_int(r1, 0x29, 0x8, &(0x7f0000000000)=0x3, 0x4) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) [ 581.416987] audit: type=1804 audit(1577548651.542:1590): pid=18860 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/458/memory.events" dev="sda1" ino=16603 res=1 15:57:32 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000040)={&(0x7f0000000000)=[0x4fd, 0x3f, 0x5], 0x3, 0x1f, 0x8901, 0x0, 0x7, 0xd8, 0xa00, {0x80000001, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0xe5, 0xa3, 0x6, 0x101, 0x7ff, 0x0, 0x8, "51ab9cff64b09cfad31a9dd9f81575a3075991940f897a876fc40b18012e78a8"}}) 15:57:32 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e24, 0x46, @local, 0x10}, @in6={0xa, 0x4, 0xd2, @remote, 0x9}, @in6={0xa, 0x4e23, 0x3, @mcast1, 0xff}, @in6={0xa, 0x4e23, 0x75, @mcast1, 0x8}, @in={0x2, 0x4e20, @multicast2}], 0x80) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x30) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) ioctl$VIDIOC_S_OUTPUT(r4, 0xc004562f, &(0x7f0000000180)=0xfffffffa) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r5, 0x2276, &(0x7f0000000100)) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000100)={0x283f6, 0x3, 0x5000, 0x1000, &(0x7f000086c000/0x1000)=nil}) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r7, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) setsockopt$TIPC_GROUP_LEAVE(r7, 0x10f, 0x88) [ 581.537519] audit: type=1804 audit(1577548651.822:1591): pid=18882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/459/memory.events" dev="sda1" ino=16611 res=1 15:57:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 15:57:32 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000001c0)={0x6, 0xa40, 0x8202, 0x1, 0x3, 0x10001, 0x10000, 0x8, r6}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r6, 0x56, "a0aed5f5c81bcd5352ca6138ccdc57360c39db3a666e27ed25719bc28399a96fd81a101e59964d965d951d4501cec0f90e324263d32cae5bd4a78fb5a6ebe6a4c29eb848b046b2611683d27d0ccb6c749e6fd5d504af"}, &(0x7f0000000340)=0x5e) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0)={r6, 0x7f, 0x4, 0x3f, 0x3, 0x6}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r7, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip6gre0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20098}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="800000002100200028bd7000ffdbdf2500000000", @ANYRES32=r8, @ANYBLOB="f1ff01001000e0ff0000e0ff080005003b1f00000c0001006d717072696f00000c0001006d717072696f000008000500080300000800050007050000080001006d71000008000500f0060000080005000802000008000100647272000c0002000800010005000000"], 0x80}, 0x1, 0x0, 0x0, 0x90}, 0x40) 15:57:32 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080)=0x1, 0x4) ioctl(r0, 0x1000008914, &(0x7f0000000000)="0805b5055e0ba06326b530000000e103000000718374d8") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e21, @empty}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @rand_addr=0x8000}, 0x10) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0xfffffffffffffffe) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socket$unix(0x1, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) shutdown(r0, 0x1) [ 581.688204] audit: type=1800 audit(1577548651.822:1592): pid=18882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16611 res=0 15:57:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 581.753551] device bridge_slave_1 left promiscuous mode [ 581.759276] bridge0: port 2(bridge_slave_1) entered disabled state [ 581.811501] audit: type=1804 audit(1577548651.822:1593): pid=18882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/459/memory.events" dev="sda1" ino=16611 res=1 [ 581.844976] device bridge_slave_0 left promiscuous mode [ 581.851062] bridge0: port 1(bridge_slave_0) entered disabled state [ 581.897243] audit: type=1804 audit(1577548651.872:1594): pid=18882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/459/memory.events" dev="sda1" ino=16611 res=1 [ 582.090390] device hsr_slave_1 left promiscuous mode [ 582.130844] device hsr_slave_0 left promiscuous mode [ 582.197240] team0 (unregistering): Port device team_slave_1 removed [ 582.219082] team0 (unregistering): Port device team_slave_0 removed [ 582.237870] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 582.300906] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 582.428943] bond0 (unregistering): Released all slaves [ 583.805389] IPVS: ftp: loaded support on port[0] = 21 [ 583.868686] chnl_net:caif_netlink_parms(): no params data found [ 583.899551] bridge0: port 1(bridge_slave_0) entered blocking state [ 583.906354] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.913624] device bridge_slave_0 entered promiscuous mode [ 583.920458] bridge0: port 2(bridge_slave_1) entered blocking state [ 583.926925] bridge0: port 2(bridge_slave_1) entered disabled state [ 583.933893] device bridge_slave_1 entered promiscuous mode [ 583.951936] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 583.961412] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 583.979985] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 583.987510] team0: Port device team_slave_0 added [ 583.993307] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 584.001300] team0: Port device team_slave_1 added [ 584.006818] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 584.014408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 584.074967] device hsr_slave_0 entered promiscuous mode [ 584.113130] device hsr_slave_1 entered promiscuous mode [ 584.173598] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 584.180693] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 584.194314] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.200675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.207347] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.213792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.248524] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 584.254951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 584.263538] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 584.272032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 584.280986] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.288216] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.295648] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 584.306354] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 584.312571] 8021q: adding VLAN 0 to HW filter on device team0 [ 584.323743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 584.331336] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.337786] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.354134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 584.361736] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.368136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.376800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 584.384857] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 584.395792] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 584.409124] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 584.418956] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 584.431496] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 584.438356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 584.448475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 584.456744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 584.470295] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 584.482570] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 584.489375] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 584.496702] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 584.552932] net_ratelimit: 2 callbacks suppressed [ 584.552940] protocol 88fb is buggy, dev hsr_slave_0 [ 584.562919] protocol 88fb is buggy, dev hsr_slave_1 [ 584.682935] protocol 88fb is buggy, dev hsr_slave_0 [ 584.682940] protocol 88fb is buggy, dev hsr_slave_0 [ 584.682991] protocol 88fb is buggy, dev hsr_slave_1 [ 584.688056] protocol 88fb is buggy, dev hsr_slave_1 15:57:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:35 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) socket(0x2, 0x1, 0x66) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x4000000000014, &(0x7f0000000100)) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="230000006f020002000203000000080000000000ef0022042000000800000000000000"], 0x23) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) kcmp(r3, r4, 0x0, r5, r6) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0xe1) 15:57:35 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000200)={0x9d0000, 0x2, 0x4, r2, 0x0, &(0x7f0000000180)={0x5031a, 0x7ff, [], @string=&(0x7f0000000100)=0x6}}) ioctl$SIOCAX25GETINFOOLD(r4, 0x89e9, &(0x7f0000000240)) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="230000006f020002000203000000080000000000000022040000000800000000000000cf4c93576b59a6939ac909a53f947ccebb0a455764a4521dc9f568b7ba911e32dcb8f9ee1473a79f5fa153a5833f23b18c09915bf935801bb65547b07e3401fe31bb0e1e24b7f1fa9139b83ee118c81c3fd85fb983aa1b854bde05c83e2e47d5646115342f5d4c589e88029aee03439b6d581cafe4ffbdca0cb6813278ca3969572613538de2afd4a2accc0800c6d145ef38144e01da2a5852a525705940652104e31ffe55447701094d"], 0x23) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f0000000080)=0x5) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r6 = socket$inet6(0xa, 0x80003, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000280), 0x4) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) ioctl$SIOCNRDECOBS(r0, 0x89e2) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpid() shmctl$SHM_LOCK(0x0, 0xb) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x4000000000014, &(0x7f0000000100)) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x4000000000014, &(0x7f0000000100)) tkill(r2, 0x3b) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) getsockopt$inet6_opts(r3, 0x29, 0x0, &(0x7f0000000000)=""/86, &(0x7f0000000080)=0x56) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)) getdents64(r4, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 15:57:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r10, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r9, 0x5) 15:57:35 executing program 0: r0 = socket$inet6(0xa, 0x80000, 0xdd) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="230000006f020002000203000000080000000000341422040000000800000009000000"], 0x23) sendmsg$nl_netfilter(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100100}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xb8, 0x0, 0xb, 0x2, 0x70bd29, 0x25dfdbfe, {0xc, 0x0, 0x5}, [@typed={0xc, 0x9, @u64=0x9}, @generic="b7a1af66e080a6565794e7fdaaa41827763d9da014198516e1224f187c7ef8d44e2538e13fa52031d80731d05f01605d87ea1804ad608ccc3d6e978b7ec3564cabc978fe743296ffc26cae344a28f2e5a4c224a2c580fbecc0eb93dbf8fd74ac29f10ab808c1fc6499cb9a644c9d2ff89478c8fc88202786beafb3090a08eb6744f69dce00bfa7986ce4139da9df55c2e5a9b4aba1bf"]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x12000090) 15:57:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r10, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r9, 0x5) 15:57:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:35 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000080)={r1, r2/1000+10000}, 0x10) r3 = socket$tipc(0x1e, 0x5, 0x0) accept(r0, &(0x7f00000000c0)=@isdn, &(0x7f0000000140)=0x80) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x0, 0x0) unlinkat(r4, &(0x7f0000000200)='./file0\x00', 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvram\x00', 0x20040, 0x0) 15:57:36 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) r5 = socket$inet6_dccp(0xa, 0x6, 0x0) sendfile(r4, r5, &(0x7f0000000080)=0x2, 0x2) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:36 executing program 5: socket$rxrpc(0x21, 0x2, 0x3) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r10, 0xff64, 0x0}, 0xffffffffffffff36) ioctl$SCSI_IOCTL_START_UNIT(r9, 0x5) 15:57:36 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000000)=0x4) 15:57:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) [ 585.645077] device bridge_slave_1 left promiscuous mode [ 585.650619] bridge0: port 2(bridge_slave_1) entered disabled state 15:57:36 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = add_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000380)='logon\x00', &(0x7f00000003c0)='/dev/bsg\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0xc00, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB="230000006f02000200020300000008000000000000002204000000080000006a7435617fed1b682258d94dd87825479d06696fb8b559cf2555038eaf1369762fdfd1dbc6d56205dcdd24dc087a692cc19aa152bca1ea0444599247da37e6d866d21724cdafd81c20"], 0x23) setsockopt$XDP_UMEM_REG(r5, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000200)=""/166, 0x107000, 0x1000, 0x0, 0x2}, 0x20) sendfile(r4, r3, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") fcntl$setsig(r5, 0xa, 0x3b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 585.733875] device bridge_slave_0 left promiscuous mode [ 585.739470] bridge0: port 1(bridge_slave_0) entered disabled state 15:57:36 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name, &(0x7f00000000c0)=0x10, 0x80000) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000100)=0x6, 0x4) socket$inet6(0xa, 0x80003, 0x6b) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r1, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="230000006f020002000203000000080000fffffffeff220400000008000000000000008c573031d8f85c3816e2e6921404e48d9d5e74418ef55d6f4827187c095249a856a611485a1867c20285470d6f6a5bbf101b886bd71de756d2db80caa336216d1f42ae597bb4440d6e2e0000000000000000b4087e09b468a8"], 0x23) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 585.797775] kauditd_printk_skb: 21 callbacks suppressed [ 585.797794] audit: type=1804 audit(1577548656.642:1616): pid=19052 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/464/memory.events" dev="sda1" ino=16630 res=1 [ 585.912333] audit: type=1800 audit(1577548656.642:1617): pid=19052 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16630 res=0 15:57:36 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x111000, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000140)={0x2, 0x0, [{}, {}]}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000000)={0x2d7, 0x0, 0xa4c1}) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xaebe2837daa4de8f, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x1f, 0x0, 0x4, 0x4}]}) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 586.000912] audit: type=1804 audit(1577548656.652:1618): pid=19052 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/464/memory.events" dev="sda1" ino=16630 res=1 [ 586.031629] audit: type=1804 audit(1577548656.812:1619): pid=19058 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/464/memory.events" dev="sda1" ino=16630 res=1 [ 586.079680] device hsr_slave_1 left promiscuous mode [ 586.128473] device hsr_slave_0 left promiscuous mode [ 586.170423] team0 (unregistering): Port device team_slave_1 removed [ 586.182761] team0 (unregistering): Port device team_slave_0 removed [ 586.194741] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 586.250694] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 586.412055] bond0 (unregistering): Released all slaves 15:57:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) 15:57:37 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000180)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = socket$tipc(0x1e, 0x5, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) bind$tipc(r3, 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) [ 586.525337] audit: type=1804 audit(1577548657.372:1620): pid=19052 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/464/memory.events" dev="sda1" ino=16630 res=1 15:57:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:37 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000200)=@sco={0x1f, {0x2d, 0x40, 0x80, 0x20, 0x2, 0x8}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000280)="489b8d622eb008746a2baec7df56e53d64aa119234e53d67d9d2f1e8cd6086f90a6464feacbd1181be0bf7fa0ce89b408a50d712b3a2a58826d8ccdf5421349bd04fc6ffb9cdf31bb6e286f16a3bd6ab2ea5817f12f0f99755f0e472c84d40b93c719b9df6e5fb2dbd7cdf347f6bc3de68302c74a8811fc5d3cf3f5639f7195ea8a8f64cda0475c267e6703a42ac17a276f943e7400527068f0a6e4690c2cfcc111237e46fc0506f93a5d75ab5ea29bd8a802369daf8c08b505d0c9f61ed35ccf998dd8d858648f0f5416beab600c36177c8355788d916f848ebcfbf6487fd1baca86e94d13595818d30ac111e", 0xed}, {&(0x7f0000000380)="84796357fee27d958855300d1bcceb9ecd3653ae11ab70db3b33e240cae4aadaa2a36891ab2dcf85b12aebeb4432569dfef945e3c4ad0153734814e041e1729985975d1b113e4e2ed83222c1e1dcac3c1a4f3285d96cf8b4f54ef346193fdc9610c4f89f82dc16443ff165b4a913306d339ab07a82ae820876ac94081718e94a696e98fb39b61c50e45c51a14125dd0124ccfea939f8847494aa0d7a7015f401e0d3834b21d47ac562867a69154a9241ce4e1f83b4f9a8e50597d12cca09b2eed75a6e7410cbb97a0ec280dfcc34d74525acd8fcb6b370e5d3ee63750f19a38e9b1fede11b3499b266", 0xe9}, {&(0x7f0000000080)="c57dd6266654a55a3490537f24098571122129e81f36aed4372ac8dd5bc5168578f08d4eb633527f78e85ab91cd9fefce1d4eb37b09e9e78235aa229", 0x3c}, {&(0x7f0000000580)="3aa04fdd6402ca49ce514601c8db74cd665f4ff5adbc5366fefc8e5d1e198b3d5a2e96bae1ef7b38839ac8c11bb059efc9c68fa0d5df190191c1a9313c4246c343a8232d24319e2727508a51816fedb8440b8e519417442de55fc0165cda689562689d12f4afcd6c44b94a38da5cdc575e89dd666851fbdfb24bde81ab4c618a629ba4b0c450a7d23c1814ef30a8e878e5a4ecf5c0e650cd3273ae91fed6e9099a7a0ac3ee6072f765590cf977f7eef6004a90133f755221817dd67844b412449d6c29784c37916bc7e690f60198d65f63e9dc1f4c20a93ce65f5b96e38992501634e1ed3afa571b", 0xe8}, {&(0x7f0000000480)="9a5c82331fcb70a1ad17ced99d2d783873aa1728785fea17a0e5cf8e2b24fe6b4b976a3dc09f3b63b0552c3822d1a7683e49b4ab3431ed5c6aa1562ae737339110ea4ec59c5cd0587f3e5b52d23765185d4a70e1670b95b12d6e0b33c8133c32846c6f24868d2752fed0c89a30d254201003ab5bd9fd77622c4f8d5d28f29260148aa5ef48d644", 0x87}, {&(0x7f0000000680)="8b0ce87e820778100c7e9d383a351980b88380b81f439376fa40a7a3a2773bc189494755182e592e220d9d21f8d559295b97ca50e0f6b608ab6bf120b264542c5df86e311c755dded4498f38262891370c73fb5a7a024a0defc28db5b2602a5820badd8d9c60555987134075ad7b1eee9b402df0df07419b7a5bbf1a1fe6cfc59469cb2be94e02a81e0312ec0048e6d3c3a7d653e0e91d", 0x97}, {&(0x7f0000000740)="9e87798ea63c04bd6f4758981eb1bc8b7a851c118a16aad2925761fae76253391c465216448ad805fe1e62fc6f6cb0654a154d5da63571aed24a1fbfd27a236fdd49df81e9de0caaabeb6ede5b5643575f26dd04b7009a1168821856e8eb7878c1384c6c0fe8a2f45b2481ef7f2d15e24a766cfebc2713c48f83", 0x7a}, {&(0x7f0000000100)="296afc4764c8da0af99aba144261507fd5bcbd834fc7cf9c6c60b17097df6ab0c91cdb", 0x23}], 0x8}, 0x4010) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 586.723001] audit: type=1800 audit(1577548657.372:1621): pid=19052 