[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 58.930706][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 58.930723][ T26] audit: type=1800 audit(1578684934.662:29): pid=7788 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 58.957077][ T26] audit: type=1800 audit(1578684934.672:30): pid=7788 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.133' (ECDSA) to the list of known hosts. 2020/01/10 19:35:44 fuzzer started 2020/01/10 19:35:46 dialing manager at 10.128.0.105:36255 2020/01/10 19:35:46 syscalls: 2812 2020/01/10 19:35:46 code coverage: enabled 2020/01/10 19:35:46 comparison tracing: enabled 2020/01/10 19:35:46 extra coverage: enabled 2020/01/10 19:35:46 setuid sandbox: enabled 2020/01/10 19:35:46 namespace sandbox: enabled 2020/01/10 19:35:46 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/10 19:35:46 fault injection: enabled 2020/01/10 19:35:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/10 19:35:46 net packet injection: enabled 2020/01/10 19:35:46 net device setup: enabled 2020/01/10 19:35:46 concurrency sanitizer: enabled 2020/01/10 19:35:46 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 76.321437][ T7958] KCSAN: could not find function: 'calc_wb_limits' [ 77.293781][ T7958] KCSAN: could not find function: 'poll_schedule_timeout' 2020/01/10 19:35:58 adding functions to KCSAN blacklist: '__ext4_new_inode' 'queue_access_lock' 'xas_find_marked' 'find_next_bit' 'run_timer_softirq' 'audit_log_start' 'sit_tunnel_xmit' '__fput' 'ext4_has_free_clusters' 'ext4_nonda_switch' 'vm_area_dup' 'process_srcu' 'snd_seq_prioq_cell_out' 'snd_timer_pause' 'iput' 'sbitmap_queue_clear' 'do_nanosleep' 'tick_nohz_idle_stop_tick' 'wbt_wait' '__writeback_single_inode' 'atime_needs_update' 'echo_char' 'ext4_da_write_end' 'ext4_writepages' 'ovl_write_iter' 'generic_write_end' 'calc_wb_limits' 'delete_from_page_cache_batch' 'blk_mq_run_hw_queue' '__mark_inode_dirty' 'poll_schedule_timeout' 'kauditd_thread' 'ext4_free_inodes_count' 'timer_clear_idle' 'bio_endio' 'kernfs_refresh_inode' 'ep_poll' 'taskstats_exit' 'add_timer' 'mmap_region' 'tomoyo_supervisor' 'iomap_dio_bio_actor' 'dd_has_work' '__hrtimer_run_queues' 'find_get_pages_range_tag' 'd_instantiate_new' 'blk_mq_dispatch_rq_list' 'mod_timer' 'filemap_map_pages' 'rcu_gp_fqs_check_wake' 'pid_update_inode' 'n_tty_receive_buf_common' 'blk_stat_add' 'xas_clear_mark' '__snd_rawmidi_transmit_ack' 'blk_mq_get_request' 'copy_process' 'wbt_issue' 'rcu_gp_fqs_loop' 'futex_wait_queue_me' 'blk_mq_sched_dispatch_requests' 'ext4_mark_iloc_dirty' '__lru_cache_add' 'ktime_get_real_seconds' 'tick_do_update_jiffies64' 'tick_sched_do_timer' 'ext4_mb_good_group' 'other_inode_match' 'ext4_free_inode' 'kcm_rfree' 19:39:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) write$9p(r1, &(0x7f0000001400)=';', 0x1) 19:39:16 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x250, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) pipe2(&(0x7f0000000140), 0x0) io_setup(0x8000000000000002, &(0x7f0000000480)=0x0) io_submit(r2, 0x0, 0x0) [ 280.850298][ T7960] IPVS: ftp: loaded support on port[0] = 21 19:39:16 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8090}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000058) [ 280.979898][ T7960] chnl_net:caif_netlink_parms(): no params data found [ 281.010727][ T7963] IPVS: ftp: loaded support on port[0] = 21 [ 281.056761][ T7960] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.063908][ T7960] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.071599][ T7960] device bridge_slave_0 entered promiscuous mode [ 281.095932][ T7960] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.103030][ T7960] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.124451][ T7960] device bridge_slave_1 entered promiscuous mode [ 281.179049][ T7960] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 281.226019][ T7960] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 281.263280][ T7965] IPVS: ftp: loaded support on port[0] = 21 [ 281.265956][ T7963] chnl_net:caif_netlink_parms(): no params data found [ 281.291339][ T7960] team0: Port device team_slave_0 added [ 281.303098][ T7960] team0: Port device team_slave_1 added 19:39:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0}, 0x42}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0x1) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @multicast2}, 0x10) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = accept4$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x0) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x0, &(0x7f0000000080), 0x4) ftruncate(r1, 0x8007ffc) sendfile(r0, r1, 0x0, 0x72439a6b) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) [ 281.369979][ T7963] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.393658][ T7963] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.401512][ T7963] device bridge_slave_0 entered promiscuous mode [ 281.456148][ T7960] device hsr_slave_0 entered promiscuous mode [ 281.493954][ T7960] device hsr_slave_1 entered promiscuous mode 19:39:17 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) [ 281.567219][ T7963] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.583689][ T7963] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.591464][ T7963] device bridge_slave_1 entered promiscuous mode [ 281.621374][ T7968] IPVS: ftp: loaded support on port[0] = 21 [ 281.695441][ T7963] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 281.735645][ T7963] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 281.771236][ T7965] chnl_net:caif_netlink_parms(): no params data found [ 281.817971][ T7960] netdevsim netdevsim0 netdevsim0: renamed from eth0 19:39:17 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) socket$inet6(0xa, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x9) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 281.865931][ T7960] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 281.946579][ T7963] team0: Port device team_slave_0 added [ 281.966631][ T7960] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 282.036091][ T7963] team0: Port device team_slave_1 added [ 282.048374][ T7971] IPVS: ftp: loaded support on port[0] = 21 [ 282.096117][ T7963] device hsr_slave_0 entered promiscuous mode [ 282.143943][ T7963] device hsr_slave_1 entered promiscuous mode [ 282.193742][ T7963] debugfs: Directory 'hsr0' with parent '/' already present! [ 282.216731][ T7973] IPVS: ftp: loaded support on port[0] = 21 [ 282.227517][ T7960] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 282.272282][ T7965] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.280878][ T7965] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.288699][ T7965] device bridge_slave_0 entered promiscuous mode [ 282.302993][ T7965] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.310226][ T7965] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.318290][ T7965] device bridge_slave_1 entered promiscuous mode [ 282.378241][ T7965] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 282.408630][ T7965] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 282.428354][ T7968] chnl_net:caif_netlink_parms(): no params data found [ 282.450442][ T7965] team0: Port device team_slave_0 added [ 282.457281][ T7965] team0: Port device team_slave_1 added [ 282.470441][ T7963] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 282.546942][ T7963] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 282.630706][ T7963] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 282.755560][ T7965] device hsr_slave_0 entered promiscuous mode [ 282.803980][ T7965] device hsr_slave_1 entered promiscuous mode [ 282.843696][ T7965] debugfs: Directory 'hsr0' with parent '/' already present! [ 282.877320][ T7968] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.884593][ T7968] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.892168][ T7968] device bridge_slave_0 entered promiscuous mode [ 282.899316][ T7963] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 283.015109][ T7968] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.022252][ T7968] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.030268][ T7968] device bridge_slave_1 entered promiscuous mode [ 283.064316][ T7971] chnl_net:caif_netlink_parms(): no params data found [ 283.079277][ T7968] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 283.089501][ T7968] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 283.119864][ T7973] chnl_net:caif_netlink_parms(): no params data found [ 283.171020][ T7968] team0: Port device team_slave_0 added [ 283.199149][ T7968] team0: Port device team_slave_1 added [ 283.206809][ T7971] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.214235][ T7971] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.222129][ T7971] device bridge_slave_0 entered promiscuous mode [ 283.231869][ T7971] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.239239][ T7971] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.247085][ T7971] device bridge_slave_1 entered promiscuous mode [ 283.259053][ T7973] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.266640][ T7973] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.275137][ T7973] device bridge_slave_0 entered promiscuous mode [ 283.286500][ T7973] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.293724][ T7973] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.301314][ T7973] device bridge_slave_1 entered promiscuous mode [ 283.312409][ T7965] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 283.356045][ T7965] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 283.403022][ T7960] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.419228][ T7965] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 283.485921][ T7965] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 283.572763][ T7971] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 283.605916][ T7968] device hsr_slave_0 entered promiscuous mode [ 283.634002][ T7968] device hsr_slave_1 entered promiscuous mode [ 283.673672][ T7968] debugfs: Directory 'hsr0' with parent '/' already present! [ 283.687499][ T7973] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 283.698883][ T7973] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 283.709522][ T7971] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 283.763799][ T7960] 8021q: adding VLAN 0 to HW filter on device team0 [ 283.777224][ T7971] team0: Port device team_slave_0 added [ 283.797530][ T7971] team0: Port device team_slave_1 added [ 283.812890][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.824476][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.854288][ T7973] team0: Port device team_slave_0 added [ 283.876991][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.885725][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.894351][ T3609] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.901597][ T3609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.909540][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.918330][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.926843][ T3609] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.933934][ T3609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.941732][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 283.950583][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 283.972562][ T7973] team0: Port device team_slave_1 added [ 284.026227][ T7971] device hsr_slave_0 entered promiscuous mode [ 284.064079][ T7971] device hsr_slave_1 entered promiscuous mode [ 284.103745][ T7971] debugfs: Directory 'hsr0' with parent '/' already present! [ 284.111353][ T7968] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 284.165263][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 284.175134][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 284.183645][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 284.194341][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 284.214779][ T7968] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 284.256650][ T7968] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 284.326284][ T7968] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 284.371552][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 284.380661][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 284.396927][ T7963] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.465948][ T7973] device hsr_slave_0 entered promiscuous mode [ 284.504107][ T7973] device hsr_slave_1 entered promiscuous mode [ 284.543990][ T7973] debugfs: Directory 'hsr0' with parent '/' already present! [ 284.554524][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 284.563240][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.572099][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 284.580895][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.631373][ T7965] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.642697][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 284.666312][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.674195][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.683735][ T7963] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.695617][ T7971] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 284.749078][ T7971] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 284.815558][ T7978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.824172][ T7978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.832550][ T7978] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.839744][ T7978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.847637][ T7978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.856624][ T7978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.865223][ T7978] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.872323][ T7978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.880668][ T7978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 284.902984][ T7971] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 284.986609][ T7971] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 285.035957][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 285.045344][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 285.056174][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 285.065041][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 285.076194][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 285.088361][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 285.096317][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.109529][ T7963] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 285.120071][ T7963] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 285.142846][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.151640][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 285.160618][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.169301][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.177992][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.186338][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.194729][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.202543][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.210962][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 285.222736][ T7965] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.234212][ T7973] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 285.278529][ T7973] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 285.326346][ T7973] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 285.378729][ T7968] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.399645][ T7960] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 285.407314][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 285.415453][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.423060][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.432181][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.440757][ T2965] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.447842][ T2965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.455623][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.464556][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.472969][ T2965] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.480136][ T2965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.488244][ T7973] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 285.539430][ T7963] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 285.559285][ T7978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.567762][ T7978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.576267][ T7978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.584348][ T7978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 285.593175][ T7978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 285.616175][ T7968] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.642380][ T7965] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 285.653155][ T7965] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 285.664706][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 285.673156][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 285.682010][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 285.690633][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.699206][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.707887][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 285.716763][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.725105][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.733941][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.742169][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.750495][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 285.758873][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 285.793044][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.801562][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.810157][ T2965] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.817264][ T2965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.826530][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.835303][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.844048][ T2965] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.851131][ T2965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.877194][ T7968] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 285.888814][ T7968] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 285.900713][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.908722][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 285.917541][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 285.926336][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 285.935137][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 285.943521][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.952213][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 285.961215][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.969613][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.978336][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.986853][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.995630][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 286.004155][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.012557][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 286.020784][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.028794][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.037077][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 286.046274][ T7963] device veth0_vlan entered promiscuous mode [ 286.061517][ T7965] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 286.080689][ T7963] device veth1_vlan entered promiscuous mode [ 286.089741][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 286.098318][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 286.108334][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 286.123860][ T7973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 286.161371][ T7971] 8021q: adding VLAN 0 to HW filter on device bond0 [ 286.180538][ T7973] 8021q: adding VLAN 0 to HW filter on device team0 [ 286.188102][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 286.196464][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.206101][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.215141][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.223980][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.232505][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 286.240381][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.249703][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 286.257482][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 286.269190][ T7965] device veth0_vlan entered promiscuous mode [ 286.283257][ T7960] device veth0_vlan entered promiscuous mode [ 286.297862][ T7971] 8021q: adding VLAN 0 to HW filter on device team0 [ 286.305770][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.314342][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.325206][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.333312][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.342795][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 286.352003][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.361008][ T2965] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.368071][ T2965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.376589][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 286.384565][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 286.392991][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.401099][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.409120][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.417281][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.425465][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 286.439623][ T7968] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 286.457470][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 286.466188][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.474891][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.482128][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.490177][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.499053][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 19:39:22 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x51a) close(r0) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000001ac0)) [ 286.508295][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 286.521099][ T7965] device veth1_vlan entered promiscuous mode [ 286.554264][ T7960] device veth1_vlan entered promiscuous mode [ 286.585024][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.597132][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.606841][ T7976] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.614065][ T7976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.622243][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.630874][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.639388][ T7976] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.646604][ T7976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.654886][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 286.664208][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 286.673202][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 286.699480][ T7968] device veth0_vlan entered promiscuous mode [ 286.724625][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.733459][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.744782][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 19:39:22 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x2, 0x3, 0x298, 0x200, 0x0, 0x0, 0x7000000, 0x0, 0x200, 0x200, 0x200, 0x200, 0x200, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xa0, 0x108, 0x0, {}, [@common=@inet=@tcp={{0x30, 'tcp\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00'}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'veth0_virt_wifi\x00', 'vlan0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) [ 286.755001][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 286.764125][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 286.773295][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 286.782809][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 286.791389][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.800561][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 286.810158][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.821317][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 286.847439][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 286.859427][ T7968] device veth1_vlan entered promiscuous mode [ 286.874119][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.881897][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.893524][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 286.903013][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 286.918433][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 286.929482][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 286.940246][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 286.950618][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 286.961957][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 286.972905][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.983538][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 19:39:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 286.994946][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 287.005187][ T7973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 287.034009][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 287.042189][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 287.063267][ T7971] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 287.109287][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 287.121356][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 287.148538][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 19:39:22 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8090}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000058) [ 287.167128][ T7976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 287.193346][ T8008] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 287.206646][ T7973] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 287.213907][ T8008] FAT-fs (loop0): Filesystem has been set read-only [ 287.220704][ T8008] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 19:39:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) write$9p(r1, &(0x7f0000001400)=';', 0x1) [ 287.348236][ T26] audit: type=1800 audit(1578685163.082:31): pid=8024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="file0" dev="sda1" ino=16533 res=0 19:39:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000540)=ANY=[], 0x133) sendfile(r2, r2, &(0x7f00000001c0), 0xa198) write$9p(r1, &(0x7f0000001400)=';', 0x1) 19:39:23 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8090}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000058) 19:39:23 executing program 1: r0 = socket(0x10, 0x800000000002, 0x0) write(r0, &(0x7f0000000180)="240000002e000705ab0e2506090007000aab087a02000000b8006093210001c000000000", 0x24) [ 287.490780][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 287.546108][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 287.607913][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 287.642541][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.670088][ T7973] device veth0_vlan entered promiscuous mode [ 287.687595][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.696199][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 287.708033][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 287.717010][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 287.734317][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 19:39:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 19:39:23 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d80)={@multicast2, @local}, 0xc) r0 = dup(0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2000000000000013, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x3, 0x100000000000000}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) read$FUSE(r2, &(0x7f0000000340), 0x1000) [ 287.782196][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.822907][ T7971] device veth0_vlan entered promiscuous mode [ 287.869669][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.888324][ T2965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 287.923016][ T7973] device veth1_vlan entered promiscuous mode [ 287.947054][ T7971] device veth1_vlan entered promiscuous mode 19:39:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000075c0)={0x3, &(0x7f0000007580)=[{}, {0x14}, {0x6, 0x0, 0x0, 0x50000}]}) [ 288.494248][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 288.502565][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 19:39:24 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) chroot(0x0) 19:39:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 19:39:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = eventfd2(0x0, 0x0) read(r1, &(0x7f0000000340)=""/232, 0xe8) 19:39:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xb, 0x0, &(0x7f0000001000)) 19:39:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$P9_RSETATTR(r0, &(0x7f00000000c0)={0x7}, 0x7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000001000), 0x8) 19:39:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') r1 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:24 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x14, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r1, 0x28007d) r2 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x49f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000a40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r3, &(0x7f00000017c0), 0x1a1, 0x0) 19:39:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x11, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="711204000000000061134c0000000000bf2000000000000015000700080000002d0307000000000095000000000000006916000000000000bf67000000000000170600000fff07006706000002000000070600000ee60000bf050000000000000f150000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c27df8ecf264e0f84f9f17d3c30e3c7bdd2d17f2f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703d6c4f633a9a4f16d0a3e1282ee45a010fb94fe9de56c9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5af65727546e7c955ccefa1f6ab689fde4de4e63ede20271a51445dc8da39e5b0ab7bcb8f512036a5ba6d04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb735fd552bdc268694aeb0743e32dc819b6cf5c8ac86f8a297dff0445a13d0045fb3cda32a673a6bb55d8c85f21dce431e56723888fb126a163f16fb2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67a993716dbf580469f0f53acbb40b401e3738270b315d362ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000000000bc00f674629709e7e78f4ddc211bc3ebf0bd9d42ca019dd5d022cf74686e9fbe2562671cd47840a7afaab43176e65ec1118d46d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7eab04871bc47287cd31cc43ea0ffb567b40407d000000000000000000000000005f37d83f84e98a523d80bd0d0d703f37ca363f601ae899a53f6715a0a62a34b0c94cce6994521629ab028acfc1d926a0f6a5480a55c22fe394ac000000000000000000000000000000437d57defb79ea"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff35}, 0x24) 19:39:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@nfs='nfs'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}, 0x22}]}) 19:39:25 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) [ 289.554526][ T8112] FAT-fs (loop0): Unrecognized mount option "fscontext=system_u"" or missing value 19:39:25 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) chroot(0x0) [ 289.653898][ T8112] FAT-fs (loop0): Unrecognized mount option "fscontext=system_u"" or missing value 19:39:25 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) chroot(0x0) 19:39:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') r1 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = eventfd2(0x0, 0x0) read(r1, &(0x7f0000000340)=""/232, 0xe8) [ 290.173409][ T8103] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 290.186452][ T8103] FAT-fs (loop4): Filesystem has been set read-only [ 290.194924][ T26] audit: type=1804 audit(1578685165.922:32): pid=8115 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir568402665/syzkaller.20MbD5/2/file0/file0" dev="loop4" ino=23 res=1 19:39:26 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x14, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r1, 0x28007d) r2 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x49f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000a40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r3, &(0x7f00000017c0), 0x1a1, 0x0) 19:39:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') r1 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) [ 290.319672][ T26] audit: type=1804 audit(1578685165.922:33): pid=8134 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir568402665/syzkaller.20MbD5/2/file0/file0" dev="loop4" ino=23 res=1 19:39:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c01000014000b1c0000000000000000fe8000000000000000e7ffffffffffa9ffffffff00004000000000ec0000000500000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008400050000000000000000000000000000000000000000003200000000000000ac1e00010000000000000000000000000000000000000000000000000000000000000000fe800000000000000000000000000000000000003c00000000000600fe8000"/244], 0x13c}}, 0x0) 19:39:26 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) [ 290.511572][ T8151] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.0'. 