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16630 res=0 15:57:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) 15:57:37 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000000)) ioctl$SNDCTL_DSP_GETIPTR(r1, 0x800c5011, &(0x7f0000000080)) [ 586.852723] audit: type=1804 audit(1577548657.412:1622): pid=19057 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/464/memory.events" dev="sda1" ino=16630 res=1 [ 587.009974] audit: type=1804 audit(1577548657.682:1623): pid=19092 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/465/memory.events" dev="sda1" ino=16650 res=1 [ 587.139039] audit: type=1800 audit(1577548657.682:1624): pid=19092 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16650 res=0 [ 587.232928] audit: type=1804 audit(1577548657.692:1625): pid=19092 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/465/memory.events" dev="sda1" ino=16650 res=1 [ 588.375547] IPVS: ftp: loaded support on port[0] = 21 [ 588.448877] chnl_net:caif_netlink_parms(): no params data found [ 588.480449] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.487004] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.494441] device bridge_slave_0 entered promiscuous mode [ 588.501342] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.507818] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.514821] device bridge_slave_1 entered promiscuous mode [ 588.534675] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 588.544185] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 588.559459] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 588.567242] team0: Port device team_slave_0 added [ 588.572886] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 588.580072] team0: Port device team_slave_1 added [ 588.585677] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 588.593268] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 588.674715] device hsr_slave_0 entered promiscuous mode [ 588.743332] device hsr_slave_1 entered promiscuous mode [ 588.783603] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 588.790796] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 588.807029] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.813424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.820041] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.826445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.860441] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 588.867874] 8021q: adding VLAN 0 to HW filter on device bond0 [ 588.877403] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 588.886514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 588.893920] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.900963] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.908211] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 588.918705] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 588.925166] 8021q: adding VLAN 0 to HW filter on device team0 [ 588.934208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 588.941759] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.948165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 588.959453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 588.967138] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.973541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 588.996130] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 589.005847] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 589.016233] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 589.025082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 589.034848] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 589.042534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 589.050518] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 589.058744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 589.065688] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 589.079614] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 589.088029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 589.098128] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 589.109328] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 589.153097] protocol 88fb is buggy, dev hsr_slave_0 [ 589.158184] protocol 88fb is buggy, dev hsr_slave_1 [ 589.272972] protocol 88fb is buggy, dev hsr_slave_0 [ 589.278147] protocol 88fb is buggy, dev hsr_slave_1 15:57:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r10, 0xff64, 0x0}, 0xffffffffffffff36) 15:57:40 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000080), &(0x7f0000000000)=0x2) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x9, 0x20}, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6, @in=@remote}}, {{@in6=@mcast1}}}, &(0x7f0000000140)=0xe8) newfstatat(0xffffffffffffff9c, 0xfffffffffffffffe, &(0x7f0000000300), 0x100) geteuid() r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x42002, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'em0'}}, {@version_u='version=9p2000.u'}]}}) 15:57:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f00000000c0)) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) write$P9_RGETLOCK(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="300000003702000008000000000000000900000000000000", @ANYRES32=0x0, @ANYBLOB="1200776c616e1b2d63af13388670757365747365"], 0x30) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000f32200003f0000000000000007000000000000000000000400020000060e000000000000000000000000000000000000000000000000000000000000070000000080000008000000000000000200000000000000e6f6000000000000380d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c2afb3cd328668c500"/832]) 15:57:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:40 executing program 3: mmap(&(0x7f0000a57000/0x1000)=nil, 0x1000, 0x0, 0x41810, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000080)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x470182, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000180)={0x1, 0x48, 0x1}) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x80000100000994e, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) 15:57:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000080)) 15:57:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) 15:57:40 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) socket$netlink(0x10, 0x3, 0x13) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) close(r1) 15:57:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r10, 0xff64, 0x0}, 0xffffffffffffff36) 15:57:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:40 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x100, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) dup3(r1, r2, 0x180000) r3 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:40 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r1, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e22, 0x2, @rand_addr="8d0000000000c619d58c5846c38e00", 0x4}, 0x1c) write$P9_RWALK(r2, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl(r0, 0x0, &(0x7f0000000080)="a7f842e4aa516911c82359545f0b") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f00000000c0)={r0, 0x4}) r3 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r10, 0xff64, 0x0}, 0xffffffffffffff36) 15:57:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) [ 590.183680] device bridge_slave_1 left promiscuous mode [ 590.189215] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.253332] device bridge_slave_0 left promiscuous mode [ 590.258871] bridge0: port 1(bridge_slave_0) entered disabled state 15:57:41 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) r1 = socket$inet6(0xa, 0x80003, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="2323d48bebf08b653002000000000022f3ffffff0700000000000000479b5c2594a8dfbdda2546fbcc143fef04f1f294967eae3df77d4928fc2a36e7f41a59858e4aef0bd3338cdbe7ad2552567c3a49cdb0df38b210534f06720b226ad7dc7ecf77a37bc0613d32875c40d0bc9c7159e63548c72bebc421818b840ca1e6a4a082f0661d19fe40ded62e8dd5a08b6852b1c341307bfbae785a6a7553712ac6175b3617e0ebb787a4ee45b983e7f4c15a90a3bc79a73dcabaec87e946fa383bcea4f800"/205], 0x23) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000001080)=0x4) 15:57:41 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x5, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000580)=""/4096, 0x1000, 0x100, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) 15:57:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) socket$inet_udplite(0x2, 0x2, 0x88) [ 590.440366] device hsr_slave_1 left promiscuous mode 15:57:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:41 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000080)={{0x8, 0x6}, 0x0, 0x7, 0x3971, {0x40, 0x3f}, 0x3f, 0x400}) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x6, 'syz0\x00', @null, 0xd1e9, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 590.520677] device hsr_slave_0 left promiscuous mode [ 590.588181] team0 (unregistering): Port device team_slave_1 removed 15:57:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 590.671018] team0 (unregistering): Port device team_slave_0 removed [ 590.758628] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 590.838787] bond0 (unregistering): Releasing backup interface bond_slave_0 15:57:41 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r4, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) pwrite64(r4, 0x0, 0xffffff68, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 590.941515] kauditd_printk_skb: 17 callbacks suppressed [ 590.941532] audit: type=1804 audit(1577548661.782:1643): pid=19241 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/468/memory.events" dev="sda1" ino=16682 res=1 [ 590.949879] audit: type=1800 audit(1577548661.792:1644): pid=19241 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16682 res=0 [ 591.007729] audit: type=1804 audit(1577548661.792:1645): pid=19241 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/468/memory.events" dev="sda1" ino=16682 res=1 [ 591.062095] bond0 (unregistering): Released all slaves [ 591.092769] audit: type=1804 audit(1577548661.932:1646): pid=19242 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/468/memory.events" dev="sda1" ino=16682 res=1 15:57:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:42 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 592.699569] IPVS: ftp: loaded support on port[0] = 21 [ 592.762746] chnl_net:caif_netlink_parms(): no params data found [ 592.797130] bridge0: port 1(bridge_slave_0) entered blocking state [ 592.803665] bridge0: port 1(bridge_slave_0) entered disabled state [ 592.810575] device bridge_slave_0 entered promiscuous mode [ 592.817666] bridge0: port 2(bridge_slave_1) entered blocking state [ 592.824131] bridge0: port 2(bridge_slave_1) entered disabled state [ 592.831034] device bridge_slave_1 entered promiscuous mode [ 592.847922] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 592.857258] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 592.872245] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 592.879792] team0: Port device team_slave_0 added [ 592.885429] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 592.892655] team0: Port device team_slave_1 added [ 592.898428] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 592.906175] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 592.965186] device hsr_slave_0 entered promiscuous mode [ 593.003217] device hsr_slave_1 entered promiscuous mode [ 593.043795] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 593.050880] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 593.064762] bridge0: port 2(bridge_slave_1) entered blocking state [ 593.071108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 593.077769] bridge0: port 1(bridge_slave_0) entered blocking state [ 593.084132] bridge0: port 1(bridge_slave_0) entered forwarding state [ 593.120397] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 593.126685] 8021q: adding VLAN 0 to HW filter on device bond0 [ 593.136721] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 593.145631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 593.154571] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.161238] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.168505] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 593.178569] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 593.185121] 8021q: adding VLAN 0 to HW filter on device team0 [ 593.194810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 593.202365] bridge0: port 1(bridge_slave_0) entered blocking state [ 593.208754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 593.219691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 593.227388] bridge0: port 2(bridge_slave_1) entered blocking state [ 593.233781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 593.248716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 593.256801] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 593.266500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 593.278947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 593.289228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 593.301954] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 593.308582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 593.322484] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 593.330028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 593.336961] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 593.347978] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 593.432938] protocol 88fb is buggy, dev hsr_slave_0 [ 593.438044] protocol 88fb is buggy, dev hsr_slave_1 15:57:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) 15:57:44 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000080)) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000180)={0x3, 0x0, 0x7, 0x7, 0x4, 0x2}) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:44 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) prctl$PR_GET_SECCOMP(0x15) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:44 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f00000000c0)) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000000), &(0x7f0000000080)=0x4) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 593.650999] audit: type=1804 audit(1577548664.492:1647): pid=19277 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/469/memory.events" dev="sda1" ino=17009 res=1 [ 593.753745] EXT4-fs warning (device sda1): verify_group_input:104: Cannot add at group 3 (only 16 groups) 15:57:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) [ 593.793468] audit: type=1800 audit(1577548664.532:1648): pid=19277 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17009 res=0 15:57:44 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f0000000040)={0x8, 'nlmon0\x00', {'ip6gretap0\x00'}}) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0xb00, 0x0, 0x19, 0x0, 0xef8b}}) 15:57:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:44 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r2, 0x0) keyctl$read(0xb, r2, &(0x7f0000000640)=""/172, 0x2af) keyctl$restrict_keyring(0x1d, r2, &(0x7f00000003c0)='blacklist\x00', 0x0) keyctl$negate(0xd, r2, 0x8, 0xfffffffffffffffd) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 593.951551] audit: type=1804 audit(1577548664.542:1649): pid=19277 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/469/memory.events" dev="sda1" ino=17009 res=1 15:57:44 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r1, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) dup3(r1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x1, 0x64000) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000140), 0xfffffe80) sendfile(r5, r4, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r5, r4, &(0x7f0000000040), 0x100000001) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000340)='#:-\x00', 0x4, 0x2) [ 594.137618] audit: type=1804 audit(1577548664.722:1650): pid=19299 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/469/memory.events" dev="sda1" ino=17009 res=1 15:57:45 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) syz_read_part_table(0x3, 0x2, &(0x7f0000000100)=[{&(0x7f0000000200)="ca2f09a11335d2d1b770168aa80cc686ee82e0824a2ae8fd734fd769b9f7896fc38bf2a4f3f6e134158ff38660f7eff12d488c54ef913dc8e3738ab6ca3c7c6db10a3712f801e249ec71aefa8536d5eceec8154d494fccbe6efe354619a9e41b147918e755bf61234f9a426be5ee956f4de982e265174b9e7ba6a8e083", 0x7d, 0xe047}, {&(0x7f0000000080)="8f109f1d1bcd496d301e6724fcdeb67dd1225e87ceea", 0x16, 0x5}]) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:45 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000300)="240000001e0025eaa87865f51e86041b0004000200bff20182a9000c080008000b000000", 0x1e2) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000140), &(0x7f0000000200)=0x4) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000080)=0x9, &(0x7f0000000400)=0x4) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e24, 0x8, @local, 0xfffff801}, {0xa, 0x4e21, 0x0, @loopback}, 0x3, [0xd1, 0x9, 0x5, 0xaf, 0x40, 0x100, 0x2, 0x10000]}, 0x5c) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x6, 0xa40, 0x8202, 0x1, 0x3, 0x30001, 0x10000, 0x8, r2}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYBLOB="56000000a0aed5f5c81bcd5352ca6138ccdc57360c39db3a666e27ed25719bc28399a96fd81a101e59964d965d951d4501cec0f90e324263d32cae5bd4a78fb5a6ebe6a4c29eb848b046b2611683d27d0ccb6c749e6fd5d504af0fb87bb29444168a883a7b8ade8194c38f3c37dde94da430d0394a093efae16b5cdd91daa62abc6b5440fc3d91c37d23c8a5b46f60347419127074a16d949e16757b268ff95335c0a06b3cdbf0852c6c5eaf90aceb3a7b457bb4a08715f1d359"], &(0x7f0000000340)=0x5e) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r2, 0x6, 0xffff, 0x0, 0x80000001, 0x1f}, 0x14) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) [ 594.380249] audit: type=1804 audit(1577548665.222:1651): pid=19339 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/471/memory.events" dev="sda1" ino=17090 res=1 [ 594.463885] device bridge_slave_1 left promiscuous mode [ 594.469395] bridge0: port 2(bridge_slave_1) entered disabled state 15:57:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) 15:57:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 594.558380] audit: type=1800 audit(1577548665.222:1652): pid=19339 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17090 res=0 [ 594.597889] device bridge_slave_0 left promiscuous mode [ 594.612352] bridge0: port 1(bridge_slave_0) entered disabled state 15:57:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) [ 594.850234] device hsr_slave_1 left promiscuous mode [ 594.907860] device hsr_slave_0 left promiscuous mode [ 594.967378] team0 (unregistering): Port device team_slave_1 removed [ 595.006339] team0 (unregistering): Port device team_slave_0 removed [ 595.042397] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 595.108234] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 595.242568] bond0 (unregistering): Released all slaves 15:57:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) 15:57:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:46 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000300)="240000001e0025eaa87865f51e86041b0004000200bff20182a9000c080008000b000000", 0x1e2) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000140), &(0x7f0000000200)=0x4) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000080)=0x9, &(0x7f0000000400)=0x4) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e24, 0x8, @local, 0xfffff801}, {0xa, 0x4e21, 0x0, @loopback}, 0x3, [0xd1, 0x9, 0x5, 0xaf, 0x40, 0x100, 0x2, 0x10000]}, 0x5c) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x6, 0xa40, 0x8202, 0x1, 0x3, 0x30001, 0x10000, 0x8, r2}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYBLOB="56000000a0aed5f5c81bcd5352ca6138ccdc57360c39db3a666e27ed25719bc28399a96fd81a101e59964d965d951d4501cec0f90e324263d32cae5bd4a78fb5a6ebe6a4c29eb848b046b2611683d27d0ccb6c749e6fd5d504af0fb87bb29444168a883a7b8ade8194c38f3c37dde94da430d0394a093efae16b5cdd91daa62abc6b5440fc3d91c37d23c8a5b46f60347419127074a16d949e16757b268ff95335c0a06b3cdbf0852c6c5eaf90aceb3a7b457bb4a08715f1d359"], &(0x7f0000000340)=0x5e) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r2, 0x6, 0xffff, 0x0, 0x80000001, 0x1f}, 0x14) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) 15:57:46 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000080)) bind$tipc(r0, &(0x7f0000000040), 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)={0x0, 0x0}) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x4000000000014, &(0x7f0000000100)) rt_tgsigqueueinfo(r3, r4, 0x15, &(0x7f0000000200)={0x1e, 0xb7e, 0x4df4}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000140), 0xfffffe80) sendfile(r6, r5, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r6, r5, &(0x7f0000000040), 0x100000001) r7 = socket$inet6(0xa, 0x80003, 0x80) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000280)) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) [ 597.443287] IPVS: ftp: loaded support on port[0] = 21 [ 597.510657] chnl_net:caif_netlink_parms(): no params data found [ 597.543200] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.549631] bridge0: port 1(bridge_slave_0) entered disabled state [ 597.556778] device bridge_slave_0 entered promiscuous mode [ 597.564341] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.570755] bridge0: port 2(bridge_slave_1) entered disabled state [ 597.577963] device bridge_slave_1 entered promiscuous mode [ 597.592800] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 597.601927] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 597.620091] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 597.627740] team0: Port device team_slave_0 added [ 597.633714] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 597.640913] team0: Port device team_slave_1 added [ 597.646556] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 597.654050] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 597.706006] device hsr_slave_0 entered promiscuous mode [ 597.753199] device hsr_slave_1 entered promiscuous mode [ 597.793605] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 597.800695] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 597.815358] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.821715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 597.828377] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.834870] bridge0: port 1(bridge_slave_0) entered forwarding state [ 597.870039] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 597.876415] 8021q: adding VLAN 0 to HW filter on device bond0 [ 597.886540] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 597.895480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 597.902786] bridge0: port 1(bridge_slave_0) entered disabled state [ 597.910292] bridge0: port 2(bridge_slave_1) entered disabled state [ 597.918059] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 597.928268] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 597.934802] 8021q: adding VLAN 0 to HW filter on device team0 [ 597.944023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 597.951585] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.957980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 597.968986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 597.976665] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.983056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 597.998134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 598.007597] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 598.017528] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 598.033944] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 598.044100] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 598.054787] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 598.061195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 598.069406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 598.077232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 598.089794] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 598.098098] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 598.104896] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 598.116182] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 598.172976] protocol 88fb is buggy, dev hsr_slave_0 [ 598.178064] protocol 88fb is buggy, dev hsr_slave_1 [ 598.202988] protocol 88fb is buggy, dev hsr_slave_0 [ 598.208109] protocol 88fb is buggy, dev hsr_slave_1 [ 598.292980] protocol 88fb is buggy, dev hsr_slave_0 [ 598.298105] protocol 88fb is buggy, dev hsr_slave_1 15:57:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) 15:57:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000200)) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:49 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r0, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) readahead(r0, 0x10000, 0x18) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000040), 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000140), 0xfffffe80) sendfile(r4, r3, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:49 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x80000001, 0x20400) ioctl$NBD_SET_BLKSIZE(r2, 0xab01, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x20, r5, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x4}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x20, r5, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x44) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r7 = openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r7, &(0x7f0000000a00)={0x8, 0x120, 0xfa00, {0x4, {0x0, 0x3, "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", 0xb9, 0x4, 0x0, 0x2, 0x100000000, 0x1}}}, 0x128) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000b80)={0x3, &(0x7f0000000100)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r6, 0x4010641c, &(0x7f00000000c0)={r8, 0x0}) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r9, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x18, r10, 0x401, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x810000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xa4, r10, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x74fbe75dd3cf8f42}, 0x0) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000340)={r8, 0x3, &(0x7f0000000200)=[0x0, 0x3f, 0x80000001], 0x0, 0x5, 0x0, 0x8000, 0x0, &(0x7f0000000300)=[0xc97]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000080)={r8, 0x3}) r11 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r11, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r12, 0x2276, &(0x7f0000000100)) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r13, &(0x7f00000001c0)={0x0, 0x3f00, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="3f0200000000000000000100000000000000060000000014001462726f6164636173742d6c696e6b00001967e3b499f89d95f686615f2e276921a09bc0c05a8f22bfdca0c39d76d87c988df019aeb50d53042a41554623e396870fcaef28f639d0778f7437d765a4daf1f21031d25bcb5c10cc02000000000000008b6f5a508500eaf18d78715bf607c81005290b0873859de371ec6cfdf011f49b0abcc78cade8ff461f6a5f3d26fdc95e9961e44d6a53e8d424ec77adf0831f24d3ed336c78095acd71e6819305a9f505376673fe6704f757d2b60c0e7c"], 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r12, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8011000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, r14, 0x3575e18ebbfa241e, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0x800) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 598.436445] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 598.469199] kauditd_printk_skb: 9 callbacks suppressed [ 598.469218] audit: type=1804 audit(1577548669.312:1662): pid=19433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/473/memory.events" dev="sda1" ino=17361 res=1 15:57:49 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0xdacbef08a39ef473, 0x20) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x4000000000014, &(0x7f0000000100)) write$P9_RGETLOCK(r0, &(0x7f0000000080)={0x1e, 0x37, 0x1, {0x2, 0x1, 0xe3d, r1}}, 0x1e) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) ioctl$FICLONE(r3, 0x40049409, r2) r4 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r4, 0x1000008912, &(0x7f0000000200)="080593412f798fae22b738b8082ad2dd620abad13503a423a28f59af06ba8801cb5f7ca66039da3d9962254dab2784f20dbb5acca01f763928bddb260a53b2f36481477befc6fa8d33f68900000000000000cd7e0cfb681ce9c9ab5207f7b9b238723edffb42068c0e1bbceae9923bf3ab6a44c5f96cc1e7a93d1c68e06dbe50b41f7d53be9f36f2379805dc4c9d1953628c980cce760d5d73149aa5e0bd2f7e510a50477220dcd50c7eb0b00c35b09095465ee15db6bcf10566352cc2") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r5 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) [ 598.611656] audit: type=1800 audit(1577548669.342:1663): pid=19433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17361 res=0 15:57:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:49 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0x317, 0x8, 0x4, 0x4000, 0x9, {0x77359400}, {0x2, 0x0, 0x81, 0x4, 0x80, 0x14, "fb3d46b8"}, 0xfffffff7, 0x1, @planes=&(0x7f0000000000)={0x40, 0x2, @mem_offset=0x3, 0x3a}, 0x4, 0x0, r0}) openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.memory_spread_page\x00', 0x2, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L-', 0x10001}, 0x16, 0x2) getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000180)=0x4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000240)=r2) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:49 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x2, {0x41}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 598.775477] audit: type=1804 audit(1577548669.352:1664): pid=19433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/473/memory.events" dev="sda1" ino=17361 res=1 15:57:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r10}, 0x3c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r9, 0xc0096616, &(0x7f0000000640)=ANY=[@ANYBLOB="0200000000ac0c2596b7365c831558a21aafd4c5faf81c1512f61c1d58d992dd0b13635f3040fbd8251f401e499dc37ba146559b6e4045ecf241af8c3559db134667b8f11af47a27643f066d4cf23c7dd63e4efda8259e129fae8e845ba8afd171e7f5e5f57c57b0c3f112750f3c7027021a5552a8aab1abcdc8c640dd6d37a21f5c8c"]) [ 598.965657] audit: type=1800 audit(1577548669.432:1665): pid=19454 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17362 res=0 15:57:50 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0xe, 0xa, 0x4, 0x80000, 0x7fffffff, {0x77359400}, {0x2, 0x1, 0x0, 0x7, 0x7, 0x4, "5ad3a0b2"}, 0x9, 0x0, @userptr=0x10001, 0x9}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) [ 599.198736] audit: type=1800 audit(1577548669.452:1666): pid=19454 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17362 res=0 15:57:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:50 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r7) mount$9p_xen(&(0x7f0000000080)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x8, &(0x7f0000000200)={'trans=xen,', {[{@afid={'afid', 0x3d, 0x9}}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@obj_user={'obj_user', 0x3d, 'memory.events\x00'}}, {@uid_eq={'uid', 0x3d, r5}}, {@subj_user={'subj_user', 0x3d, 'trustedselinuxtrusted'}}, {@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, 'nodev/-vboxnet0,em0@#):^wlan0vboxnet0posix_acl_access!@vboxnet1'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@fowner_eq={'fowner', 0x3d, r7}}]}}) r8 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 599.333740] device bridge_slave_1 left promiscuous mode [ 599.339272] bridge0: port 2(bridge_slave_1) entered disabled state 15:57:50 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x420, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000080)=@srh={0xff, 0xc, 0x4, 0x6, 0x6, 0x20, 0x1ff, [@mcast1, @remote, @local, @remote, @ipv4={[], [], @remote}, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}, 0x68) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 599.357742] audit: type=1804 audit(1577548669.492:1667): pid=19458 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/473/memory.events" dev="sda1" ino=17361 res=1 [ 599.464375] device bridge_slave_0 left promiscuous mode [ 599.469881] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.515156] audit: type=1800 audit(1577548669.532:1668): pid=19458 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17361 res=0 [ 599.556885] audit: type=1804 audit(1577548669.532:1669): pid=19433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/473/memory.events" dev="sda1" ino=17361 res=1 [ 599.729966] audit: type=1804 audit(1577548669.782:1670): pid=19476 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/474/memory.events" dev="sda1" ino=17441 res=1 [ 599.836680] device hsr_slave_1 left promiscuous mode [ 599.839285] audit: type=1800 audit(1577548669.782:1671): pid=19476 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17441 res=0 [ 599.908009] device hsr_slave_0 left promiscuous mode [ 599.957668] team0 (unregistering): Port device team_slave_1 removed [ 599.999059] team0 (unregistering): Port device team_slave_0 removed [ 600.038414] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 600.098684] bond0 (unregistering): Releasing backup interface bond_slave_0 15:57:51 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x0, 0x8, "9b7bead05e568bfc2040ef13a99e7fd7", "4cfadb14a0609b86c7f4338cd31c6475cd0085a3bbe56035f26535c9025ae7a829d959a0712ba998e3a765cb50ea3725d8eafdc605e11f35dc"}, 0x4e, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) pwrite64(r5, &(0x7f0000000180)="5c6a0cd934fd9f1016828079872850ed1c12360443176f06cd53514500f38c7176d0bdf3761bbaa9f1043e785f38f9739ec03b", 0x33, 0x3ff) sendfile(r4, r3, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r6, 0x2276, &(0x7f0000000100)) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000001c0)={0x6, 0xa40, 0x8202, 0x1, 0x3, 0x10001, 0x10000, 0x8, r9}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r9, 0x56, "a0aed5f5c81bcd5352ca6138ccdc57360c39db3a666e27ed25719bc28399a96fd81a101e59964d965d951d4501cec0f90e324263d32cae5bd4a78fb5a6ebe6a4c29eb848b046b2611683d27d0ccb6c749e6fd5d504af"}, &(0x7f0000000340)=0x5e) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000280)={r9, 0x3, 0x1, [0x1be]}, 0xa) r10 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r10, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 600.297117] bond0 (unregistering): Released all slaves 15:57:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:51 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r2, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) setsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000000)=0x8, 0x4) [ 602.088790] IPVS: ftp: loaded support on port[0] = 21 [ 602.153538] chnl_net:caif_netlink_parms(): no params data found [ 602.185063] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.191479] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.198574] device bridge_slave_0 entered promiscuous mode [ 602.206485] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.212974] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.219901] device bridge_slave_1 entered promiscuous mode [ 602.236176] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 602.245823] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 602.260982] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 602.268581] team0: Port device team_slave_0 added [ 602.274320] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 602.281470] team0: Port device team_slave_1 added [ 602.287237] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 602.294844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 602.355123] device hsr_slave_0 entered promiscuous mode [ 602.393239] device hsr_slave_1 entered promiscuous mode [ 602.433870] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 602.441029] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 602.455378] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.461846] bridge0: port 2(bridge_slave_1) entered forwarding state [ 602.468507] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.474876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 602.509792] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 602.516096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 602.525743] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 602.534936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 602.542168] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.550037] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.557506] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 602.568544] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 602.575826] 8021q: adding VLAN 0 to HW filter on device team0 [ 602.584973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 602.592529] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.598928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 602.609945] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 602.617705] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.624084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 602.642009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 602.649869] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 602.659426] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 602.671558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 602.681349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 602.694747] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 602.700754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 602.714654] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 