19:39:26 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) chroot(0x0) 19:39:26 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0xf0, 0x15, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}}, @in=@multicast1}}, 0xf0}}, 0x0) 19:39:26 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) chroot(0x0) 19:39:26 executing program 0: unshare(0x400) r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) fsync(r0) 19:39:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x8, 0x4, 0x4, 0x9}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000600)={r0, &(0x7f00000001c0), 0x0}, 0x20) 19:39:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000600)={r1, &(0x7f00000001c0), &(0x7f0000000180)=""/16}, 0x18) 19:39:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') r1 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) [ 291.678948][ T8152] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 291.712924][ T8152] FAT-fs (loop4): Filesystem has been set read-only 19:39:27 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000140)=0x7) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x0) 19:39:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000600)={r1, &(0x7f00000001c0), &(0x7f0000000180)=""/16}, 0x18) 19:39:27 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:27 executing program 1: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x30, 0xfffffffe, 0x0, 0x120) 19:39:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x70}}}, 0xb8}}, 0x0) 19:39:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x70}}}, 0xb8}}, 0x0) 19:39:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000140)=0x7) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x0) 19:39:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000140)=0x7) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x0) 19:39:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') r1 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[], 0x49f) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:28 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 19:39:28 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:28 executing program 2: preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) [ 293.076742][ C0] hrtimer: interrupt took 24976 ns 19:39:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 19:39:29 executing program 2: preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 19:39:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 19:39:29 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:29 executing program 2: preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:29 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) socket$packet(0x11, 0x3, 0x300) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 19:39:29 executing program 2: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 19:39:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0xe, 0x0, &(0x7f0000001580)) 19:39:29 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) [ 293.884038][ T8283] sock: process `syz-executor.3' is using obsolete getsockopt SO_BSDCOMPAT 19:39:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:29 executing program 2: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 19:39:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x24000810) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) lseek(r0, 0x0, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) dup(r4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 19:39:29 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:30 executing program 2: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:30 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) write$binfmt_aout(r1, &(0x7f0000001340), 0x20) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 294.368676][ T8299] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 294.423640][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 294.429455][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 294.743662][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 294.749493][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:30 executing program 2: syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:30 executing program 4: r0 = socket(0x80000000000000a, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8910, &(0x7f00000004c0)={'bridge0\x00', @ifru_mtu=0x5}) 19:39:30 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:30 executing program 2: syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:30 executing program 4: r0 = socket(0x10, 0x800000000002, 0x0) write(r0, &(0x7f0000000180)="240000005a000705ab0e2506090007000aab087a02000000b8006093210001c000000000", 0x24) [ 294.966966][ T26] audit: type=1800 audit(1578685170.702:34): pid=8299 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16571 res=0 19:39:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:30 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x24000810) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) lseek(r0, 0x0, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) dup(r4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 19:39:30 executing program 2: syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0xb4a) 19:39:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x24000810) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) lseek(r0, 0x0, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) dup(r4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 19:39:31 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) write$binfmt_aout(r1, &(0x7f0000001340), 0x20) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, 0x0, 0x0, 0xb4a) 19:39:31 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) [ 295.373920][ T8339] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 19:39:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x24000810) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) lseek(r0, 0x0, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) dup(r4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 19:39:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, 0x0, 0x0, 0xb4a) 19:39:31 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:31 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, 0x0, 0x0, 0xb4a) 19:39:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x24000810) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) lseek(r0, 0x0, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) dup(r4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 19:39:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f00000000c0), 0x0, 0xb4a) 19:39:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x24000810) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) lseek(r0, 0x0, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) dup(r4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 19:39:32 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) write$binfmt_aout(r1, &(0x7f0000001340), 0x20) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:32 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f00000000c0), 0x0, 0xb4a) 19:39:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f00000000c0), 0x0, 0xb4a) 19:39:32 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:32 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x24000810) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) lseek(r0, 0x0, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) dup(r4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 19:39:32 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0xb4a) 19:39:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:32 executing program 5: write(0xffffffffffffffff, &(0x7f0000000340)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0xb4a) 19:39:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x24000810) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) lseek(r0, 0x0, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) dup(r4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 19:39:33 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) write$binfmt_aout(r1, &(0x7f0000001340), 0x20) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:39:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x24000810) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) lseek(r0, 0x0, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) dup(r4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 19:39:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0xb4a) 19:39:33 executing program 5: write(0xffffffffffffffff, &(0x7f0000000340)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0x0) 19:39:33 executing program 5: write(0xffffffffffffffff, &(0x7f0000000340)='/', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:33 executing program 5: r0 = memfd_create(0x0, 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0x0) 19:39:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x24000810) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) lseek(r0, 0x0, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) dup(r4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 19:39:33 executing program 4: open(0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x3, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r1, &(0x7f0000000140), 0x1236aa6efce153, 0x0) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 19:39:33 executing program 5: r0 = memfd_create(0x0, 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x404003, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) socket(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x3100000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x6000000}, 0x3c) 19:39:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/188, 0xbc}], 0x1, 0x0) 19:39:33 executing program 5: r0 = memfd_create(0x0, 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x0, 0x0, 0x0) r3 = dup(r2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r3, 0x0, 0x24000810) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141046, 0x4010) lseek(r0, 0x0, 0x7) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) dup(r4) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 19:39:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = eventfd2(0x0, 0x0) read(r1, &(0x7f0000000340)=""/232, 0xe8) 19:39:34 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(0xffffffffffffffff, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x404003, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x1c) socket(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x3100000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x6000000}, 0x3c) 19:39:34 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(0xffffffffffffffff, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:34 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(0xffffffffffffffff, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:34 executing program 4: open(0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x3, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r1, &(0x7f0000000140), 0x1236aa6efce153, 0x0) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 19:39:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:34 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) futimesat(r2, 0x0, &(0x7f0000001680)) 19:39:34 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:34 executing program 3: r0 = fsopen(&(0x7f0000000240)='binfmt_misc\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) setrlimit(0x408000000000007, &(0x7f0000000000)) fsmount(r0, 0x0, 0x0) 19:39:34 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:34 executing program 3: open(0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x3, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmmsg(r1, &(0x7f0000000140), 0x1236aa6efce153, 0x0) connect$unix(r0, &(0x7f00000002c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 19:39:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "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"}], 0x418}}], 0x2, 0x0) 19:39:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = eventfd2(0x0, 0x0) read(r1, &(0x7f0000000340)=""/232, 0xe8) 19:39:34 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "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"}], 0x418}}], 0x2, 0x0) 19:39:35 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340), 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x100000008, &(0x7f00000001c0)="82", 0x1) getsockopt$inet_opts(r0, 0x0, 0x400000000000009, &(0x7f0000000080)=""/16, &(0x7f000021affc)=0x4) 19:39:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "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"}], 0x418}}], 0x2, 0x0) 19:39:35 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340), 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:35 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340), 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd183670c9b159d755eb78d2310f36ad7"}], 0x418}}], 0x2, 0x0) 19:39:35 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) socket$packet(0x11, 0x3, 0x300) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) syz_open_pts(r2, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 19:39:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x100000008, &(0x7f00000001c0)="82", 0x1) getsockopt$inet_opts(r0, 0x0, 0x400000000000009, 0x0, &(0x7f000021affc)) 19:39:35 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) unshare(0x400) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 19:39:35 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(0xffffffffffffffff, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:35 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "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"}], 0x418}}], 0x2, 0x0) 19:39:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) shutdown(r0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) 19:39:36 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd183670c9b159d755eb78d2310f36ad7"}], 0x418}}], 0x2, 0x0) 19:39:36 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 19:39:36 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(0xffffffffffffffff, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x100000008, &(0x7f00000001c0)="82", 0x1) getsockopt$inet_opts(r0, 0x0, 0x400000000000009, &(0x7f0000000080)=""/16, &(0x7f000021affc)=0x10) 19:39:36 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(0xffffffffffffffff, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) [ 300.663617][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 300.672219][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:36 executing program 4: capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$chown(0x4, r0, 0x0, r2) 19:39:36 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd183670c9b159d755eb78d2310f36ad7"}], 0x418}}], 0x2, 0x0) 19:39:36 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 19:39:36 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:36 executing program 2: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 300.988961][ T8582] capability: warning: `syz-executor.4' uses deprecated v2 capabilities in a way that may be insecure 19:39:36 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:36 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) socket$packet(0x11, 0x3, 0x300) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x6, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, 0x0) lstat(&(0x7f0000000340)='./file1\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) r5 = open(0x0, 0x8060, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) fcntl$setlease(r5, 0x400, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c480200020000de010300000000e4ff064b3f013a00fb48a16700008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900010000000b0000db000004da3600"}, 0x80, 0x0}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 19:39:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "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"}], 0x418}}], 0x2, 0x0) 19:39:36 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, 0xffffffffffffffff, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "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"}], 0x418}}], 0x2, 0x0) 19:39:37 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, 0x0, 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:37 executing program 2: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000000}) 19:39:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = epoll_create(0x5) epoll_wait(r1, &(0x7f00004e7fdc)=[{}], 0x162, 0x401) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f000069cff4)={0x4}) 