602.721932] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 602.729457] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 602.739809] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 602.812972] protocol 88fb is buggy, dev hsr_slave_0 [ 602.818059] protocol 88fb is buggy, dev hsr_slave_1 [ 602.932959] protocol 88fb is buggy, dev hsr_slave_0 [ 602.938078] protocol 88fb is buggy, dev hsr_slave_1 15:57:53 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000109000/0x4000)=nil, 0x4000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:53 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x77b9dafd19ce61f0}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r3, 0xe}}, 0x10) r4 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r9}, 0x3c) 15:57:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:54 executing program 5: prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x1f) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfd, 0x2}, 0xc) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000080), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r9}, 0x3c) 15:57:54 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000200)={0x6, 0x7, 0x4, 0x20, 0x3f, {}, {0x4, 0x0, 0x1, 0x1, 0x2, 0x8, "fb312898"}, 0x8, 0xd7804e98538f6c3f, @fd=r4, 0x2, 0x0, r3}) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000001c0)={0x6, 0xa40, 0x8202, 0x1, 0x3, 0x10001, 0x10000, 0x8, r7}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={r7, 0x56, "a0aed5f5c81bcd5352ca6138ccdc57360c39db3a666e27ed25719bc28399a96fd81a101e59964d965d951d4501cec0f90e324263d32cae5bd4a78fb5a6ebe6a4c29eb848b046b2611683d27d0ccb6c749e6fd5d504af"}, &(0x7f0000000340)=0x5e) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={r7, 0x5}, &(0x7f0000000100)=0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:54 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0xa, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) readahead(r1, 0x8, 0x1439) getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000001080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) 15:57:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x9, 0x4, 0x100000001, 0x0, r9}, 0x3c) 15:57:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:54 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) r3 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 603.754600] kauditd_printk_skb: 15 callbacks suppressed [ 603.754619] audit: type=1804 audit(1577548674.602:1687): pid=19666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/479/memory.events" dev="sda1" ino=16721 res=1 15:57:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 603.867271] device bridge_slave_1 left promiscuous mode [ 603.907591] audit: type=1800 audit(1577548674.632:1688): pid=19666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16721 res=0 [ 603.917650] bridge0: port 2(bridge_slave_1) entered disabled state 15:57:54 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, &(0x7f0000000200)={@un=@file={0x0, './file0\x00'}, {&(0x7f0000000080)=""/32, 0x20}, &(0x7f0000000100), 0x1}, 0xa0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 604.069308] audit: type=1804 audit(1577548674.642:1689): pid=19666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/479/memory.events" dev="sda1" ino=16721 res=1 [ 604.163964] device bridge_slave_0 left promiscuous mode [ 604.170157] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.199674] audit: type=1804 audit(1577548674.662:1690): pid=19666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/479/memory.events" dev="sda1" ino=16721 res=1 [ 604.347339] audit: type=1804 audit(1577548674.912:1691): pid=19704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/480/memory.events" dev="sda1" ino=16802 res=1 [ 604.478708] audit: type=1800 audit(1577548674.912:1692): pid=19704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16802 res=0 [ 604.527865] device hsr_slave_1 left promiscuous mode [ 604.538046] audit: type=1804 audit(1577548674.912:1693): pid=19704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/480/memory.events" dev="sda1" ino=16802 res=1 [ 604.587828] device hsr_slave_0 left promiscuous mode [ 604.618154] audit: type=1804 audit(1577548675.082:1694): pid=19716 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/480/memory.events" dev="sda1" ino=16802 res=1 [ 604.657703] team0 (unregistering): Port device team_slave_1 removed [ 604.683403] team0 (unregistering): Port device team_slave_0 removed [ 604.709593] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 604.778215] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 604.840089] audit: type=1800 audit(1577548675.682:1695): pid=19704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16802 res=0 [ 604.885859] audit: type=1804 audit(1577548675.682:1696): pid=19704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/480/memory.events" dev="sda1" ino=16802 res=1 [ 604.947373] bond0 (unregistering): Released all slaves 15:57:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 606.399916] IPVS: ftp: loaded support on port[0] = 21 [ 606.464809] chnl_net:caif_netlink_parms(): no params data found [ 606.496001] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.502434] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.509757] device bridge_slave_0 entered promiscuous mode [ 606.516790] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.523292] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.530254] device bridge_slave_1 entered promiscuous mode [ 606.547755] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 606.557239] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 606.572947] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 606.580243] team0: Port device team_slave_0 added [ 606.585997] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 606.593553] team0: Port device team_slave_1 added [ 606.598939] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 606.606546] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 606.654805] device hsr_slave_0 entered promiscuous mode [ 606.693289] device hsr_slave_1 entered promiscuous mode [ 606.773579] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 606.780914] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 606.796658] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.803040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.809604] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.816014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.851299] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 606.857772] 8021q: adding VLAN 0 to HW filter on device bond0 [ 606.867691] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 606.877600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 606.884878] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.891509] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.898686] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 606.909510] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 606.915796] 8021q: adding VLAN 0 to HW filter on device team0 [ 606.924926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 606.932547] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.938941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.949508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 606.957214] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.963601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.985272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 606.993586] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 607.001211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 607.011358] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 607.022298] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 607.028470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 607.035788] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 607.045037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 607.059494] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 607.067969] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 607.075448] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 607.088766] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 607.152957] protocol 88fb is buggy, dev hsr_slave_0 [ 607.158085] protocol 88fb is buggy, dev hsr_slave_1 [ 607.242933] protocol 88fb is buggy, dev hsr_slave_0 [ 607.248050] protocol 88fb is buggy, dev hsr_slave_1 [ 607.282913] protocol 88fb is buggy, dev hsr_slave_0 [ 607.288048] protocol 88fb is buggy, dev hsr_slave_1 15:57:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) 15:57:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:58 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) socket(0x1e, 0x2, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) bind$tipc(r0, &(0x7f0000000040), 0x131) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r4 = accept(r3, &(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000000280)=0x80) getsockname$llc(r4, &(0x7f00000002c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000300)=0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r5, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='er.\x00\x00\x00\x00ry.events\x00'], &(0x7f0000000180)='memory.events\x00', 0xe, 0x7) sendfile(r5, r2, &(0x7f0000000040), 0x100000001) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) 15:57:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:58 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_pl\xeb\xdc\xba\x80', 0x2000, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000380)={0x3ff, 0x8f, 0x9, 0x1, 0x1, "c333f285f72b2991"}) sendmsg$tipc(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000200)="9b09a5594434c90904035e99ccbcec1d7cc3c3e7570f0ceccc5a7efbb46befe586a967a0372e492aef051f81bea60a6531b59b767357863374cceb97b35966f91f07b426b089c06e615ac9cf2003099a821983e1ce14d352aa2c57d64f63644d06e65dee25552a03bb97766c3c778c5df3f4d7a58166c55c98b4ba7434e05a6e9922339c842193fd020ecdce5b4394fb0aedc12e806dc3361a784f8fae6d25b412f7dc", 0xa3}], 0x1, &(0x7f0000000300)="86a60179470cce112bc0aab2641777a37933e04e5dc8548e72c410f1", 0x1c}, 0x44020) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r6, 0x2276, &(0x7f0000000100)) getsockopt$CAN_RAW_LOOPBACK(r6, 0x65, 0x3, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xd}, 0x28) 15:57:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 608.056497] device bridge_slave_1 left promiscuous mode [ 608.081994] bridge0: port 2(bridge_slave_1) entered disabled state 15:57:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:59 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) fsetxattr$smack_xattr_label(r4, &(0x7f0000000100)='security.SMACK64IPOUT\x00', &(0x7f0000000180), 0x1, 0x1) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:57:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 608.177884] device bridge_slave_0 left promiscuous mode [ 608.184731] bridge0: port 1(bridge_slave_0) entered disabled state 15:57:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 608.490966] device hsr_slave_1 left promiscuous mode [ 608.537653] device hsr_slave_0 left promiscuous mode [ 608.587078] team0 (unregistering): Port device team_slave_1 removed [ 608.615026] team0 (unregistering): Port device team_slave_0 removed [ 608.640879] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 608.688178] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 608.812698] bond0 (unregistering): Released all slaves 15:57:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:57:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 608.888662] kauditd_printk_skb: 13 callbacks suppressed [ 608.888677] audit: type=1800 audit(1577548679.732:1710): pid=19846 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16738 res=0 [ 609.034059] audit: type=1804 audit(1577548679.772:1711): pid=19846 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/483/memory.events" dev="sda1" ino=16738 res=1 [ 610.516148] IPVS: ftp: loaded support on port[0] = 21 [ 610.581745] chnl_net:caif_netlink_parms(): no params data found [ 610.615184] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.621663] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.628797] device bridge_slave_0 entered promiscuous mode [ 610.635922] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.642327] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.649524] device bridge_slave_1 entered promiscuous mode [ 610.666506] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 610.675699] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 610.694633] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 610.701865] team0: Port device team_slave_0 added [ 610.708124] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 610.715505] team0: Port device team_slave_1 added [ 610.720869] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 610.728529] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 610.795136] device hsr_slave_0 entered promiscuous mode [ 610.833231] device hsr_slave_1 entered promiscuous mode [ 610.873604] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 610.880839] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 610.894593] bridge0: port 2(bridge_slave_1) entered blocking state [ 610.900930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 610.907588] bridge0: port 1(bridge_slave_0) entered blocking state [ 610.913949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 610.949190] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 610.955539] 8021q: adding VLAN 0 to HW filter on device bond0 [ 610.963808] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 610.972141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 610.979577] bridge0: port 1(bridge_slave_0) entered disabled state [ 610.986594] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.993748] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 611.004536] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 611.010624] 8021q: adding VLAN 0 to HW filter on device team0 [ 611.019873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 611.027513] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.033906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 611.043254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 611.050810] bridge0: port 2(bridge_slave_1) entered blocking state [ 611.057195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 611.076183] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 611.084175] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 611.094601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 611.106134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 611.116557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 611.127243] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 611.133589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 611.148297] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 611.156072] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 611.162752] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 611.173698] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 611.243101] protocol 88fb is buggy, dev hsr_slave_0 [ 611.248227] protocol 88fb is buggy, dev hsr_slave_1 [ 611.362976] protocol 88fb is buggy, dev hsr_slave_0 [ 611.368130] protocol 88fb is buggy, dev hsr_slave_1 15:58:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:58:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:02 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x4000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r4, &(0x7f0000000300)={0x6c, 0x7d, 0x2, {{0x0, 0x57, 0x1000, 0x6, {0x89, 0x4, 0x7}, 0x6000000, 0xdf, 0x8, 0x200, 0xf, 'keyringvboxnet1', 0xd, 'trusted./ppp0', 0x0, '', 0x8, 'bdevem1('}, 0x0, '', r5, r6, 0xee01}}, 0x6c) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r7 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 611.501431] audit: type=1804 audit(1577548682.342:1712): pid=19929 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/484/memory.events" dev="sda1" ino=17489 res=1 [ 611.538315] audit: type=1800 audit(1577548682.382:1713): pid=19929 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17489 res=0 15:58:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:58:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 611.688375] audit: type=1804 audit(1577548682.382:1714): pid=19929 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/484/memory.events" dev="sda1" ino=17489 res=1 [ 611.776499] audit: type=1804 audit(1577548682.472:1715): pid=19945 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/484/memory.events" dev="sda1" ino=17489 res=1 15:58:02 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x109000, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000180)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) write$P9_RWALK(r1, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) fallocate(r1, 0x0, 0x0, 0x1) bind$tipc(r0, &(0x7f0000000040), 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.event\x02\x00g\xf5\'\xd3\xa7\xd8\x82M\xe1\xd2\xa96`[\x1c\x82\x86\x9dp\xf5\xf7$\nY\xb3\\{ r\xc1\xd2\x12\xc3\xac-\x1c\xe2%\xaeB\x12mQ!,;J.\x0e\\|u\xdf\xee\xabK\x96w3\xe4\xb1\xb8\x8d\xe5\xa7\xb9\x0eB\xcf\xfe\xcb~\xda|\xb6\x92:\x1c}\xb8\xa3\x0e\xacA\xec\xe8\x00\xd8\xc5\xa3\xbb', 0xb00000000065808, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000140), 0xfffffe80) sendfile(r5, r4, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r5, r4, &(0x7f0000000040), 0x100000001) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r6, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$KVM_S390_VCPU_FAULT(r3, 0x4008ae52, &(0x7f0000000080)=0x10000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:58:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:03 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000200)={0x0, "3b49567de7f8789f521e35b9c73dcbc18789ed7480005204afaed28a71c325c3", 0x20, 0x244, 0x4, 0x10, 0x1}) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x40010, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000040), 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000140), 0xfffffe80) sendfile(r4, r3, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) 15:58:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 612.295049] device bridge_slave_1 left promiscuous mode [ 612.300590] bridge0: port 2(bridge_slave_1) entered disabled state 15:58:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) [ 612.394431] device bridge_slave_0 left promiscuous mode [ 612.408356] bridge0: port 1(bridge_slave_0) entered disabled state 15:58:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) 15:58:03 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x4000000000014, &(0x7f0000000100)) wait4(r4, &(0x7f0000000180), 0x1000000, &(0x7f0000000200)) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x224600, 0x0) write$P9_RWALK(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="230000006f0200020002030000000800000000000000220400000008000000000000002337e6cd56f822500424e39b6c87e28c3db25147ae5f84fc1b9c57bcd68f839b168b17e139d5582277ffe7e3d2af8fc8367dc4346bf76f9fb2c93cef25a9056924436582bf1272f54e95a3b96c93e35e17f499f9f6b11a7b5e4c9f24eda969eaff87d5ac44dffe432729367e2da58751803e0cfa390654cbf18dd29b2d117ab3045349c54252e6cf6a13ffc4a913e3f5b1d4013200e7d34b3b640dde33ac9ac50973fc"], 0x23) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000100)=0x14) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 612.704099] audit: type=1804 audit(1577548683.552:1716): pid=20041 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/487/memory.events" dev="sda1" ino=17505 res=1 [ 612.838103] device hsr_slave_1 left promiscuous mode [ 612.856572] audit: type=1800 audit(1577548683.552:1717): pid=20041 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17505 res=0 [ 612.897665] device hsr_slave_0 left promiscuous mode [ 612.932339] audit: type=1804 audit(1577548683.552:1718): pid=20041 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/487/memory.events" dev="sda1" ino=17505 res=1 [ 612.981527] team0 (unregistering): Port device team_slave_1 removed [ 613.022177] team0 (unregistering): Port device team_slave_0 removed [ 613.038987] audit: type=1804 audit(1577548683.622:1719): pid=20048 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/487/memory.events" dev="sda1" ino=17505 res=1 [ 613.074121] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 613.112431] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 613.266741] bond0 (unregistering): Released all slaves [ 614.633550] IPVS: ftp: loaded support on port[0] = 21 [ 614.698131] chnl_net:caif_netlink_parms(): no params data found [ 614.732443] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.738989] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.745970] device bridge_slave_0 entered promiscuous mode [ 614.752976] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.759653] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.767132] device bridge_slave_1 entered promiscuous mode [ 614.784041] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 614.793257] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 614.811282] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 614.818902] team0: Port device team_slave_0 added [ 614.824569] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 614.831731] team0: Port device team_slave_1 added [ 614.837488] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 614.845414] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 614.894709] device hsr_slave_0 entered promiscuous mode [ 614.933142] device hsr_slave_1 entered promiscuous mode [ 614.993619] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 615.000744] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 615.014714] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.021066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 615.027744] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.034141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.070233] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 615.076979] 8021q: adding VLAN 0 to HW filter on device bond0 [ 615.086720] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 615.095601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 615.103290] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.109988] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.117483] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 615.128008] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 615.134556] 8021q: adding VLAN 0 to HW filter on device team0 [ 615.143732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 615.151312] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.157710] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.174156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 615.181752] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.188146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 615.198484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 615.207043] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 615.217951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 615.228481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 615.241199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 615.250121] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 615.258195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 615.271377] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 615.279909] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 615.286913] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 615.298968] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 615.382939] protocol 88fb is buggy, dev hsr_slave_0 [ 615.388095] protocol 88fb is buggy, dev hsr_slave_1 15:58:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) 15:58:06 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0xdd339000) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="230000006f020002000203000000080000000000000022040000005024d74a3c23cedb"], 0x23) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200)=r4, 0x4) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r6, 0x2276, &(0x7f0000000100)) ioctl$IOC_PR_PREEMPT_ABORT(r6, 0x401870cc, &(0x7f0000000080)={0xfffffffffffffff7, 0x7, 0x2400000, 0x7}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000080)={'bond_slave_1\x00', {0x2, 0x4e20, @dev}}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) [ 615.631360] kauditd_printk_skb: 3 callbacks suppressed [ 615.631381] audit: type=1804 audit(1577548686.472:1723): pid=20083 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/488/memory.events" dev="sda1" ino=17553 res=1 15:58:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) 15:58:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) [ 615.817758] audit: type=1800 audit(1577548686.472:1724): pid=20083 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17553 res=0 15:58:06 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r2, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 615.938399] audit: type=1804 audit(1577548686.472:1725): pid=20083 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/488/memory.events" dev="sda1" ino=17553 res=1 15:58:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socket(0x400020000000010, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) 15:58:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 616.123568] audit: type=1804 audit(1577548686.572:1726): pid=20100 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/488/memory.events" dev="sda1" ino=17553 res=1 15:58:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:07 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='R\x03\x10\x00\x00\x00\x00\x00\xf3', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r6, &(0x7f0000000080)='oom_score\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socket(0x400020000000010, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 616.384321] audit: type=1804 audit(1577548686.872:1727): pid=20124 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/489/memory.events" dev="sda1" ino=17569 res=1 15:58:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 616.503887] device bridge_slave_1 left promiscuous mode [ 616.509997] bridge0: port 2(bridge_slave_1) entered disabled state 15:58:07 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) write$cgroup_int(r3, &(0x7f0000000140)=0x400000c, 0x9) sendfile(r2, r1, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 616.556157] audit: type=1800 audit(1577548686.872:1728): pid=20124 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17569 res=0 [ 616.582013] device bridge_slave_0 left promiscuous mode [ 616.629407] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.705475] audit: type=1804 audit(1577548686.872:1729): pid=20124 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/489/memory.events" dev="sda1" ino=17569 res=1 15:58:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 616.814638] audit: type=1804 audit(1577548686.922:1730): pid=20124 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/489/memory.events" dev="sda1" ino=17569 res=1 15:58:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 616.893664] audit: type=1804 audit(1577548687.222:1731): pid=20154 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/490/memory.events" dev="sda1" ino=16774 res=1 [ 616.975621] device hsr_slave_1 left promiscuous mode [ 617.007537] audit: type=1800 audit(1577548687.272:1732): pid=20154 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16774 res=0 [ 617.040557] device hsr_slave_0 left promiscuous mode 15:58:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 617.078147] team0 (unregistering): Port device team_slave_1 removed [ 617.125418] team0 (unregistering): Port device team_slave_0 removed [ 617.161232] bond0 (unregistering): Releasing backup interface bond_slave_1 15:58:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 617.239802] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 617.466613] bond0 (unregistering): Released all slaves [ 618.823222] IPVS: ftp: loaded support on port[0] = 21 [ 618.888477] chnl_net:caif_netlink_parms(): no params data found [ 618.920491] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.927058] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.934448] device bridge_slave_0 entered promiscuous mode [ 618.941894] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.948423] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.955465] device bridge_slave_1 entered promiscuous mode [ 618.973279] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 618.982303] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 619.001492] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 619.009330] team0: Port device team_slave_0 added [ 619.015189] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 619.022374] team0: Port device team_slave_1 added [ 619.028178] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 619.035695] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 619.106027] device hsr_slave_0 entered promiscuous mode [ 619.143263] device hsr_slave_1 entered promiscuous mode [ 619.183894] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 619.191036] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 619.207153] bridge0: port 2(bridge_slave_1) entered blocking state [ 619.213575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 619.220209] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.226603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 619.259344] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 619.265689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 619.274324] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 619.284651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 619.291731] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.298740] bridge0: port 2(bridge_slave_1) entered disabled state [ 619.305812] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 619.318416] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 619.324640] 8021q: adding VLAN 0 to HW filter on device team0 [ 619.334145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 619.341791] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.348202] bridge0: port 1(bridge_slave_0) entered forwarding state [ 619.358167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 619.366098] bridge0: port 2(bridge_slave_1) entered blocking state [ 619.372450] bridge0: port 2(bridge_slave_1) entered forwarding state [ 619.394345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 619.402168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 619.409968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 619.418058] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 619.428433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 619.440148] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 619.446546] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 619.461554] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 619.469246] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 619.476033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 619.490936] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 619.562908] protocol 88fb is buggy, dev hsr_slave_0 [ 619.568032] protocol 88fb is buggy, dev hsr_slave_1 [ 619.682944] protocol 88fb is buggy, dev hsr_slave_0 15:58:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) 15:58:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:10 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0xffffffff800) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r3, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) fcntl$getownex(r3, 0x10, &(0x7f0000000180)={0x0, 0x0}) r5 = getpid() tgkill(r4, r5, 0x41) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) r6 = socket$inet6(0xa, 0x80003, 0x80) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000080)={'ipddp0\x00', 0x8000}) ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f0000000100)=0x9) ioctl(r6, 0x1000008911, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) 15:58:10 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x2, 0x20a, 0x7f5a, 0x40}, &(0x7f0000000100)=0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a776972656c6573735f6465766963655f743a733020756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73302d73303a63302e6331303233203030303030303030303030303030303030303038202e2f62757300800d263082a5365edb0b4c91"], 0x70) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0xe8) ioctl$SIOCAX25GETUID(r3, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xc) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000140)=""/179, 0xb3) mkdir(0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') readv(r6, &(0x7f00000001c0)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x47, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') readv(r7, &(0x7f00000001c0)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000980)=ANY=[@ANYBLOB="00f42db8314513f25406fa3a55", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000200)={r9, 0x8}, 0x8) 15:58:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d}, 0x20}}, 0x0) 15:58:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:11 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r5 = creat(&(0x7f0000000080)='./file0\x00', 0x84) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000100)={0x7fffffff, 0xfffffff8, 0xffffed36, 0x2, 0x13, "24da5dd37e90db852f261e2e0d8d4b0520e07d"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockname$tipc(r0, 0x0, &(0x7f0000000400)) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a776972656c6573735f6465766963655f743a733020756e636f6e66696e65645f753a73797374656d5f723a696e736d6f645f743a73302d73303a63302e6331303233203030303030303030303030303030303030303038202e2f62757300800d263082a5365edb0b4c91"], 0x70) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000740)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f00000002c0)=0xe8) ioctl$SIOCAX25GETUID(r3, 0x89e0, &(0x7f00000009c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xc) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000200), 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000140)=""/179, 0xb3) mkdir(0x0, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') readv(r6, &(0x7f00000001c0)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./bus\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x47, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') readv(r7, &(0x7f00000001c0)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1) r8 = socket$inet6(0xa, 0x400000000001, 0x0) close(r8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000980)=ANY=[@ANYBLOB="00f42db8314513f25406fa3a55", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000200)={r9, 0x8}, 0x8) 15:58:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 620.603916] device bridge_slave_1 left promiscuous mode [ 620.619252] bridge0: port 2(bridge_slave_1) entered disabled state [ 620.701967] device bridge_slave_0 left promiscuous mode 15:58:11 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x120000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) [ 620.770639] bridge0: port 1(bridge_slave_0) entered disabled state [ 620.829777] kauditd_printk_skb: 21 callbacks suppressed [ 620.829794] audit: type=1804 audit(1577548691.672:1754): pid=20326 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/494/memory.events" dev="sda1" ino=16812 res=1 15:58:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 621.161137] device hsr_slave_1 left promiscuous mode [ 621.198383] device hsr_slave_0 left promiscuous mode [ 621.267520] team0 (unregistering): Port device team_slave_1 removed [ 621.311813] team0 (unregistering): Port device team_slave_0 removed [ 621.340138] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 621.375486] audit: type=1800 audit(1577548692.222:1755): pid=20315 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16812 res=0 [ 621.428602] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 621.451033] audit: type=1804 audit(1577548692.252:1756): pid=20315 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/494/memory.events" dev="sda1" ino=16812 res=1 [ 621.517421] audit: type=1804 audit(1577548692.252:1757): pid=20315 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/494/memory.events" dev="sda1" ino=16812 res=1 [ 621.652015] bond0 (unregistering): Released all slaves [ 623.043948] IPVS: ftp: loaded support on port[0] = 21 [ 623.108475] chnl_net:caif_netlink_parms(): no params data found [ 623.140012] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.146641] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.154061] device bridge_slave_0 entered promiscuous mode [ 623.160932] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.167524] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.174927] device bridge_slave_1 entered promiscuous mode [ 623.192254] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 623.201909] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 623.219952] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 623.227563] team0: Port device team_slave_0 added [ 623.233369] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 623.240584] team0: Port device team_slave_1 added [ 623.246165] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 623.253681] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 623.305954] device hsr_slave_0 entered promiscuous mode [ 623.373210] device hsr_slave_1 entered promiscuous mode [ 623.414636] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 