19:39:37 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, 0x0, 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "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"}], 0x418}}], 0x2, 0x0) [ 301.703632][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 301.709424][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:37 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, 0x0, 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:37 executing program 3: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r3 = eventfd2(0x0, 0x0) read(r3, &(0x7f0000000340)=""/232, 0xe8) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r3}]) [ 301.783609][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 301.789436][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 301.943623][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 301.949465][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "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"}], 0x418}}], 0x2, 0x0) 19:39:37 executing program 2: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0xc0185879, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000000}) 19:39:37 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) socket$packet(0x11, 0x3, 0x300) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x6, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, 0x0) lstat(&(0x7f0000000340)='./file1\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) r5 = open(0x0, 0x8060, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x11) fcntl$setlease(r5, 0x400, 0x0) r6 = socket(0x1e, 0x1, 0x0) sendmsg(r6, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c480200020000de010300000000e4ff064b3f013a00fb48a16700008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900010000000b0000db000004da3600"}, 0x80, 0x0}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) r7 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) [ 302.193672][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 302.199487][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:39:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:38 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "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"}], 0x418}}], 0x2, 0x0) 19:39:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) 19:39:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "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"}], 0x418}}], 0x2, 0x0) 19:39:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) 19:39:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmmsg(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd183670c9b159d755eb78d2310f36ad7"}], 0x418}}], 0x2, 0x0) 19:39:38 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmmsg(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd183670c9b159d755eb78d2310f36ad7"}], 0x418}}], 0x2, 0x0) 19:39:38 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 19:39:38 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000600)={r0, &(0x7f00000001c0), 0x0}, 0x20) 19:39:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) gettid() rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 19:39:39 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x1}, 0x8) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r2) sendmmsg$inet6(r0, &(0x7f0000004b80)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f0000001440)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, &(0x7f0000001880)=[{&(0x7f0000001480)="103697a04d07b0cfd7f260e105ec5411008f3bf249f074e131960b16e28936492674db4bf5da23a486cd223f34d53ea5d81aae81fccb7e72d05c6d12316ad2cdb43ad18812c5757283686db13fe379ec3d22dc1e554e8c5f55318441993307fd04b8dac74b5bfa4585fb3537e911df81fdf2fbb71753044f20c487575980c3713011a11ca45a989ee39c3fe3c92160fdacea63e8cbe408fbe6a80fc6d41a74c7a48a051ec0328f58b023b4d813ec9fdff5e36aa3111b174e6e9ec07bf072c6eba02dfabdce3d61a4cbb9f061593b44ae1b39c9cf89fbf56b438667fc0842f1580eb2c994beeb9ae95b3c4411d320db3d49b6daaf", 0xf4}, {&(0x7f0000001580)="1e767ea5b81fc5524ed99e276fc364f695315e8acb1c4b562aa44a619c75065f4797f7b031aa88f1ed7a018ffff67cb8d384221b5c1aabe2f5430ebab80f78f3dd44f7976a596525fc079e67643df445a66dee0b3da591c15a9e846bef824d3aaad8d2885c4ac87f9b33e8256e01aa2b3e14261864e834f5c5c50f7e7aa950cc94c229aa3504cfe3bb0fe2b83e1c4f30bfd0a6a8d7f1abae58e912041e21b457848b7e0ee3f8553d0ffa23795638ceb0a1d29d6cbc106fcc8b36d783cd0630a6531ecd09f98f1e54352898a2e157c41cde2aa706c259f183c33fe48a7db767d47a27a5e09fccb9435a93d3b61f61af4ff20610", 0xf3}, {&(0x7f0000001680)="359c240f01860a65410fc81d8170ad0a087ffb72af9c4fb52691009d2094058575781b6046fe441141e073aff553808cc54dd2aa", 0x2d}, {&(0x7f00000016c0)="280c147569a714c38c72b3ccfc3c39508aa02dad352e104c77f471b33940a4a8b58646a0648fe16030a3981db64b3d45535b44cb5cdd3ba6a46285d2903525b9f7321c119c38b38d489fd97f2a6eda6f5e768b5cd4203dfbed1f7d1b", 0x5c}, {&(0x7f0000001740)="7354ccf45261e569df0b4374bcd6be64b50a9ac1001b3eb9d941c4796292ba9a17e39726dbecf9304dc771427a31d742cea5c42d06d257df05ef186dd144109fce2800752b4e5304f20a6fa052282350b9345b143da2b1fe5f42", 0x5a}, {&(0x7f00000017c0)="d4e0002ed75005b8176688aac12db7ef45f7bc81046aaa359a16d6c8fea8fc41ae151f473df49ac0ecd25a839aaae774dfdc52ae6bcc75009f5e9b85784c6018485b04cd8173e5ac2d9f56adbcd073680b74ab28571d7757fcd1a31c057ecbc27ec6d0f83c258988ea7a3fe46d5332ba6a14ef432ea9a5bc1e0947002583f172bbdebb00a949f07629e6a858f2fa8c291cf2d19ac0567ab4094d6a5e163a8d5480ba6ed0eb1749107f", 0xa9}], 0x6, &(0x7f0000001a40)}}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000002bc0)="11983dafef07a41d3107f68b456c792484c3ee79b8c7287c8730a49ea2d77b22e41ecd18e8608c7ea480af6ec90ee93e5e71431bb7ed014a24628f20847b9a03c530f29e988ebdebe46d338696ebf90bfc67c10b8fdf656c06c2b0c6346fd03d0b5ec4f50d94df2efd08f94a22917bffba1b01620ae0e42d9baa168a0ea78cf134047b8288b285bbfbae59f45511376bec", 0x91}, {&(0x7f0000002c80)="63b41f8bfd6c6a4120c352c06f540e84c3734d161fc70dec33e176343b0eebfe0c9e91aa7e6287ada29bfc2b4ddc61a4fbe7229eb432b63ea5a0737d07f9789d48cac1dadca5ba7b89fb822ba751d79f889b1af3775a4dac0cb5b0790d4091701bef69df5d67e929d20d106b0d9a927cc4bdf4a8a53876c14b670f574b26c34eebab7382cb09c3ae95003b29f5173e3e0f9eba9154e8ed96", 0x98}, {&(0x7f0000002d40)="0f1d6c63f6a7222e1f914d77f118c533090b5533c01beb6c2f935e4d9a7e0c5a0f1770bceb51b424215b6e65ff9a522ad486bc5723dcba928fedc751a05d4e", 0x3f}, {&(0x7f0000002d80)="749f3545c18a6747891052582b386b67f4879c5c50d4aeac", 0x18}, {&(0x7f0000000040)="209d45b4865d4650356a62f720c98ef8a7b0cf37675c22ed766a3b9f92afdf9bd8902f52f84a6216d312e9cb958862ebd4204566c37f1cb17b69c057690ab977b73e3f51cc1686e0fdae057562060588536b6257a1cfc866cc2c9890b3963b7cd4c0a1b872b887963356", 0x6a}], 0x5}}, {{&(0x7f0000002f40)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000032c0)=[{0x0}, {0x0}, {&(0x7f00000030c0)="c4ac64e906cd89460e5ffcf211c3c4a6d55d1c4d30999b8fd17f986b499e0209d8005f8865eb42c54d0a6fd6d8e2178ef1e3", 0x32}], 0x3, &(0x7f0000003340)=ANY=[@ANYBLOB="1400000000228fc6f2c73eb4a500000000000000000000001400000000000000290000003e00"/48], 0x30}}, {{0x0, 0x0, &(0x7f0000004880)=[{&(0x7f0000003580)="e6", 0x1}], 0xfd}}], 0x5, 0x400d000) 19:39:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmmsg(0xffffffffffffffff, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x1, "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"}], 0x418}}], 0x2, 0x0) 19:39:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80, [0x0, 0x3]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x70}}}, 0xb8}}, 0x0) 19:39:39 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 19:39:39 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 303.398366][ T8680] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.4'. 19:39:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80, [0x0, 0x3]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x70}}}, 0xb8}}, 0x0) 19:39:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, 0x0, 0x0, 0x0) 19:39:39 executing program 2: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) connect$tipc(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x0, 0x1, &(0x7f0000000380)=[{0x0}], 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) socket(0x0, 0x3, 0x0) clock_adjtime(0x0, &(0x7f0000000580)={0x3ff, 0x0, 0x2309, 0x80000001, 0x0, 0x7, 0x80000000, 0x0, 0xa, 0x7fffffff, 0x0, 0x7fff, 0x0, 0x0, 0x81, 0x1ff, 0x0, 0x7, 0x8, 0x0, 0x0, 0x0, 0x9, 0x8, 0x9, 0x1}) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @remote}, 0xffffff8a) 19:39:39 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000100)={0x2, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) 19:39:39 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000000)={'nr0\x00', 0x792}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x14, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(0x0, 0x20141042, 0x0) ftruncate(r2, 0x28007d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x2008000fffffffe) r3 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[], 0x49f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 19:39:39 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000140)=@known='trusted.overlay.upper\x00', 0x0, 0x0) [ 303.692794][ T26] audit: type=1804 audit(1578685179.422:35): pid=8697 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16651 res=1 [ 303.792482][ T26] audit: type=1800 audit(1578685179.472:36): pid=8697 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16651 res=0 [ 303.938631][ T26] audit: type=1800 audit(3726168826.675:37): pid=8716 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16651 res=0 02:07:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) fcntl$setown(r3, 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:07:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, 0x0, 0x0, 0x0) 02:07:54 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 02:07:54 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:07:54 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x1000000f4) mremap(&(0x7f000029a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000016b000/0x3000)=nil) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 02:07:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, 0x0, 0x0, 0x0) 02:07:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 02:07:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002a40)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_retopts={{0x14, 0x0, 0x7, {[@noop, @noop]}}}], 0x18}}], 0x1, 0x0) [ 304.567562][ T8703] vfat filesystem being mounted at /root/syzkaller-testdir273253376/syzkaller.3oa8uQ/33/file0/file0 supports timestamps until 2107 (0x10391447e) 02:07:54 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000000)={'nr0\x00', 0x792}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x14, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(0x0, 0x20141042, 0x0) ftruncate(r2, 0x28007d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x2008000fffffffe) r3 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[], 0x49f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 02:07:54 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:07:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 02:07:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000002a40)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_retopts={{0x14, 0x0, 0x7, {[@noop, @noop]}}}], 0x18}}], 0x1, 0x0) [ 305.073493][ T8759] vfat filesystem being mounted at /root/syzkaller-testdir273253376/syzkaller.3oa8uQ/34/file0 supports timestamps until 2107 (0x10391447e) 02:07:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) fcntl$setown(r3, 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:07:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 02:07:55 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000000)={'nr0\x00', 0x792}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x14, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(0x0, 0x20141042, 0x0) ftruncate(r2, 0x28007d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x2008000fffffffe) r3 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[], 0x49f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 02:07:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 02:07:55 executing program 2: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x1000000f4) mremap(&(0x7f000029a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000016b000/0x3000)=nil) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) [ 305.469957][ T8771] vfat filesystem being mounted at /root/syzkaller-testdir568402665/syzkaller.20MbD5/27/file0 supports timestamps until 2107 (0x10391447e) 02:07:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 02:07:55 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x10, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:07:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 305.706485][ T8771] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 305.733515][ T8771] FAT-fs (loop4): Filesystem has been set read-only [ 305.746357][ T8771] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 02:07:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xd, 0x2, 0x4, 0x100000001, 0x0, r0}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0xffffff3b, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f00000001c0)="16", 0x0}, 0x20) 02:07:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x2, 0x0) 02:07:55 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000000)={'nr0\x00', 0x792}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x14, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(0x0, 0x20141042, 0x0) ftruncate(r2, 0x28007d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x2008000fffffffe) r3 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[], 0x49f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 02:07:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x2, 0x0) [ 306.091801][ T8797] vfat filesystem being mounted at /root/syzkaller-testdir568402665/syzkaller.20MbD5/28/file0 supports timestamps until 2107 (0x10391447e) [ 306.158502][ T8797] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 970769) [ 306.167675][ T8797] FAT-fs (loop4): Filesystem has been set read-only [ 306.174788][ T8797] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 970769) 02:07:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) fcntl$setown(r3, 0x8, 0x0) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:07:56 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x10, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:07:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0x10}, [@ldst={0x2, 0x0, 0x3, 0x1c10a1}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x8}, 0x48) 02:07:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x404003, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x3f) bpf$MAP_CREATE(0x3100000000000000, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x31, 0x0, 0xffffffffffffffff, 0x0, [0x31, 0x0, 0x0, 0x400100], 0x0, 0xffffffffffffffff, 0x6000000}, 0x3c) 02:07:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r3 = eventfd2(0x0, 0x0) read(r3, &(0x7f0000000340)=""/232, 0xe8) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r3}]) 02:07:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x2, 0x0) 02:07:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x0, 0x1, "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"}], 0x418}}], 0x2, 0x0) 02:07:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x11, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff35}, 0x24) 02:07:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) write$P9_RREMOVE(r0, 0x0, 0x90) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @rand_addr="2d0be1aa0334b10da0ec57702dbec84b", 0x8000}, 0x1c) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) inotify_init1(0x800) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r2, &(0x7f00000002c0)="f0fac43d0ebb36ec9e8a27147716680dcdd95496312d0e23c78d88ff6637c6991073b2004871466e4b65ef2cece14dffba1c8cee41ed8799e766f8008447847b6d38716c1f174e979f", 0x49, 0x57, 0x0, 0xfffffffffffffdff) 02:07:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x0, 0x1, "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"}], 0x418}}], 0x2, 0x0) 02:07:56 executing program 4: perf_event_open(&(0x7f0000001600)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) r2 = inotify_init() read(r2, &(0x7f00000004c0)=""/170, 0xaa) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) fsopen(0x0, 0x0) ioctl$KDSKBENT(0xffffffffffffffff, 0x4b47, &(0x7f0000000080)={0x0, 0x81}) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x2000000) inotify_rm_watch(r2, r1) 02:07:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x0, 0x1, "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"}], 0x418}}], 0x2, 0x0) 02:07:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:07:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) write$P9_RREMOVE(r0, 