623.421761] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 623.436761] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.443173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 623.449744] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.456149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 623.490297] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 623.496571] 8021q: adding VLAN 0 to HW filter on device bond0 [ 623.505314] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 623.515256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 623.522312] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.529148] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.536615] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 623.547280] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 623.553520] 8021q: adding VLAN 0 to HW filter on device team0 [ 623.562424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 623.570551] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.576950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 623.589436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 623.597341] bridge0: port 2(bridge_slave_1) entered blocking state [ 623.603719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 623.624298] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 623.632122] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 623.641348] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 623.650916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 623.662465] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 623.674155] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 623.680200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 623.687614] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 623.699807] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 623.709481] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 623.716704] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 623.727235] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 623.792961] protocol 88fb is buggy, dev hsr_slave_0 [ 623.798078] protocol 88fb is buggy, dev hsr_slave_1 15:58:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 15:58:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:14 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x120000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) 15:58:14 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0xef714a6d6c74719, {{0x96578c6c00ad9778, 0x3}}}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x20, r3, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x4}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800001}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="10dbdfa81ff0695de440a8000000080026000c0900000c000200080003000200000005050000040000001400020008000b000a00000008000d919c6c39b691f84f6a0cb6133bc3749c5ed0666e621f68c3ad29cd7ed11d644fea64000000000000db2ed6afe4c8a9be23"], 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000140), 0xfffffe80) sendfile(r6, r5, 0x0, 0xffffffff800) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r7, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) setsockopt$CAN_RAW_JOIN_FILTERS(r7, 0x65, 0x6, &(0x7f0000000080)=0x1, 0x4) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r6, r5, &(0x7f0000000040), 0x100000001) r8 = socket$inet6(0xa, 0x80003, 0x80) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240)=""/171, 0xffffffffffffffdf) ioctl(r8, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 623.920129] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 623.984345] audit: type=1804 audit(1577548694.832:1758): pid=20388 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/495/memory.events" dev="sda1" ino=17616 res=1 15:58:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 15:58:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:14 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 624.131866] audit: type=1800 audit(1577548694.862:1759): pid=20388 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17616 res=0 15:58:15 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040)=0x40000, 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:15 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x120000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r0, &(0x7f0000000900)={0x2c, 0x0, r2}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) 15:58:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) [ 624.268297] audit: type=1804 audit(1577548694.872:1760): pid=20388 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/495/memory.events" dev="sda1" ino=17616 res=1 15:58:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:15 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 624.476036] audit: type=1804 audit(1577548694.942:1761): pid=20408 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/495/memory.events" dev="sda1" ino=17616 res=1 [ 624.620828] audit: type=1804 audit(1577548695.232:1762): pid=20429 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/496/memory.events" dev="sda1" ino=16816 res=1 [ 624.721723] audit: type=1800 audit(1577548695.232:1763): pid=20429 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16816 res=0 15:58:15 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:15 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r0, 0x0) open(0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) read(r1, &(0x7f0000000080)=""/63, 0x3f) 15:58:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 624.834133] device bridge_slave_1 left promiscuous mode [ 624.839676] bridge0: port 2(bridge_slave_1) entered disabled state 15:58:15 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES32=0xee01, @ANYRES32=r3, @ANYRES32=0x0], 0xc) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@local, @in6=@ipv4={[], [], @remote}}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000300)=0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES32=0xee01, @ANYRES32=r7, @ANYRES32=0x0], 0xc) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) fstat(0xffffffffffffffff, &(0x7f0000000340)) r10 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r10, 0x2276, &(0x7f0000000100)) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) r11 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r11, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) statx(r11, &(0x7f0000000440)='./file0\x00', 0x6000, 0x400, &(0x7f0000000580)) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r13) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000680)={0x3f0, 0xffffffffffffffda, 0x6}, 0x3f0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x20a8130, r10, 0x0) r14 = socket(0x1e, 0x2, 0x0) bind$tipc(r14, &(0x7f0000000040), 0x10) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r15, &(0x7f0000000140), 0xfffffe80) sendfile(r17, r16, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r17, r16, &(0x7f0000000040), 0x100000001) r18 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r18, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 624.922938] protocol 88fb is buggy, dev hsr_slave_0 [ 624.928064] protocol 88fb is buggy, dev hsr_slave_1 [ 624.944149] device bridge_slave_0 left promiscuous mode [ 624.949796] bridge0: port 1(bridge_slave_0) entered disabled state 15:58:16 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:16 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x10, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0xffffffffffffffff) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x2, &(0x7f00000000c0), 0x2}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = getpid() preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0xfffffffffffffa1f) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0x30f) syz_open_dev$video4linux(0x0, 0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, r3, 0x100) rt_tgsigqueueinfo(r1, r0, 0x16, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000380)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f00000001c0)=0x8000) r5 = socket(0x1e, 0x2, 0x0) bind$tipc(r5, &(0x7f0000000040), 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) [ 625.242984] protocol 88fb is buggy, dev hsr_slave_0 [ 625.248147] protocol 88fb is buggy, dev hsr_slave_1 15:58:16 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 625.347766] device hsr_slave_1 left promiscuous mode [ 625.410259] device hsr_slave_0 left promiscuous mode [ 625.498019] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 625.499601] team0 (unregistering): Port device team_slave_1 removed [ 625.606689] team0 (unregistering): Port device team_slave_0 removed [ 625.633807] minix_free_inode: bit 1 already cleared [ 625.665585] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 625.718401] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 625.848521] bond0 (unregistering): Released all slaves [ 627.224996] IPVS: ftp: loaded support on port[0] = 21 [ 627.289815] chnl_net:caif_netlink_parms(): no params data found [ 627.322246] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.328987] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.336392] device bridge_slave_0 entered promiscuous mode [ 627.343821] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.350221] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.357425] device bridge_slave_1 entered promiscuous mode [ 627.375062] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 627.384764] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 627.401213] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 627.408764] team0: Port device team_slave_0 added [ 627.414824] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 627.422039] team0: Port device team_slave_1 added [ 627.427677] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 627.435259] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 627.514793] device hsr_slave_0 entered promiscuous mode [ 627.553181] device hsr_slave_1 entered promiscuous mode [ 627.623923] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 627.631079] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 627.646516] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.652933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 627.659508] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.665906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 627.699890] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 627.706566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 627.716749] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 627.726036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 627.734412] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.741208] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.748458] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 627.758671] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 627.765499] 8021q: adding VLAN 0 to HW filter on device team0 [ 627.774649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 627.782224] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.788636] bridge0: port 1(bridge_slave_0) entered forwarding state [ 627.799460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 627.807310] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.813718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 627.828944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 627.837099] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 627.846790] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 627.862503] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 627.872762] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 627.883665] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 627.890104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 627.897895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 627.906324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 627.919765] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 627.927717] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 627.934628] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 627.947922] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 628.002917] protocol 88fb is buggy, dev hsr_slave_0 [ 628.008052] protocol 88fb is buggy, dev hsr_slave_1 15:58:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) socket$packet(0x11, 0x3, 0x300) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 15:58:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:18 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:18 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000240)={0x800, 0x2, 0x4, 0x4, 0x8, {0x77359400}, {0x3, 0x1, 0xff, 0x6, 0x20, 0x1a, "86a83893"}, 0x5, 0x0, @userptr=0xa49, 0x8000, 0x0, 0xffffffffffffffff}) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230000006f02000200020300000008000000000000002204000000080000001a0000006c5f60ef85699a3880dbec3c67e5920b98d0f83a8fb4eeceff8894a7637f7d75eed8a9ed6d3fb287fb904d82b59ca5036451431739159180f058e2d0b2607907b6747e7e925bb373b6c3f64697477ba5"], 0x23) r5 = openat$cgroup_ro(r4, &(0x7f0000000080)='cpu.stat\x00', 0xb00000000065808, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000140), 0xfffffe80) sendfile(r6, r5, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r6, r5, &(0x7f0000000040), 0x100000001) iopl(0xc9) r7 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r7, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffe) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) shutdown(r1, 0x2) r2 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {&(0x7f0000001900)=""/220, 0xdc}, {&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f00000005c0)=""/156, 0x9c}, {&(0x7f0000000680)=""/102, 0x66}, {&(0x7f0000000700)=""/216, 0xd8}], 0x6}, 0x0) 15:58:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:19 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000200)={0xa00000, 0x1, 0x100, r0, 0x0, &(0x7f0000000180)={0x9c0902, 0x5, [], @p_u16=&(0x7f0000000100)=0xff}}) r4 = openat$cgroup_ro(r3, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r4, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r2, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:19 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ftruncate(0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x4, 0x0, 0x0, 0x10000000002) 15:58:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) socket$packet(0x11, 0x3, 0x300) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) [ 628.374729] kauditd_printk_skb: 8 callbacks suppressed [ 628.374746] audit: type=1804 audit(1577548699.222:1772): pid=20566 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/500/memory.events" dev="sda1" ino=17647 res=1 15:58:19 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x11, 0xffffffffffffffff, 0xa0128000) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r1, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='pids.current\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000140), 0xfffffe80) sendfile(r4, r3, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 15:58:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:19 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 628.598291] audit: type=1800 audit(1577548699.222:1773): pid=20566 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17647 res=0 15:58:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) socket$packet(0x11, 0x3, 0x300) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r6}}, 0x20}}, 0x0) 15:58:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) socket(0x400020000000010, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 628.763990] audit: type=1804 audit(1577548699.222:1774): pid=20566 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/500/memory.events" dev="sda1" ino=17647 res=1 15:58:19 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) bind$ax25(r4, &(0x7f0000000200)={{0x3, @default, 0x106}, [@default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x40) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00s\x89\x0f\xe6\xfc,\x06\xd8\x81\xcc\x18$\bl`\x11$\x97\x8a\x8b', 0x7a05, 0x1700) 15:58:19 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 629.193312] audit: type=1804 audit(1577548700.032:1775): pid=20613 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/502/memory.events" dev="sda1" ino=16863 res=1 [ 629.348856] device bridge_slave_1 left promiscuous mode [ 629.416811] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.433372] audit: type=1800 audit(1577548700.042:1776): pid=20613 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16863 res=0 [ 629.463051] audit: type=1804 audit(1577548700.042:1777): pid=20613 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/502/memory.events" dev="sda1" ino=16863 res=1 [ 629.512027] audit: type=1804 audit(1577548700.192:1778): pid=20624 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/502/memory.events" dev="sda1" ino=16863 res=1 15:58:20 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000040), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000200)={0x1, "35338dc6b6ba3c1413d4a391417099304f5ab2be3a3a924bdc6bd045d589b3da", 0x1040, 0x3, 0x1, 0x8, 0x3}) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 629.548118] audit: type=1804 audit(1577548700.242:1780): pid=20624 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/502/memory.events" dev="sda1" ino=16863 res=1 15:58:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 629.635288] device bridge_slave_0 left promiscuous mode [ 629.640819] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.688840] audit: type=1800 audit(1577548700.232:1779): pid=20613 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16863 res=0 15:58:20 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000002c0)=0xfffffffffffffdb9) ioctl$GIO_UNIMAP(r0, 0x560a, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) 15:58:20 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 629.767057] audit: type=1804 audit(1577548700.612:1781): pid=20639 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/503/memory.events" dev="sda1" ino=17637 res=1 15:58:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:20 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x7, 0xff, 0x0, 0x0, 0x7, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x96, 0x0, @perf_config_ext, 0xa448, 0x7, 0x80000000, 0x0, 0x0, 0x400004, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, 0x0, 0xfffffd21) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x5a8) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)=0x6) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000340)={0x0, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0x2561, &(0x7f00000002c0)='irlan0\x00', 0x81, 0xbef0, 0x2}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x88802, 0x0) 15:58:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 630.050312] device hsr_slave_1 left promiscuous mode [ 630.136160] device hsr_slave_0 left promiscuous mode [ 630.179366] team0 (unregistering): Port device team_slave_1 removed [ 630.218338] team0 (unregistering): Port device team_slave_0 removed [ 630.256730] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 630.328167] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 630.467018] bond0 (unregistering): Released all slaves [ 631.863399] IPVS: ftp: loaded support on port[0] = 21 [ 631.928638] chnl_net:caif_netlink_parms(): no params data found [ 631.960695] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.967224] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.974715] device bridge_slave_0 entered promiscuous mode [ 631.981681] bridge0: port 2(bridge_slave_1) entered blocking state [ 631.988150] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.995155] device bridge_slave_1 entered promiscuous mode [ 632.013798] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 632.022747] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 632.041301] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 632.048931] team0: Port device team_slave_0 added [ 632.054566] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 632.061732] team0: Port device team_slave_1 added [ 632.067531] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 632.075003] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 632.126194] device hsr_slave_0 entered promiscuous mode [ 632.173144] device hsr_slave_1 entered promiscuous mode [ 632.243982] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 632.251091] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 632.265533] bridge0: port 2(bridge_slave_1) entered blocking state [ 632.271890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 632.278539] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.284937] bridge0: port 1(bridge_slave_0) entered forwarding state [ 632.319762] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 632.328011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 632.336414] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 632.346441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 632.353746] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.360378] bridge0: port 2(bridge_slave_1) entered disabled state [ 632.367839] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 632.378175] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 632.384589] 8021q: adding VLAN 0 to HW filter on device team0 [ 632.393745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 632.401290] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.407669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 632.424586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 632.432155] bridge0: port 2(bridge_slave_1) entered blocking state [ 632.438533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 632.458485] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 632.468703] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 632.479915] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 632.487000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 632.495373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 632.503275] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 632.510769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 632.518331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 632.525611] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 632.540475] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 632.548589] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 632.555700] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 632.568286] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 632.612940] protocol 88fb is buggy, dev hsr_slave_0 [ 632.618080] protocol 88fb is buggy, dev hsr_slave_1 15:58:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 15:58:23 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:23 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x2}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r3, r2, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r2, &(0x7f0000000180), 0x100000001) r4 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r4, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_timeval(r5, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r5, &(0x7f0000000000)={0x1a, 0x10e, 0x0, 0x200003, 0x7ff}, 0xffffffffffffffce) fsetxattr$trusted_overlay_opaque(r5, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) 15:58:23 executing program 0: 15:58:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:23 executing program 0: 15:58:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 15:58:23 executing program 0: 15:58:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:23 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:23 executing program 0: 15:58:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) getsockname$packet(r5, &(0x7f00000003c0), &(0x7f0000000400)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 15:58:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 633.484450] device bridge_slave_1 left promiscuous mode [ 633.489954] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.554021] device bridge_slave_0 left promiscuous mode [ 633.560818] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.561409] kauditd_printk_skb: 10 callbacks suppressed [ 633.561426] audit: type=1804 audit(1577548704.382:1792): pid=20710 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/504/memory.events" dev="sda1" ino=16993 res=1 [ 633.607272] audit: type=1800 audit(1577548704.452:1793): pid=20710 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16993 res=0 15:58:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:24 executing program 0: 15:58:24 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:24 executing program 0: 15:58:24 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000040), 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r2, 0x2276, &(0x7f0000000100)) sendmsg(r2, &(0x7f0000000180)={&(0x7f0000000380)=@nfc_llcp={0x27, 0x1, 0x2, 0x5, 0x40, 0x1, "bcf44f9f917cdf6010f14b02e60056e1eca89ec287e165799819cb8f0479d9887ce98bc74a3d446ffa9340dbe7f4a88b5018daf22d800c8245e716d790dc67", 0xe}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)="c263528c99822b3485b6e645a272d4df9a30390b37176c160a191b51340260bbc6e591e8976accffa1c8f7ff2638e59326e9b01482072821c872e35558561b5a5964bde713a62c015e8ee7c9590dfe78c2a94e1f4252375f178ea643917b9a4278339a4c3b588dbbe34c62502d13fd964589e19e19167f598915e39441b9b6a92bbf1e8d27581be83e99b85cdfe0550c5955b3b5a3bb5ffb128f62bc7434686f34f7a240e6ce47feae45ec73aabfea1cad639b67df74de", 0xb7}], 0x1, &(0x7f0000000580)=[{0x20, 0x10b, 0x1, "a0a90cb60ad0d3ca59f0b64df0bf29"}, {0xa8, 0x107, 0x1000, "ee91637c0b8a795091b45e7156cfc6371125a77db1c9002f278aaa69c0ed5edd87d292afd82fceee9fc4ac30437ce51750184a6a68628f5c103e5ed39163a02c933695373b7fdf40a689e79e980d9ee1d4a4e198c5023ef2edbb955f89e9e1d4060cb5ca9d415a818546925ad2456ce3a26d1ab1c726d5dc43da39337a4cb44da9b36cccd436cbdd2a8354fe0fd5aad869763fb58cfd"}, {0xd0, 0x119, 0x584, "77626cfda7467e332f258ea3de7d6eab04b414db7f8aa3fb780ff4c29db15e501e40f6f3baf096b0a128878f0a6fd864c8a494340b15fe9fe345fcf637425f081d9c30146e7583c69309eb8867696ae62b26dd84fe082dfb063ac3f2fde66a51f33b734d5b5c06030c62250820bd7e4ab350460334905afffd58619311b81fc2d1c5b4a67ecc20568a3b28bde6b032facc3eebc23d3f562910a48cd76353fe4ac04a4e38fbd3c640390afbbaf7233b0f11c3fcc9cc6dd424e207"}, {0xf0, 0x108, 0x80000000, "e9166c0c2fc9ebde9c923273d85158ceccfb3ce5d424a506bfa64a4a510961f9c17ed6ec2193e7d9ed7804eba3e1e7439ea5331135669f4f07284df6caea4c4c8c52e51a946cc7fa035c3d7e8a8dc51a29d38b8641e8fc433a56bfaae1153a0d726d54850e6d8446ff7e937178550b4896d9411dc3c9083e0a24a02032501857784fcdf642923cc023fe22341c8a9e845818074dbf94b32788f80e8341c5c297c189dbe790cf4c539a20f4ae9b6e60eabec27840cb953c185fbe31819844b27a7ccda9bc437e40745386a245a37254d2e75f46b67c356c273d419a764aa2cd"}], 0x288}, 0x2004c0e1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000140), 0xfffffe80) sendfile(r4, r3, 0x0, 0xffffffff800) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r3, &(0x7f0000000040), 0x100000001) r5 = socket$inet6(0xa, 0x3, 0x80) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="230000006f0200020002030000000800000000e2ffff21040200000800000000f60400"], 0x23) recvfrom$unix(r6, &(0x7f0000000200)=""/197, 0xc5, 0xc0000003, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e20}, 0x6e) [ 633.835276] audit: type=1804 audit(1577548704.682:1794): pid=20779 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/505/memory.events" dev="sda1" ino=17041 res=1 [ 633.865998] device hsr_slave_1 left promiscuous mode 15:58:24 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:24 executing program 0: [ 633.962402] device hsr_slave_0 left promiscuous mode 15:58:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 634.042547] team0 (unregistering): Port device team_slave_1 removed [ 634.044144] audit: type=1800 audit(1577548704.732:1795): pid=20779 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17041 res=0 15:58:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 634.116189] team0 (unregistering): Port device team_slave_0 removed [ 634.196245] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 634.203705] audit: type=1804 audit(1577548704.732:1796): pid=20783 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/505/memory.events" dev="sda1" ino=17041 res=1 [ 634.269409] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 634.290322] audit: type=1804 audit(1577548704.852:1797): pid=20788 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/505/memory.events" dev="sda1" ino=17041 res=1 [ 634.581754] bond0 (unregistering): Released all slaves [ 634.614888] audit: type=1800 audit(1577548705.462:1798): pid=20779 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=17041 res=0 [ 634.673858] audit: type=1804 audit(1577548705.492:1799): pid=20779 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/505/memory.events" dev="sda1" ino=17041 res=1 [ 634.752218] audit: type=1804 audit(1577548705.492:1800): pid=20815 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir685341949/syzkaller.9PnnK5/505/memory.events" dev="sda1" ino=17041 res=1 [ 635.941306] IPVS: ftp: loaded support on port[0] = 21 [ 636.018018] chnl_net:caif_netlink_parms(): no params data found [ 636.049672] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.056157] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.063464] device bridge_slave_0 entered promiscuous mode [ 636.070365] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.076861] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.083874] device bridge_slave_1 entered promiscuous mode [ 636.102200] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 636.111653] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 636.130181] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 636.137876] team0: Port device team_slave_0 added [ 636.144683] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 636.151870] team0: Port device team_slave_1 added [ 636.157482] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 636.164974] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 636.216094] device hsr_slave_0 entered promiscuous mode [ 636.253274] device hsr_slave_1 entered promiscuous mode [ 636.293886] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 636.301031] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 636.317118] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.323517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 636.330160] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.336589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 636.369300] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 636.375516] 8021q: adding VLAN 0 to HW filter on device bond0 [ 636.384103] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 636.392700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 636.400312] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.408148] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.415715] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 636.428915] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 636.435199] 8021q: adding VLAN 0 to HW filter on device team0 [ 636.444700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 636.452272] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.458670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 636.469859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 636.477627] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.484014] bridge0: port 2(bridge_slave_1) entered forwarding state [ 636.500655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 636.513988] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 636.521086] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 636.535821] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 636.545722] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 636.557136] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 636.564069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 636.571753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 636.582427] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 636.596559] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 636.604689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 636.611348] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 636.624582] 8021q: adding VLAN 0 to HW filter on device batadv0 15:58:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) 15:58:27 executing program 0: 15:58:27 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:27 executing program 3: 15:58:27 executing program 0: 15:58:27 executing program 3: 15:58:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) 15:58:27 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:27 executing program 3: 15:58:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r2, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:27 executing program 0: 15:58:27 executing program 3: 15:58:27 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) write$P9_RWALK(r5, &(0x7f0000000200)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x3, 0x8}, {0x22, 0x4, 0x8}]}}, 0x23) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r8}}, 0x20}}, 0x0) 15:58:28 executing program 0: 15:58:28 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:28 executing program 3: 15:58:28 executing program 3: 15:58:28 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r1 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r3 = socket(0x400020000000010, 0x2, 0x0) write(r3, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r4, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:28 executing program 0: 15:58:28 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 637.614003] device bridge_slave_1 left promiscuous mode [ 637.619546] bridge0: port 2(bridge_slave_1) entered disabled state 15:58:28 executing program 3: [ 637.679217] device bridge_slave_0 left promiscuous mode [ 637.685380] bridge0: port 1(bridge_slave_0) entered disabled state 15:58:28 executing program 0: 15:58:28 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 637.989332] device hsr_slave_1 left promiscuous mode [ 638.061022] device hsr_slave_0 left promiscuous mode [ 638.107831] team0 (unregistering): Port device team_slave_1 removed [ 638.142196] team0 (unregistering): Port device team_slave_0 removed [ 638.179540] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 638.238273] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 638.376747] bond0 (unregistering): Released all slaves [ 639.619824] IPVS: ftp: loaded support on port[0] = 21 [ 639.697834] chnl_net:caif_netlink_parms(): no params data found [ 639.729485] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.736096] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.743315] device bridge_slave_0 entered promiscuous mode [ 639.750127] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.756786] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.764301] device bridge_slave_1 entered promiscuous mode [ 639.781357] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 639.790875] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 639.807160] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 639.814986] team0: Port device team_slave_0 added [ 639.820609] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 639.828033] team0: Port device team_slave_1 added [ 639.833818] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 639.841254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 639.894795] device hsr_slave_0 entered promiscuous mode [ 639.933150] device hsr_slave_1 entered promiscuous mode [ 639.993778] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 640.000999] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 640.017302] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.023690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 640.030307] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.036714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 640.070051] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 640.076842] 8021q: adding VLAN 0 to HW filter on device bond0 [ 640.086844] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 640.097412] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 640.103917] 8021q: adding VLAN 0 to HW filter on device team0 [ 640.110001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 640.117229] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.124014] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.130933] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 640.142056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 640.150431] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.156823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 640.174756] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 640.182380] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.188777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 640.196462] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 640.205406] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 640.216313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 640.227151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 640.238700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 640.248248] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 640.255936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 640.269979] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 640.278047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 640.284787] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 640.298014] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 