0x0, 0x90) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @rand_addr="2d0be1aa0334b10da0ec57702dbec84b", 0x8000}, 0x1c) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) inotify_init1(0x800) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r2, &(0x7f00000002c0)="f0fac43d0ebb36ec9e8a27147716680dcdd95496312d0e23c78d88ff6637c6991073b2004871466e4b65ef2cece14dffba1c8cee41ed8799e766f8008447847b6d38716c1f174e979f", 0x49, 0x57, 0x0, 0xfffffffffffffdff) 02:07:57 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x10, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:07:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) write$P9_RREMOVE(r0, 0x0, 0x90) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @rand_addr="2d0be1aa0334b10da0ec57702dbec84b", 0x8000}, 0x1c) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) inotify_init1(0x800) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r2, &(0x7f00000002c0)="f0fac43d0ebb36ec9e8a27147716680dcdd95496312d0e23c78d88ff6637c6991073b2004871466e4b65ef2cece14dffba1c8cee41ed8799e766f8008447847b6d38716c1f174e979f", 0x49, 0x57, 0x0, 0xfffffffffffffdff) 02:07:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x0, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd183670c9b159d755eb78d2310f36ad7"}], 0x418}}], 0x2, 0x0) 02:07:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) write$P9_RREMOVE(r0, 0x0, 0x90) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @rand_addr="2d0be1aa0334b10da0ec57702dbec84b", 0x8000}, 0x1c) ioctl$sock_TIOCOUTQ(r1, 0x5411, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x3}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) inotify_init1(0x800) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r2, &(0x7f00000002c0)="f0fac43d0ebb36ec9e8a27147716680dcdd95496312d0e23c78d88ff6637c6991073b2004871466e4b65ef2cece14dffba1c8cee41ed8799e766f8008447847b6d38716c1f174e979f", 0x49, 0x57, 0x0, 0xfffffffffffffdff) 02:07:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x0, "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"}], 0x418}}], 0x2, 0x0) 02:07:57 executing program 3: rt_sigpending(0xffffffffffffffff, 0x0) 02:07:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x408, 0x1, 0x0, "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"}], 0x418}}], 0x2, 0x0) 02:07:57 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r3 = eventfd2(0x0, 0x0) read(r3, &(0x7f0000000340)=""/232, 0xe8) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r3}]) 02:07:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0xab, &(0x7f0000000200)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x6800, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x3000}]) 02:07:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x10, 0x1, 0x1}], 0x20}}], 0x2, 0x0) [ 307.785478][ T8873] vfat filesystem being mounted at /root/syzkaller-testdir568402665/syzkaller.20MbD5/33/file0 supports timestamps until 2107 (0x10391447e) 02:07:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:07:57 executing program 3: socket$vsock_stream(0x28, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) socket$packet(0x11, 0x3, 0x300) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) capget(0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 02:07:57 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:07:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x10, 0x1, 0x1}], 0x20}}], 0x2, 0x0) 02:07:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x10, 0x1, 0x1}], 0x20}}], 0x2, 0x0) [ 308.423629][ C0] net_ratelimit: 2 callbacks suppressed [ 308.423644][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 308.435271][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:07:58 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) r3 = eventfd2(0x0, 0x0) read(r3, &(0x7f0000000340)=""/232, 0xe8) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xdd4ad65, 0x0, 0x0, 0x1, r3}]) 02:07:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x210, 0x1, 0x1, "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"}], 0x220}}], 0x2, 0x0) 02:07:58 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:07:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x210, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb9556"}], 0x220}}], 0x2, 0x0) 02:07:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x210, 0x1, 0x1, "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"}], 0x220}}], 0x2, 0x0) [ 308.993618][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 308.999428][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:07:58 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) 02:07:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 02:07:58 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:07:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x308, 0x1, 0x1, "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"}], 0x318}}], 0x2, 0x0) 02:07:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:07:58 executing program 3: socket$inet(0x2, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000240)=""/4096, 0x0) 02:07:58 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3, 0x100010, r1, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 02:07:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x308, 0x1, 0x1, "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"}], 0x318}}], 0x2, 0x0) 02:07:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000600)={r0, &(0x7f0000000000)='|', 0x0}, 0x20) 02:07:59 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ed, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 02:07:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x308, 0x1, 0x1, "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"}], 0x318}}], 0x2, 0x0) 02:07:59 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(0x0, &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:07:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x388, 0x1, 0x1, "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"}], 0x398}}], 0x2, 0x0) 02:07:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x388, 0x1, 0x1, "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"}], 0x398}}], 0x2, 0x0) 02:07:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x388, 0x1, 0x1, "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"}], 0x398}}], 0x2, 0x0) 02:07:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) [ 310.023666][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 310.029506][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:07:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) fcntl$setstatus(r2, 0x4, 0x3fff) r3 = gettid() fcntl$setown(0xffffffffffffffff, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(0xffffffffffffffff, 0xa, 0x21) inotify_add_watch(0xffffffffffffffff, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:07:59 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(0x0, &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) [ 310.103620][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 310.109510][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:07:59 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73802c00"/16], 0x10) 02:07:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x3c8, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c2885"}], 0x3d8}}], 0x2, 0x0) 02:07:59 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'macvlan1\x00', 0x6011}) r2 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 02:07:59 executing program 3: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='xino=on']) [ 310.302313][ T8980] overlayfs: missing 'lowerdir' 02:08:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000075c0)={0x3, &(0x7f0000007580)=[{}, {0x3}, {0x6, 0x0, 0x0, 0x50000}]}) [ 310.326821][ T26] audit: type=1800 audit(5873652480.058:38): pid=8977 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16677 res=0 02:08:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 02:08:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x3c8, 0x1, 0x1, "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"}], 0x3d8}}], 0x2, 0x0) 02:08:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x3c8, 0x1, 0x1, "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"}], 0x3d8}}], 0x2, 0x0) 02:08:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000500), 0x4ad}], 0x1, 0x0, 0x0, 0x6800}}], 0x75d, 0x0) 02:08:00 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(0x0, &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:08:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) fcntl$setstatus(r2, 0x4, 0x3fff) r3 = gettid() fcntl$setown(0xffffffffffffffff, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(0xffffffffffffffff, 0xa, 0x21) inotify_add_watch(0xffffffffffffffff, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:00 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 02:08:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x3e8, 0x1, 0x1, "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"}], 0x3f8}}], 0x2, 0x0) 02:08:00 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000500), 0x4ad}], 0x1, 0x0, 0x0, 0x6800}}], 0x75d, 0x0) 02:08:00 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:08:00 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73802c00"/16], 0x10) 02:08:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x3e8, 0x1, 0x1, "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"}], 0x3f8}}], 0x2, 0x0) 02:08:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73802c00"/16], 0x10) 02:08:01 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0xc00c) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) 02:08:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x3e8, 0x1, 0x1, "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"}], 0x3f8}}], 0x2, 0x0) [ 311.406898][ T26] audit: type=1804 audit(5873652481.138:39): pid=9085 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="bus" dev="sda1" ino=16711 res=1 [ 311.451360][ T26] audit: type=1804 audit(5873652481.168:40): pid=9086 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="bus" dev="sda1" ino=16711 res=1 02:08:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x54, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x22, 0x12, @xfrm={{0x9, 0x1, 'xfrm\x00'}, {0x24, 0x2, [@IFLA_XFRM_IF_ID={0x8}, @IFLA_XFRM_IF_ID={0x8}, @IFLA_XFRM_IF_ID={0x8}, @IFLA_XFRM_LINK={0x8}]}}}]}, 0x54}}, 0x0) 02:08:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@check_strict='check=strict'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}, 0x22}]}) [ 311.646185][ T9093] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. [ 311.659575][ T9092] FAT-fs (loop4): Unrecognized mount option "fscontext=system_u"" or missing value [ 311.710773][ T9092] FAT-fs (loop4): Unrecognized mount option "fscontext=system_u"" or missing value 02:08:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) fcntl$setstatus(r2, 0x4, 0x3fff) r3 = gettid() fcntl$setown(0xffffffffffffffff, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(0xffffffffffffffff, 0xa, 0x21) inotify_add_watch(0xffffffffffffffff, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x3f8, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd1"}], 0x408}}], 0x2, 0x0) 02:08:01 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:08:01 executing program 2: r0 = socket(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="4400000002010bdb0000000000000000e728995106256dafaa02000000300001002c00010014000300fe8000000000000000000000001500bb14080400fe8800000000000000000000000600014448e0dea1455de12e1121fd8fff3436d64dbe"], 0x44}}, 0x0) 02:08:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000000400)="eb3c90656b66732e666174000204010002000270fff857", 0x17}], 0x0, 0x0) statfs(&(0x7f00000000c0)='./file0\x00', 0x0) 02:08:01 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x5, 0x0, 0xa}]}, 0x20}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73802c00"/16], 0x10) 02:08:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x3f8, 0x1, 0x1, "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"}], 0x408}}], 0x2, 0x0) [ 312.046831][ T9111] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 312.056465][ T9103] FAT-fs (loop3): Directory bread(block 175) failed 02:08:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x3f8, 0x1, 0x1, "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"}], 0x408}}], 0x2, 0x0) [ 312.101009][ T9103] FAT-fs (loop3): Directory bread(block 176) failed [ 312.143671][ T9103] FAT-fs (loop3): Directory bread(block 177) failed [ 312.150369][ T9103] FAT-fs (loop3): Directory bread(block 178) failed [ 312.167867][ T9103] FAT-fs (loop3): Directory bread(block 179) failed [ 312.184516][ T9103] FAT-fs (loop3): Directory bread(block 180) failed 02:08:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x400, 0x1, 0x1, "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"}], 0x410}}], 0x2, 0x0) [ 312.200800][ T9103] FAT-fs (loop3): Directory bread(block 181) failed [ 312.213108][ T9103] FAT-fs (loop3): Directory bread(block 182) failed [ 312.221075][ T9103] FAT-fs (loop3): Directory bread(block 183) failed [ 312.231479][ T9103] FAT-fs (loop3): Directory bread(block 184) failed [ 312.239180][ T9103] vfat filesystem being mounted at /root/syzkaller-testdir273253376/syzkaller.3oa8uQ/46/file0 supports timestamps until 2107 (0x10391447e) 02:08:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) 02:08:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x400, 0x1, 0x1, "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"}], 0x410}}], 0x2, 0x0) [ 312.325258][ T9103] FAT-fs (loop3): Directory bread(block 175) failed [ 312.359372][ T9103] FAT-fs (loop3): Directory bread(block 176) failed [ 312.392133][ T9103] FAT-fs (loop3): Directory bread(block 177) failed 02:08:02 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_sa={0x2, 0x5, 0x0, 0xa}]}, 0x20}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73802c00"/16], 0x10) [ 312.463949][ T9103] FAT-fs (loop3): Directory bread(block 178) failed [ 312.470623][ T9103] FAT-fs (loop3): Directory bread(block 179) failed [ 312.500063][ T9103] FAT-fs (loop3): Directory bread(block 180) failed [ 312.529961][ T9103] FAT-fs (loop3): Directory bread(block 181) failed [ 312.562892][ T9103] FAT-fs (loop3): Directory bread(block 182) failed [ 312.588318][ T9103] FAT-fs (loop3): Directory bread(block 183) failed [ 312.611256][ T9103] FAT-fs (loop3): Directory bread(block 184) failed [ 312.624451][ T9103] vfat filesystem being mounted at /root/syzkaller-testdir273253376/syzkaller.3oa8uQ/46/file0 supports timestamps until 2107 (0x10391447e) 02:08:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x400, 0x1, 0x1, "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"}], 0x410}}], 0x2, 0x0) 02:08:02 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x510702, 0x0) 02:08:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) 02:08:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0xa00, 0xfffffffe, 0x0, 0x0) 02:08:02 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x400, 0x1, 0x1, "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"}], 0x410}}], 0x2, 0x0) 02:08:02 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000180)='./file0\x00', 0x0) 02:08:02 executing program 3: socket$vsock_stream(0x28, 0x1, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 02:08:02 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x400, 0x1, 0x1, "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"}], 0x410}}], 0x2, 0x0) 02:08:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 313.353832][ T26] audit: type=1804 audit(5873652483.088:41): pid=9183 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16628 res=1 02:08:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:03 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @local, @multicast2}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000002e40)={0x0, 0x0, 0x0, 0x6c, 0x0, 0x1}, 0x2c) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 02:08:03 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(0x0, 0x510702, 0x0) 02:08:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x400, 0x1, 0x1, "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"}], 0x410}}], 0x2, 0x0) 02:08:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x400, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd183670c9b159d755eb78d2310f36a"}], 0x410}}], 0x2, 0x0) 02:08:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r0, &(0x7f00000001c0)=""/102400, 0xfffffdad, 0x0) 02:08:03 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:03 executing program 3: r0 = socket(0x1, 0x5, 0x0) fremovexattr(r0, 0xffffffffffffffff) 02:08:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x400, 0x1, 0x1, "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"}], 0x410}}], 0x2, 0x0) 02:08:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:04 executing program 2: r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x7e, 0x0) r1 = dup2(r0, r0) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r2) r4 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r4, 0x28007d) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) [ 314.752039][ T26] audit: type=1800 audit(5873652484.478:42): pid=9220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="sda1" ino=16720 res=0 [ 314.776098][ T26] audit: type=1800 audit(5873652484.508:43): pid=9222 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="sda1" ino=16720 res=0 [ 314.797653][ T26] audit: type=1800 audit(5873652484.508:44): pid=9223 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="sda1" ino=16720 res=0 02:08:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r2, &(0x7f0000e6d000)=""/384, 0x180) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:04 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 02:08:04 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(0x0, 0x510702, 0x0) 02:08:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}, {0x400, 0x1, 0x1, "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"}], 0x410}}], 0x2, 0x0) 02:08:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:04 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) socket$packet(0x11, 0x3, 0x300) syz_open_pts(0xffffffffffffffff, 0x0) lstat(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x800) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 02:08:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x408, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd183670c9b159d755eb78d2310f36ad7"}], 0x408}}], 0x2, 0x0) 02:08:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x408, 0x0, 0x1, "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"}], 0x408}}], 0x2, 0x0) 02:08:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x408, 0x0, 0x1, "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"}], 0x408}}], 0x2, 0x0) [ 315.223616][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 315.229447][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:08:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x408, 0x0, 0x1, "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"}], 0x408}}], 0x2, 0x0) [ 315.543635][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 315.549451][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:08:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:05 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(0x0, 0x510702, 0x0) 02:08:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x408, 0x1, 0x0, "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"}], 0x408}}], 0x2, 0x0) 02:08:05 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 02:08:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73802c00"/16], 0x10) 02:08:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x7e, 0x0) r2 = dup2(r1, r1) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) sendto$inet6(r2, 0x0, 0x0, 0x1400c800, 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/12, 0xc) write$9p(r0, &(0x7f0000000800), 0x0) 02:08:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x408, 0x1, 0x0, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd183670c9b159d755eb78d2310f36ad7"}], 0x408}}], 0x2, 0x0) [ 316.097573][ T26] audit: type=1800 audit(5873652485.818:45): pid=9281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16728 res=0 02:08:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x408, 0x1, 0x0, "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"}], 0x408}}], 0x2, 0x0) 02:08:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="73802c00"/16], 0x10) [ 316.630545][ T26] audit: type=1800 audit(5873652486.358:46): pid=9285 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="sda1" ino=16728 res=0 02:08:06 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x33847962bbbc4179, 0x51, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 02:08:06 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) 02:08:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xfb) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:08:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x7e, 0x0) r2 = dup2(r1, r1) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) sendto$inet6(r2, 0x0, 0x0, 0x1400c800, 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/12, 0xc) write$9p(r0, &(0x7f0000000800), 0x0) [ 316.909009][ T26] audit: type=1800 audit(5873652486.638:47): pid=9309 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16728 res=0 02:08:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x7e, 0x0) r2 = dup2(r1, r1) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) sendto$inet6(r2, 0x0, 0x0, 0x1400c800, 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/12, 0xc) write$9p(r0, &(0x7f0000000800), 0x0) 02:08:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) 02:08:06 executing program 4: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) [ 317.115676][ T26] audit: type=1800 audit(5873652486.848:48): pid=9323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16737 res=0 02:08:06 executing program 4: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x210, 0x1, 0x1, "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"}], 0x210}}], 0x2, 0x0) 02:08:07 executing program 4: ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x7e, 0x0) r2 = dup2(r1, r1) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) sendto$inet6(r2, 0x0, 0x0, 0x1400c800, 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/12, 0xc) write$9p(r0, &(0x7f0000000800), 0x0) 02:08:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x210, 0x1, 0x1, "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"}], 0x210}}], 0x2, 0x0) [ 317.623082][ T26] audit: type=1800 audit(5873652487.348:49): pid=9340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16726 res=0 02:08:07 executing program 4: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x7e, 0x0) r2 = dup2(r1, r1) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) sendto$inet6(r2, 0x0, 0x0, 0x1400c800, 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/12, 0xc) write$9p(r0, &(0x7f0000000800), 0x0) 02:08:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x7e, 0x0) r2 = dup2(r1, r1) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) sendto$inet6(r2, 0x0, 0x0, 0x1400c800, 0x0, 0x0) read(r0, &(0x7f00000003c0)=""/12, 0xc) write$9p(r0, &(0x7f0000000800), 0x0) 02:08:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x210, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb9556"}], 0x210}}], 0x2, 0x0) 02:08:07 executing program 4: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x308, 0x1, 0x1, "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"}], 0x308}}], 0x2, 0x0) 02:08:07 executing program 4: r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 318.155751][ T26] audit: type=1800 audit(5873652487.888:50): pid=9359 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16736 res=0 02:08:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x308, 0x1, 0x1, "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"}], 0x308}}], 0x2, 0x0) 02:08:08 executing program 4: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 318.398987][ T26] audit: type=1800 audit(5873652488.128:51): pid=9369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16749 res=0 02:08:08 executing program 5: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000040)) 02:08:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x308, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aee"}], 0x308}}], 0x2, 0x0) 02:08:08 executing program 4: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:08 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c01000014000b1c0000000000000000ff800000000000000042fffffffffda9ffffffff00004000000000ec0000000500000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008400050000000000000000000000000000000000000000003200000000000000ac1e00010000000000000000000000000000000000000000000000000000000000000000fe800000000000000000000000000000000000003c00000000000000fe8000"/244], 0x13c}}, 0x0) 02:08:08 executing program 3: socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) readv(r0, &(0x7f00000017c0)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) 02:08:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x388, 0x1, 0x1, "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"}], 0x388}}], 0x2, 0x0) 02:08:08 executing program 4: r0 = socket(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:08 executing program 5: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000003200)=[{{&(0x7f0000000040)={0x2, 0x4e22}, 0x10, 0x0, 0x0, &(0x7f0000002800)=[@ip_retopts={{0x18, 0x0, 0x7, {[@cipso={0x86, 0x6}]}}}], 0x18}}], 0x1, 0x0) [ 319.168986][ T9395] capability: warning: `syz-executor.5' uses 32-bit capabilities (legacy support in use) 02:08:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x388, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2e"}], 0x388}}], 0x2, 0x0) 02:08:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:09 executing program 5: perf_event_open(&(0x7f0000001600)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000000)=0x4, 0x4) [ 319.335419][ T9402] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.2'. 02:08:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x388, 0x1, 0x1, "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"}], 0x388}}], 0x2, 0x0) 02:08:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000075c0)={0x3, &(0x7f0000007580)=[{}, {0x2}, {0x6, 0x0, 0x0, 0x50000}]}) 02:08:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() r1 = open(0x0, 0x0, 0x0) fchdir(r1) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) timer_create(0x8000000009, &(0x7f00000001c0)={0x0, 0x3e, 0x4, @tid=r0}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0x1c9c380}}, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r2, &(0x7f0000000080)=""/128, 0xae3f1a6) 02:08:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x3c8, 0x1, 0x1, "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"}], 0x3c8}}], 0x2, 0x0) 02:08:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000075c0)={0x3, &(0x7f0000007580)=[{}, {0x2}, {0x6, 0x0, 0x0, 0x50000}]}) 02:08:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x3c8, 0x1, 0x1, "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"}], 0x3c8}}], 0x2, 0x0) 02:08:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:10 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 02:08:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x3c8, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c2885"}], 0x3c8}}], 0x2, 0x0) [ 320.574631][ T9444] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 02:08:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r2, &(0x7f0000e6d000)=""/384, 0x180) close(r2) r3 = inotify_init1(0x0) fcntl$setstatus(r2, 0x4, 0x3fff) r4 = gettid() fcntl$setown(r3, 0x8, r4) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r3, 0xa, 0x21) inotify_add_watch(r3, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_setup(0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() r1 = open(0x0, 0x0, 0x0) fchdir(r1) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, 0x0, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) timer_create(0x8000000009, &(0x7f00000001c0)={0x0, 0x3e, 0x4, @tid=r0}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0x1c9c380}}, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) read(r2, &(0x7f0000000080)=""/128, 0xae3f1a6) 02:08:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004980)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32], 0x4}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f00000017c0), 0x332, 0x4000) 02:08:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:10 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x3e8, 0x1, 0x1, "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"}], 0x3e8}}], 0x2, 0x0) 02:08:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004980)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYRES32], 0x4}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/mcfilter6\x00') preadv(r0, &(0x7f00000017c0), 0x332, 0x4000) 02:08:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x3e8, 0x1, 0x1, "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"}], 0x3e8}}], 0x2, 0x0) 02:08:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000788ffc)=0x30000001, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 02:08:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(0xffffffffffffffff, &(0x7f0000e6d000)=""/384, 0x180) close(0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x3e8, 0x1, 0x1, "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"}], 0x3e8}}], 0x2, 0x0) 02:08:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001500052f0000000000010000010000d9"], 0x14}}, 0x0) 02:08:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r0) socket(0x1, 0x1, 0x0) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 02:08:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x3f8, 0x1, 0x1, "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"}], 0x3f8}}], 0x2, 0x0) 02:08:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(0xffffffffffffffff, &(0x7f0000e6d000)=""/384, 0x180) close(0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x3f8, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd1"}], 0x3f8}}], 0x2, 0x0) 02:08:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001500052f0000000000010000010000d9"], 0x14}}, 0x0) 02:08:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x3f8, 0x1, 0x1, "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"}], 0x3f8}}], 0x2, 0x0) 02:08:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000600)={r0, &(0x7f00000001c0), &(0x7f0000000180)=""/16}, 0x18) 02:08:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=0x0}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:14 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) 02:08:14 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(0xffffffffffffffff, &(0x7f0000e6d000)=""/384, 0x180) close(0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x9}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000600)={r0, &(0x7f00000001c0), &(0x7f0000000180)=""/16}, 0x18) 02:08:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x400, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd183670c9b159d755e"}], 0x400}}], 0x2, 0x0) 02:08:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) shutdown(r0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000001200)={0x9bbd}, 0x4) 02:08:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:15 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x400, 0x1, 0x1, "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"}], 0x400}}], 0x2, 0x0) 02:08:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) dup2(r1, r2) 02:08:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) [ 325.558541][ T26] audit: type=1800 audit(5873652495.288:52): pid=9550 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16811 res=0 [ 325.625575][ T26] audit: type=1804 audit(5873652495.318:53): pid=9550 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16811 res=1 [ 325.675705][ T26] audit: type=1804 audit(5873652495.408:54): pid=9562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16811 res=1 02:08:15 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x400, 0x1, 0x1, "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"}], 0x400}}], 0x2, 0x0) 02:08:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:15 executing program 3: socket$vsock_stream(0x28, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$tipc(0x1e, 0x5, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socket$packet(0x11, 0x3, 0x300) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x6, 0x0) ioctl$TCSETS(r2, 0x40045431, 0x0) r3 = syz_open_pts(r2, 0x0) r4 = fcntl$getown(r3, 0x9) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) r6 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x78) fcntl$setlease(r6, 0x400, 0x1) capget(0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 02:08:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x400, 0x1, 0x1, "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"}], 0x400}}], 0x2, 0x0) 02:08:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) [ 326.351116][ T26] audit: type=1804 audit(5873652496.078:55): pid=9565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16811 res=1 [ 326.439143][ T26] audit: type=1804 audit(5873652496.108:56): pid=9562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16811 res=1 02:08:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x400, 0x1, 