640.362925] protocol 88fb is buggy, dev hsr_slave_0 [ 640.368011] protocol 88fb is buggy, dev hsr_slave_1 15:58:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 15:58:31 executing program 2: socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x400020000000010, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:31 executing program 3: 15:58:31 executing program 0: 15:58:31 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e845"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:31 executing program 3: 15:58:31 executing program 0: 15:58:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 15:58:31 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e845"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:31 executing program 2: socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x0, 0x2, 0x0) socket(0x400020000000010, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) close(r0) 15:58:31 executing program 0: r0 = socket$inet(0x10, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000001c0)=0x40) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x202000, 0x0) sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000000780)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x46000000}, 0xc, &(0x7f0000000500)={&(0x7f00000009c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x847a2ddf1ee9a87}, 0x84) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x60, r2, 0x200, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x48001}, 0x800) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x3, 0x300) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r8}}, 0x20}}, 0x0) 15:58:31 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e845"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4000000000014, &(0x7f0000000100)) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfdd, 0x10080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8c1, 0x0, 0x3ff, 0x0, 0x2}, r1, 0x400000007, 0xffffffffffffffff, 0x2) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000004c0)='\x161\xe9\x00\x00\x00\x00\x00 \x10\x00\x00\xe0\xacU\xd3', 0x2000, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="24000000580001000000f4f9002304000a04f511080001000201009f0800028001000000", 0x24) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x220600, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) 15:58:31 executing program 2: socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x0, 0x0, 0x0) socket(0x400020000000010, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000040)={0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0xfd, 0x0, 0x9}) 15:58:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:32 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:32 executing program 2: socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:32 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 641.562946] protocol 88fb is buggy, dev hsr_slave_0 [ 641.568067] protocol 88fb is buggy, dev hsr_slave_1 15:58:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket(0x400020000000010, 0x2, 0x0) write(r1, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f00000007030100010039", 0x1f) r2 = socket(0x400020000000010, 0x2, 0x0) write(r2, &(0x7f0000000080)="1f0000005e000d0000000000fc07ff1b070404000f000000", 0x18) socketpair$unix(0x1, 0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:32 executing program 1: socket$inet(0x2, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 15:58:32 executing program 2: socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 642.588734] ------------[ cut here ]------------ [ 642.596234] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 642.606746] WARNING: CPU: 1 PID: 20989 at lib/debugobjects.c:325 debug_print_object+0x168/0x250 [ 642.615590] Kernel panic - not syncing: panic_on_warn set ... [ 642.615590] [ 642.622976] CPU: 1 PID: 20989 Comm: syz-executor.0 Not tainted 4.19.91-syzkaller #0 [ 642.630773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.640127] Call Trace: [ 642.642731] dump_stack+0x197/0x210 [ 642.646370] panic+0x26a/0x50e [ 642.649574] ? __warn_printk+0xf3/0xf3 [ 642.653471] ? debug_print_object+0x168/0x250 [ 642.657968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.663512] ? __warn.cold+0x5/0x53 [ 642.667151] ? debug_print_object+0x168/0x250 [ 642.671654] __warn.cold+0x20/0x53 [ 642.675204] ? debug_print_object+0x168/0x250 [ 642.679710] report_bug+0x263/0x2b0 [ 642.683437] do_error_trap+0x204/0x360 [ 642.687339] ? math_error+0x340/0x340 [ 642.691147] ? vprintk_emit+0x1ce/0x6d0 [ 642.695127] ? error_entry+0x7c/0xe0 [ 642.698865] ? trace_hardirqs_off_caller+0x65/0x220 [ 642.703890] ? vprintk_default+0x28/0x30 [ 642.707969] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 642.712824] do_invalid_op+0x1b/0x20 [ 642.716546] invalid_op+0x14/0x20 [ 642.720005] RIP: 0010:debug_print_object+0x168/0x250 [ 642.725113] Code: dd e0 63 ea 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd e0 63 ea 87 48 c7 c7 20 59 ea 87 e8 a6 46 dc fd <0f> 0b 83 05 ab 96 6a 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 642.744038] RSP: 0018:ffff88804debf490 EFLAGS: 00010082 [ 642.749416] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 642.756694] RDX: 0000000000040000 RSI: ffffffff8155bb16 RDI: ffffed1009bd7e84 [ 642.763973] RBP: ffff88804debf4d0 R08: ffff8880869d0340 R09: ffffed1015d23ee3 [ 642.771255] R10: ffffed1015d23ee2 R11: ffff8880ae91f717 R12: 0000000000000001 [ 642.778531] R13: ffffffff88fa43a0 R14: ffffffff815b30d0 R15: ffff88808efb97e0 [ 642.785821] ? __internal_add_timer+0x1f0/0x1f0 [ 642.790512] ? vprintk_func+0x86/0x189 [ 642.794411] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 642.799528] debug_check_no_obj_freed+0x29f/0x464 [ 642.804399] kfree+0xbd/0x220 [ 642.807523] kvfree+0x61/0x70 [ 642.810639] netdev_freemem+0x4c/0x60 [ 642.814435] netdev_release+0x86/0xb0 [ 642.818224] ? xps_cpus_store+0x2b0/0x2b0 [ 642.822359] device_release+0x7b/0x210 [ 642.826236] kobject_put.cold+0x289/0x2e6 [ 642.830373] netdev_run_todo+0x53b/0x7a0 [ 642.834425] ? register_netdev+0x50/0x50 [ 642.838481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.844014] ? rtnl_link_get_net_capable.constprop.0+0x230/0x230 [ 642.850149] rtnetlink_rcv_msg+0x46f/0xb00 [ 642.854374] ? rtnetlink_put_metrics+0x560/0x560 [ 642.859123] ? _raw_spin_unlock_irqrestore+0x95/0xe0 [ 642.864218] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 642.869310] ? netlink_deliver_tap+0x22d/0xc20 [ 642.873880] ? find_held_lock+0x35/0x130 [ 642.877931] netlink_rcv_skb+0x17d/0x460 [ 642.881982] ? rtnetlink_put_metrics+0x560/0x560 [ 642.886728] ? netlink_ack+0xb30/0xb30 [ 642.890610] ? netlink_deliver_tap+0x254/0xc20 [ 642.895180] rtnetlink_rcv+0x1d/0x30 [ 642.898895] netlink_unicast+0x53a/0x730 [ 642.902950] ? netlink_attachskb+0x770/0x770 [ 642.907347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.912872] netlink_sendmsg+0x8ae/0xd70 [ 642.916925] ? netlink_unicast+0x730/0x730 [ 642.921150] ? selinux_socket_sendmsg+0x36/0x40 [ 642.925806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.931447] ? security_socket_sendmsg+0x8d/0xc0 [ 642.936206] ? netlink_unicast+0x730/0x730 [ 642.940454] sock_sendmsg+0xd7/0x130 [ 642.944176] ___sys_sendmsg+0x803/0x920 [ 642.948168] ? copy_msghdr_from_user+0x430/0x430 [ 642.952928] ? lock_downgrade+0x880/0x880 [ 642.957073] ? kasan_check_read+0x11/0x20 [ 642.961228] ? __fget+0x367/0x540 [ 642.964680] ? iterate_fd+0x360/0x360 [ 642.968500] ? lock_downgrade+0x880/0x880 [ 642.972641] ? __fget_light+0x1a9/0x230 [ 642.976603] ? __fdget+0x1b/0x20 [ 642.979961] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 642.985493] __sys_sendmsg+0x105/0x1d0 [ 642.989374] ? __ia32_sys_shutdown+0x80/0x80 [ 642.993783] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 642.998524] ? do_syscall_64+0x26/0x620 [ 643.002488] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.007839] ? do_syscall_64+0x26/0x620 [ 643.011816] __x64_sys_sendmsg+0x78/0xb0 [ 643.015890] do_syscall_64+0xfd/0x620 [ 643.019684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.024860] RIP: 0033:0x45a919 [ 643.028045] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.046945] RSP: 002b:00007f336a5bbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 643.054655] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a919 [ 643.061914] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000006 [ 643.069171] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 643.076429] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f336a5bc6d4 [ 643.083688] R13: 00000000004c9a29 R14: 00000000004e1930 R15: 00000000ffffffff [ 643.090960] [ 643.090965] ====================================================== [ 643.090970] WARNING: possible circular locking dependency detected [ 643.090974] 4.19.91-syzkaller #0 Not tainted [ 643.090979] ------------------------------------------------------ [ 643.090983] syz-executor.0/20989 is trying to acquire lock: [ 643.090986] 0000000039cf91c6 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 643.090998] [ 643.091002] but task is already holding lock: [ 643.091005] 000000001f9a8299 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 643.091015] [ 643.091019] which lock already depends on the new lock. [ 643.091021] [ 643.091023] [ 643.091027] the existing dependency chain (in reverse order) is: [ 643.091029] [ 643.091031] -> #5 (&obj_hash[i].lock){-.-.}: [ 643.091043] _raw_spin_lock_irqsave+0x95/0xcd [ 643.091047] debug_object_activate+0x131/0x4e0 [ 643.091051] enqueue_hrtimer+0x2a/0x3f0 [ 643.091055] hrtimer_start_range_ns+0x603/0xc70 [ 643.091059] schedule_hrtimeout_range_clock+0x1a0/0x380 [ 643.091063] schedule_hrtimeout+0x25/0x30 [ 643.091067] wait_task_inactive+0x4a2/0x630 [ 643.091071] __kthread_bind_mask+0x24/0xb0 [ 643.091075] kthread_bind_mask+0x23/0x30 [ 643.091078] init_rescuer.part.0+0xfc/0x190 [ 643.091082] workqueue_init+0x51a/0x808 [ 643.091086] kernel_init_freeable+0x2c0/0x5c8 [ 643.091089] kernel_init+0x12/0x1c2 [ 643.091093] ret_from_fork+0x24/0x30 [ 643.091095] [ 643.091096] -> #4 (hrtimer_bases.lock){-.-.}: [ 643.091109] _raw_spin_lock_irqsave+0x95/0xcd [ 643.091113] lock_hrtimer_base.isra.0+0x75/0x130 [ 643.091116] hrtimer_start_range_ns+0xff/0xc70 [ 643.091120] enqueue_task_rt+0x998/0xe70 [ 643.091124] __sched_setscheduler+0xd93/0x1ed0 [ 643.091127] _sched_setscheduler+0x10a/0x1b0 [ 643.091131] sched_setscheduler+0xe/0x10 [ 643.091135] watchdog_dev_init+0xe0/0x1b2 [ 643.091138] watchdog_init+0x17/0x181 [ 643.091141] do_one_initcall+0x107/0x78c [ 643.091145] kernel_init_freeable+0x4d4/0x5c8 [ 643.091148] kernel_init+0x12/0x1c2 [ 643.091152] ret_from_fork+0x24/0x30 [ 643.091153] [ 643.091155] -> #3 (&rt_b->rt_runtime_lock){-.-.}: [ 643.091166] _raw_spin_lock+0x2f/0x40 [ 643.091170] rq_online_rt+0xb4/0x390 [ 643.091174] set_rq_online.part.0+0xe4/0x140 [ 643.091177] sched_cpu_activate+0x17f/0x270 [ 643.091181] cpuhp_invoke_callback+0x201/0x1af0 [ 643.091185] cpuhp_thread_fun+0x453/0x850 [ 643.091189] smpboot_thread_fn+0x6a3/0xa30 [ 643.091192] kthread+0x354/0x420 [ 643.091195] ret_from_fork+0x24/0x30 [ 643.091197] [ 643.091199] -> #2 (&rq->lock){-.-.}: [ 643.091209] _raw_spin_lock+0x2f/0x40 [ 643.091213] task_fork_fair+0x6a/0x520 [ 643.091216] sched_fork+0x3af/0x900 [ 643.091220] copy_process.part.0+0x1859/0x7a30 [ 643.091223] _do_fork+0x257/0xfd0 [ 643.091227] kernel_thread+0x34/0x40 [ 643.091230] rest_init+0x24/0x222 [ 643.091233] start_kernel+0x88c/0x8c5 [ 643.091238] x86_64_start_reservations+0x29/0x2b [ 643.091241] x86_64_start_kernel+0x77/0x7b [ 643.091245] secondary_startup_64+0xa4/0xb0 [ 643.091247] [ 643.091249] -> #1 (&p->pi_lock){-.-.}: [ 643.091260] _raw_spin_lock_irqsave+0x95/0xcd [ 643.091263] try_to_wake_up+0x94/0xf50 [ 643.091267] wake_up_process+0x10/0x20 [ 643.091270] __up.isra.0+0x136/0x1a0 [ 643.091273] up+0x9c/0xe0 [ 643.091276] __up_console_sem+0xb7/0x1c0 [ 643.091280] console_unlock+0x6c7/0x10d0 [ 643.091283] vprintk_emit+0x280/0x6d0 [ 643.091287] vprintk_default+0x28/0x30 [ 643.091290] vprintk_func+0x7e/0x189 [ 643.091293] printk+0xba/0xed [ 643.091297] kauditd_hold_skb.cold+0x3f/0x4e [ 643.091300] kauditd_send_queue+0x12d/0x170 [ 643.091304] kauditd_thread+0x71c/0xa50 [ 643.091307] kthread+0x354/0x420 [ 643.091310] ret_from_fork+0x24/0x30 [ 643.091311] [ 643.091313] -> #0 ((console_sem).lock){-.-.}: [ 643.091324] lock_acquire+0x16f/0x3f0 [ 643.091328] _raw_spin_lock_irqsave+0x95/0xcd [ 643.091331] down_trylock+0x13/0x70 [ 643.091335] __down_trylock_console_sem+0xa8/0x210 [ 643.091339] console_trylock+0x15/0xa0 [ 643.091342] vprintk_emit+0x267/0x6d0 [ 643.091346] vprintk_default+0x28/0x30 [ 643.091349] vprintk_func+0x7e/0x189 [ 643.091352] printk+0xba/0xed [ 643.091355] __warn_printk+0x9b/0xf3 [ 643.091359] debug_print_object+0x168/0x250 [ 643.091363] debug_check_no_obj_freed+0x29f/0x464 [ 643.091366] kfree+0xbd/0x220 [ 643.091369] kvfree+0x61/0x70 [ 643.091372] netdev_freemem+0x4c/0x60 [ 643.091375] netdev_release+0x86/0xb0 [ 643.091379] device_release+0x7b/0x210 [ 643.091382] kobject_put.cold+0x289/0x2e6 [ 643.091386] netdev_run_todo+0x53b/0x7a0 [ 643.091389] rtnetlink_rcv_msg+0x46f/0xb00 [ 643.091393] netlink_rcv_skb+0x17d/0x460 [ 643.091396] rtnetlink_rcv+0x1d/0x30 [ 643.091400] netlink_unicast+0x53a/0x730 [ 643.091404] netlink_sendmsg+0x8ae/0xd70 [ 643.091407] sock_sendmsg+0xd7/0x130 [ 643.091410] ___sys_sendmsg+0x803/0x920 [ 643.091414] __sys_sendmsg+0x105/0x1d0 [ 643.091417] __x64_sys_sendmsg+0x78/0xb0 [ 643.091421] do_syscall_64+0xfd/0x620 [ 643.091425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.091427] [ 643.091431] other info that might help us debug this: [ 643.091433] [ 643.091435] Chain exists of: [ 643.091437] (console_sem).lock --> hrtimer_bases.lock --> &obj_hash[i].lock [ 643.091452] [ 643.091455] Possible unsafe locking scenario: [ 643.091457] [ 643.091460] CPU0 CPU1 [ 643.091464] ---- ---- [ 643.091466] lock(&obj_hash[i].lock); [ 643.091473] lock(hrtimer_bases.lock); [ 643.091481] lock(&obj_hash[i].lock); [ 643.091488] lock((console_sem).lock); [ 643.091494] [ 643.091496] *** DEADLOCK *** [ 643.091498] [ 643.091502] 1 lock held by syz-executor.0/20989: [ 643.091503] #0: 000000001f9a8299 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xbe/0x464 [ 643.091518] [ 643.091520] stack backtrace: [ 643.091526] CPU: 1 PID: 20989 Comm: syz-executor.0 Not tainted 4.19.91-syzkaller #0 [ 643.091532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.091535] Call Trace: [ 643.091538] dump_stack+0x197/0x210 [ 643.091542] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 643.091546] __lock_acquire+0x2e19/0x49c0 [ 643.091549] ? mark_held_locks+0x100/0x100 [ 643.091553] ? format_decode+0x25f/0xbc0 [ 643.091556] ? enable_ptr_key_workfn+0x30/0x30 [ 643.091560] ? kvm_clock_read+0x18/0x30 [ 643.091563] lock_acquire+0x16f/0x3f0 [ 643.091566] ? down_trylock+0x13/0x70 [ 643.091570] _raw_spin_lock_irqsave+0x95/0xcd [ 643.091573] ? down_trylock+0x13/0x70 [ 643.091577] ? vprintk_emit+0x267/0x6d0 [ 643.091580] down_trylock+0x13/0x70 [ 643.091583] ? vprintk_emit+0x267/0x6d0 [ 643.091593] __down_trylock_console_sem+0xa8/0x210 [ 643.091596] console_trylock+0x15/0xa0 [ 643.091599] vprintk_emit+0x267/0x6d0 [ 643.091603] ? __internal_add_timer+0x1f0/0x1f0 [ 643.091607] vprintk_default+0x28/0x30 [ 643.091610] vprintk_func+0x7e/0x189 [ 643.091613] printk+0xba/0xed [ 643.091617] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 643.091621] ? __lock_acquire+0x6ee/0x49c0 [ 643.091624] ? __warn_printk+0x8f/0xf3 [ 643.091627] ? work_on_cpu_safe+0x90/0x90 [ 643.091631] __warn_printk+0x9b/0xf3 [ 643.091634] ? add_taint.cold+0x16/0x16 [ 643.091638] ? lock_downgrade+0x880/0x880 [ 643.091642] ? work_on_cpu_safe+0x90/0x90 [ 643.091645] debug_print_object+0x168/0x250 [ 643.091649] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 643.091653] debug_check_no_obj_freed+0x29f/0x464 [ 643.091656] kfree+0xbd/0x220 [ 643.091659] kvfree+0x61/0x70 [ 643.091662] netdev_freemem+0x4c/0x60 [ 643.091665] netdev_release+0x86/0xb0 [ 643.091669] ? xps_cpus_store+0x2b0/0x2b0 [ 643.091674] device_release+0x7b/0x210 [ 643.091677] kobject_put.cold+0x289/0x2e6 [ 643.091680] netdev_run_todo+0x53b/0x7a0 [ 643.091684] ? register_netdev+0x50/0x50 [ 643.091688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.091693] ? rtnl_link_get_net_capable.constprop.0+0x230/0x230 [ 643.091696] rtnetlink_rcv_msg+0x46f/0xb00 [ 643.091700] ? rtnetlink_put_metrics+0x560/0x560 [ 643.091704] ? _raw_spin_unlock_irqrestore+0x95/0xe0 [ 643.091708] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 643.091712] ? netlink_deliver_tap+0x22d/0xc20 [ 643.091715] ? find_held_lock+0x35/0x130 [ 643.091718] netlink_rcv_skb+0x17d/0x460 [ 643.091722] ? rtnetlink_put_metrics+0x560/0x560 [ 643.091726] ? netlink_ack+0xb30/0xb30 [ 643.091729] ? netlink_deliver_tap+0x254/0xc20 [ 643.091733] rtnetlink_rcv+0x1d/0x30 [ 643.091736] netlink_unicast+0x53a/0x730 [ 643.091740] ? netlink_attachskb+0x770/0x770 [ 643.091744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.091747] netlink_sendmsg+0x8ae/0xd70 [ 643.091751] ? netlink_unicast+0x730/0x730 [ 643.091755] ? selinux_socket_sendmsg+0x36/0x40 [ 643.091759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.091763] ? security_socket_sendmsg+0x8d/0xc0 [ 643.091766] ? netlink_unicast+0x730/0x730 [ 643.091769] sock_sendmsg+0xd7/0x130 [ 643.091773] ___sys_sendmsg+0x803/0x920 [ 643.091777] ? copy_msghdr_from_user+0x430/0x430 [ 643.091781] ? lock_downgrade+0x880/0x880 [ 643.091784] ? kasan_check_read+0x11/0x20 [ 643.091788] ? __fget+0x367/0x540 [ 643.091791] ? iterate_fd+0x360/0x360 [ 643.091794] ? lock_downgrade+0x880/0x880 [ 643.091798] ? __fget_light+0x1a9/0x230 [ 643.091801] ? __fdget+0x1b/0x20 [ 643.091805] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 643.091808] __sys_sendmsg+0x105/0x1d0 [ 643.091812] ? __ia32_sys_shutdown+0x80/0x80 [ 643.091816] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 643.091819] ? do_syscall_64+0x26/0x620 [ 643.091823] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.091826] ? do_syscall_64+0x26/0x620 [ 643.091829] __x64_sys_sendmsg+0x78/0xb0 [ 643.091833] do_syscall_64+0xfd/0x620 [ 643.091837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.091840] RIP: 0033:0x45a919 [ 643.091853] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.091857] RSP: 002b:00007f336a5bbc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 643.091866] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a919 [ 643.091871] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000006 [ 643.091877] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 643.091882] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f336a5bc6d4 [ 643.091884] R [ 643.093320] Kernel Offset: disabled [ 644.135687] Rebooting in 86400 seconds..