0x1, "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"}], 0x400}}], 0x2, 0x0) 02:08:16 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:16 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 326.529129][ T26] audit: type=1804 audit(5873652496.108:57): pid=9565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16811 res=1 [ 326.673606][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 326.679420][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:08:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:16 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) writev(r0, &(0x7f0000000180)=[{0x0}], 0x1) [ 326.709054][ T26] audit: type=1800 audit(5873652496.438:58): pid=9593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16814 res=0 [ 326.743648][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 326.749450][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:08:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x400, 0x1, 0x1, "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"}], 0x400}}], 0x2, 0x0) [ 326.769700][ T26] audit: type=1804 audit(5873652496.498:59): pid=9593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16814 res=1 [ 326.847421][ T26] audit: type=1804 audit(5873652496.578:60): pid=9605 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16814 res=1 [ 326.903617][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 326.909408][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:08:16 executing program 3: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x0, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x400, 0x1, 0x1, "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"}], 0x400}}], 0x2, 0x0) 02:08:16 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) writev(r0, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x400, 0x1, 0x1, "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"}], 0x400}}], 0x2, 0x0) [ 327.193904][ T26] audit: type=1800 audit(5873652496.928:61): pid=9619 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16782 res=0 02:08:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x0, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:17 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:17 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:17 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) writev(r0, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x400, 0x1, 0x1, "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"}], 0x400}}], 0x2, 0x0) 02:08:17 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x0, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:17 executing program 3: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:17 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x408, 0x1, 0x1, "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"}], 0x408}}], 0x1, 0x0) 02:08:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x408, 0x1, 0x1, "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"}], 0x408}}], 0x1, 0x0) 02:08:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x408, 0x1, 0x1, "576cd69b9f5ded5e78f26510144a7dc910fbde017ef20c45258839668d2f3970903ceb1f7c49e7b8d4ca56cdf7cf9ef38f69220739ad0d9ead7f5b06d69600d918c1e4aa491715cf0d44597fa65b4c18ca37e1b7922950859d293f4f87fa469ef8802dc09f26d186ed33849025d7eb4f79757b11e6abab0d7f32fa07ae3de7ea6dfda2ac4bc58f4f03efa92441d5b6952c08dddb434dbd4690d2d5f7c3ba33f4f63a8653a41e4bdfd17d1d7f2a672e0e86b0f84ddba0a8d19d22e23b8240ed58f45ab1e757981d68bfe7633f2e319d286a9f70172aef069b72843b083f354e4d3150dd730526eae855c96850b212fcd17f38f2e36d028e6aa3ccd3ee278c76305f9526f5eedbbbfd98a64466956f777e903251f2610e1eeedf22e01445c1d1697dc81ef6e3d03399baa68183bea9737500e98e812b11f372364ffdef32d36b5d57db4acff76e8b55b84b735ed88dcc7e64e3e62d7938a5d244a0fddc441aa32fabe2dc52ce6bbb67fc6bd5575b0908f004ac3d47ee69db38138f6bfef1fe86f8af49669e984ec4602e0f8f3b9bde2ddd6c634dff7912437564a36b02bd525e5255713d15b14fd1db9d9bb5195d8eb45f6577b601b7618fcf34d54229248f4bf66abcd72b0961e79c81ea96a62e12066adceadc23fdd6d062835f4912ca90ddc77f0af7a00e5e1ead421b5d83ff5f4af82f9087296d85eb95566a8fa64d9a6a1513810ea64ab0c756c31349453a856c3c8d661b5ac109a50f231a61ff7b3ab5538290d63a6abb3c19723656385d7cac008cfb6f5a3a552d11e09ce658920b04deadc961b0961f169dc8d44fd1b1fe2992f7dea870a5178344c48524e7f19e0c23ea3b7e858b67971dc4a9b01227c1e4b32a89e35a45dbb0e1f035d262879579992df0ccb990d621b0036a5c63cd8ff21562d1509f4ba6ed72df8a1566d19bb8459f510e96168ee251b9bd22125e0a6b29893729d03e01d46f04ddeb3c13a32dacdf9337552888e77c03b866680010dfc46be5cebed6b46e66ce7cf145e316fd74687f9628e88d26d3522c848be8802509d05ce63aeecca4af801812203e32534033b6e32c47b865bd1274eab90e7ca8f1c50ccfea47f2816478a64ecb8528de61973f4d72f2df7164f6865a8f3118631ff3f3a8012a7156ae9dae3f956eaccade51696f7580253e83da49ed996b8fdd8317a0adcfb32589ba699cc2765e272e88281dd4974c61141cea09ebb956681d9d563c2edf94a9567740a5bef5d3f92b627c487fc72b79746b8871b9910cfb0a7a83bb72f8cb834857ff01598f3739ed4af1aca1470dd7fba5bd53e8eef49e191c28857f88cfbc6126f1b79a672d0139160b658af73cf969d0dad93546461b9432591dda26bf03c1fb0c6fb6576786088e0dd183670c9b159d755eb78d2310f36ad7"}], 0x408}}], 0x1, 0x0) 02:08:18 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv6_getnetconf={0x14, 0x3a, 0x705}, 0x14}}, 0x0) 02:08:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv6_getnetconf={0x14, 0x3a, 0x705}, 0x14}}, 0x0) 02:08:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 02:08:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:18 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:19 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f00000047c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@ipv6_getnetconf={0x14, 0x3a, 0x705}, 0x14}}, 0x0) 02:08:19 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 02:08:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:19 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 02:08:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:19 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 02:08:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:19 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 02:08:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:19 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 02:08:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast2, 0x8}, 0x1c) sendmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="72fe", 0x2}], 0x1}}], 0x1, 0x0) 02:08:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:20 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 02:08:20 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 02:08:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x6, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) 02:08:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00'}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 02:08:20 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 02:08:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00'}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, 0x0) 02:08:20 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) 02:08:20 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) 02:08:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x11, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="711204000000000061134c0000000000bf2000000000000015000000080000002d0301000000000095000000000000006916000000000000bf67000000000000150600000fff07006706000002000000070600000ee60000bf050000000000000f150000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c27df8ecf264e0f84f9f17d3c30e3c7bdd2d17f2f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703d6c4f633a9a4f16d0a3e1282ee45a010fb94fe9de56c9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5af65727546e7c955ccefa1f6ab689fde4de4e63ede20271a51445dc8da39e5b0ab7bcb8f512036a5ba6d04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb735fd552bdc268694aeb0743e32dc819b6cf5c8ac86f8a297dff0445a13d0045fb3cda32a673a6bb55d8c85f21dce431e56723888fb126a163f16fb2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67a993716dbf580469f0f53acbb40b401e3738270b315d362ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000000000bc00f674629709e7e78f4ddc211bc3ebf0bd9d42ca019dd5d022cf74686e9fbe2562671cd47840a7afaab43176e65ec1118d46d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7eab04871bc47287cd31cc43ea0ffb567b40407d000000000000000000000000005f37d83f84e98a523d80bd0d0d703f37ca363f601ae899a53f6715a0a62a34b0c94cce6994521629ab028acfc1d926a0f6a5480a55c22fe394ac000000000000000000000000000000437d57defb79ea"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff35}, 0x24) 02:08:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, 0x0) 02:08:20 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) 02:08:20 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00'}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:20 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) 02:08:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r0, 0x89f1, 0x0) 02:08:20 executing program 1: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000280)={[{@xino_on='xino=on'}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@metacopy_on='metacopy=on'}]}) 02:08:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r3}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFA_FLAGS={0x8, 0x8, 0x400}]}, 0x28}}, 0x0) [ 331.289879][ T9789] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 02:08:21 executing program 1: r0 = epoll_create1(0x0) r1 = socket(0x1e, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000080)={0x20000008}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x20002007}) 02:08:21 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 02:08:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x42f}) [ 331.440427][ T26] kauditd_printk_skb: 17 callbacks suppressed [ 331.440556][ T26] audit: type=1800 audit(5873652501.168:79): pid=9797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16806 res=0 [ 331.530364][ T26] audit: type=1804 audit(5873652501.198:80): pid=9797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16806 res=1 02:08:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) [ 331.663179][ T26] audit: type=1804 audit(5873652501.298:81): pid=9808 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16806 res=1 02:08:21 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:21 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 02:08:21 executing program 4: r0 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000240)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) creat(&(0x7f0000000580)='./bus\x00', 0x0) 02:08:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0xffff, 0x36}) [ 332.260117][ T26] audit: type=1804 audit(5873652501.988:82): pid=9831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir568402665/syzkaller.20MbD5/102/bus" dev="sda1" ino=16847 res=1 [ 332.386869][ T26] audit: type=1804 audit(5873652501.988:83): pid=9831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir568402665/syzkaller.20MbD5/102/bus" dev="sda1" ino=16847 res=1 [ 332.412551][ T26] audit: type=1804 audit(5873652501.988:84): pid=9831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir568402665/syzkaller.20MbD5/102/bus" dev="sda1" ino=16847 res=1 02:08:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:22 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) [ 332.437495][ T26] audit: type=1804 audit(5873652501.988:85): pid=9834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir568402665/syzkaller.20MbD5/102/bus" dev="sda1" ino=16847 res=1 02:08:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) [ 332.515466][ T9845] vfat filesystem being mounted at /root/syzkaller-testdir568402665/syzkaller.20MbD5/103/file0 supports timestamps until 2107 (0x10391447e) [ 332.588919][ T26] audit: type=1800 audit(5873652502.168:86): pid=9846 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16862 res=0 [ 332.609771][ T26] audit: type=1804 audit(5873652502.188:87): pid=9846 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16862 res=1 [ 332.631257][ T26] audit: type=1804 audit(5873652502.238:88): pid=9840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16862 res=1 02:08:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) [ 332.731269][ T9845] vfat filesystem being mounted at /root/syzkaller-testdir568402665/syzkaller.20MbD5/103/file0 supports timestamps until 2107 (0x10391447e) 02:08:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:22 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:22 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 02:08:22 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x3d) write$binfmt_aout(r0, &(0x7f0000000340)={{0x128, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86}}, 0x20) 02:08:22 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:23 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) 02:08:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:23 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000140)=@known='trusted.overlay.impure\x00', 0x0, 0x0) 02:08:23 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:23 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) 02:08:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:23 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) 02:08:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x2, 0x4, 0x100000001}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f00000001c0), 0x0}, 0x20) 02:08:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000007910300000000000270000000000fd8f9500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe0c, 0x10, &(0x7f0000000000), 0xffffffffffffff18}, 0x48) 02:08:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:23 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x11, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff35}, 0x24) 02:08:23 executing program 4: epoll_create1(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_CARRIER={0x5}, @IFLA_PROTO_DOWN={0x5}]}, 0x30}}, 0x0) 02:08:24 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2, 0x3, 0x300, 0x190, 0x0, 0x190, 0x190, 0x190, 0x268, 0x268, 0x268, 0x268, 0x268, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x190, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "bdc74c01369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa6ecab6b1d2cc05e3182f64694d7d05fb8b8c8f56627a54f905d564eeeb8334f650ca0f3c44f7fda4d20a55050342ea85ecc8838e7088de33582f36a0a375bb7008adc297a5ece1bb2df53d17bef26bb6f800", 0x7f}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'hsr0\x00', 'ip6gretap0\x00'}, 0x0, 0x98, 0xd8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x390) 02:08:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:24 executing program 4: r0 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x53, 0x0, 0x0, 0x0, 0xfffffffffffffde4}}], 0x8000000000001f0, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 334.457471][ T9944] Cannot find add_set index 0 as target 02:08:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:24 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2, 0x3, 0x300, 0x190, 0x0, 0x190, 0x190, 0x190, 0x268, 0x268, 0x268, 0x268, 0x268, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x130, 0x190, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "bdc74c01369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa6ecab6b1d2cc05e3182f64694d7d05fb8b8c8f56627a54f905d564eeeb8334f650ca0f3c44f7fda4d20a55050342ea85ecc8838e7088de33582f36a0a375bb7008adc297a5ece1bb2df53d17bef26bb6f800", 0x7f}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'hsr0\x00', 'ip6gretap0\x00'}, 0x0, 0x98, 0xd8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x390) 02:08:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x5, 0x0, &(0x7f0000001000)) [ 334.721602][ T9957] Cannot find add_set index 0 as target 02:08:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) eventfd2(0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:24 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f000000e940)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000001540)=[{0xffffffffffffffbf}, {0xfffffffffffffed3}], 0x20}}], 0x1, 0x0) 02:08:25 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:25 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in=@loopback, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @extra_flags={0x8}]}, 0x140}}, 0x0) 02:08:25 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) eventfd2(0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:25 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) 02:08:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 02:08:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) eventfd2(0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1) 02:08:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'vcan0\x00', &(0x7f0000001340)=@ethtool_per_queue_op={0x4b, 0x1}}) 02:08:25 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x2, 0x4, 0x100000001}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000001c0), 0x0}, 0x20) 02:08:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, 0x0, 0x0) 02:08:25 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:25 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:25 executing program 4: perf_event_open(&(0x7f0000001600)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='auxv\x00') r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x2000000) inotify_rm_watch(r2, r1) 02:08:25 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) readv(r0, &(0x7f0000019fe0)=[{&(0x7f00008ec000)=""/219, 0x30}], 0x1000000000000308) socket$inet_udplite(0x2, 0x2, 0x88) 02:08:25 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, 0x0, 0x0) 02:08:26 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:26 executing program 3: socket$vsock_stream(0x28, 0x1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socket$tipc(0x1e, 0x5, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) 02:08:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, 0x0, 0x32}, 0x20) 02:08:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, 0x0, 0x0) 02:08:26 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) [ 336.456238][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 336.456256][ T26] audit: type=1804 audit(5873652506.188:100): pid=10032 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16737 res=1 02:08:26 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xc, 0x0, &(0x7f0000001000)) [ 337.063633][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 337.069620][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:08:26 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180), 0x0) 02:08:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 02:08:26 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) [ 337.143634][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 337.149464][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:08:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180), 0x0) 02:08:27 executing program 4: unshare(0x400) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r0) [ 337.303617][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 337.309584][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:08:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000480)={&(0x7f0000000080)={0x2, 0x4e21, @remote}, 0x10, 0x0}, 0x0) 02:08:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:27 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) [ 337.378276][ T26] audit: type=1800 audit(5873652507.108:101): pid=10058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16737 res=0 [ 337.462745][ T26] audit: type=1804 audit(5873652507.138:102): pid=10058 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16737 res=1 02:08:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000007910300000000000270000000000fd8f9500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe0c, 0x10, &(0x7f0000000000), 0xffffffffffffff18}, 0x48) 02:08:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000540)=@req={0x289, &(0x7f0000000040)={'\x00', @ifru_flags}}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x587, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000001020000000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 337.526398][ T26] audit: type=1804 audit(5873652507.188:103): pid=10062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16737 res=1 [ 337.758054][T10082] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 337.776462][T10082] EXT4-fs (loop3): fragment/cluster size (2048) != block size (1024) 02:08:27 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x2, 0x4, 0x100000001}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040)="80", &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f00000001c0), 0x0}, 0x20) 02:08:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$uinput_user_dev(r0, &(0x7f0000000340)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f9e]}, 0x45c) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = eventfd2(0x0, 0x0) writev(r1, &(0x7f0000000180), 0x0) 02:08:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:27 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) msync(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x6) 02:08:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x30, 0x0, 0x0, 0x120) [ 338.245697][ T26] audit: type=1800 audit(5873652507.978:104): pid=10104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16744 res=0 02:08:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) [ 338.379529][ T26] audit: type=1804 audit(5873652508.008:105): pid=10104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16744 res=1 02:08:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0) [ 338.484739][ T26] audit: type=1804 audit(5873652508.068:106): pid=10113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16744 res=1 [ 338.933667][ T26] audit: type=1800 audit(5873652508.658:107): pid=10098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16836 res=0 02:08:28 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:28 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 02:08:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:28 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) readv(r0, &(0x7f00000017c0)=[{&(0x7f00000004c0)=""/4096, 0x200014c0}], 0x1) 02:08:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:28 executing program 4: perf_event_open(&(0x7f0000001600)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20000000) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x2000000) inotify_rm_watch(r2, r1) [ 339.157699][ T26] audit: type=1800 audit(5873652508.888:108): pid=10141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16838 res=0 [ 339.269302][ T26] audit: type=1804 audit(5873652508.888:109): pid=10141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16838 res=1 02:08:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000000180)=@newsa={0xf8, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x3c}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@tfcpad={0x8}]}, 0xf8}}, 0x0) 02:08:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:29 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000600)={0x2}) fcntl$getownex(r0, 0x10, &(0x7f0000000940)) 02:08:29 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) epoll_create1(0x0) shutdown(r0, 0x0) 02:08:29 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = fcntl$dupfd(r3, 0x0, r4) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e31, @dev}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x402}, 0x20000000) [ 340.038768][T10180] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 02:08:29 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:30 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[], 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:30 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:30 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:30 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:31 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r1, &(0x7f0000e6d000)=""/384, 0x180) close(r1) r2 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x3fff) r3 = gettid() fcntl$setown(r2, 0x8, r3) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r2, 0xa, 0x21) inotify_add_watch(r2, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:31 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x2, 0x4, 0x100000001}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f00000001c0), 0x0}, 0x20) 02:08:31 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000075c0)={0x3, &(0x7f0000007580)=[{}, {0x4}, {0x6, 0x0, 0x0, 0x50000}]}) 02:08:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:31 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:31 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:31 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:31 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x40000000, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast1}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x1, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 02:08:31 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:32 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) [ 342.360322][ T26] kauditd_printk_skb: 7 callbacks suppressed [ 342.360345][ T26] audit: type=1800 audit(5873652512.088:117): pid=10261 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16516 res=0 [ 342.459453][ T26] audit: type=1804 audit(5873652512.128:118): pid=10261 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16516 res=1 02:08:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) [ 342.551203][ T26] audit: type=1804 audit(5873652512.178:119): pid=10273 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16516 res=1 02:08:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:32 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:32 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:32 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000001000)) 02:08:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:32 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:32 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:32 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) socket(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r1, 0x28007d) r2 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000001c0), 0x8080fffffffe) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000100)=0x6e) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000a40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) preadv(r3, &(0x7f00000017c0), 0x1a1, 0x0) 02:08:32 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:32 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(0xffffffffffffffff, 0x11, 0x80000, 0xabca) [ 343.292489][ T26] audit: type=1800 audit(5873652513.018:120): pid=10307 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16931 res=0 [ 343.343429][ T26] audit: type=1804 audit(5873652513.018:121): pid=10307 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16931 res=1 02:08:33 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) [ 343.395596][ T26] audit: type=1804 audit(5873652513.108:122): pid=10320 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16931 res=1 02:08:33 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(0xffffffffffffffff, 0x11, 0x80000, 0xabca) [ 343.469144][ T26] audit: type=1804 audit(5873652513.198:123): pid=10327 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="file0" dev="sda1" ino=16941 res=1 [ 343.550452][ T26] audit: type=1800 audit(5873652513.278:124): pid=10319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16941 res=0 [ 343.601427][ T26] audit: type=1800 audit(5873652513.278:125): pid=10327 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16941 res=0 02:08:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080025944eeba71a4976e252922c000000002aba000000012e0b3836005404b0e0301a4ce875f2e0ff5f163ee340b7679500800000000000000101013c5891039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x14, 0x16, [{0x10, 0x1, [@IFLA_VF_SPOOFCHK={0xc}]}]}]}, 0x34}}, 0x0) 02:08:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:33 executing program 3: write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(0xffffffffffffffff, 0x11, 0x80000, 0xabca) 02:08:33 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xc, 0x0, &(0x7f0000001000)) 02:08:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:33 executing program 3: r0 = open(0x0, 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) [ 344.160460][ T26] audit: type=1800 audit(5873652513.888:126): pid=10345 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16519 res=0 02:08:34 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(r1, 0x0, 0x0) setregid(0x0, 0xffffffffffffffff) 02:08:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:34 executing program 3: r0 = open(0x0, 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, &(0x7f0000001000)) 02:08:34 executing program 5: open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001e80)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_CARRIER={0x8}]}, 0x28}}, 0x0) 02:08:34 executing program 3: r0 = open(0x0, 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) [ 344.632336][T10374] netlink: 'syz-executor.5': attribute type 33 has an invalid length. 02:08:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, &(0x7f0000001000)) 02:08:34 executing program 4: r0 = creat(0x0, 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:34 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:34 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:34 executing program 4: r0 = creat(0x0, 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:35 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, &(0x7f0000001000)) 02:08:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:35 executing program 4: r0 = creat(0x0, 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:35 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:35 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, 0x0) 02:08:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:35 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:35 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, 0x0) 02:08:35 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:35 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:35 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:36 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYRES16], 0x2) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1, 0x10012, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0xc, 0x0, 0x0) 02:08:36 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:36 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:36 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:36 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:36 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, 0x0, 0x0) fallocate(r0, 0x11, 0x80000, 0xabca) 02:08:36 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:36 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000632177fbac141429e0", 0x0, 0x9, 0x0, 0x3f000000}, 0x28) 02:08:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:36 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000bd7000)={&(0x7f0000000340)=@newsa={0x138, 0x10, 0x717, 0x0, 0x0, {{@in6=@mcast2, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in=@broadcast, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 02:08:36 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:37 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(0xffffffffffffffff, 0x11, 0x80000, 0xabca) 02:08:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000bd7000)={&(0x7f0000000340)=@newsa={0x138, 0x10, 0x717, 0x0, 0x0, {{@in6=@mcast2, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in=@broadcast, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 02:08:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:37 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:37 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:37 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:37 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(0xffffffffffffffff, 0x11, 0x80000, 0xabca) [ 348.070150][T10502] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 02:08:37 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:37 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000280)) setuid(0x0) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) [ 348.238313][ T26] kauditd_printk_skb: 11 callbacks suppressed [ 348.238332][ T26] audit: type=1800 audit(5873652517.968:138): pid=10509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16769 res=0 [ 348.327120][T10519] netlink: 'syz-executor.1': attribute type 31 has an invalid length. [ 348.338953][ T26] audit: type=1804 audit(5873652518.008:139): pid=10509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16769 res=1 02:08:38 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:38 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) [ 348.381680][ T26] audit: type=1804 audit(5873652518.098:140): pid=10521 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16769 res=1 02:08:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:38 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) [ 348.568991][T10529] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 02:08:38 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:38 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:38 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:38 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:38 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(0xffffffffffffffff, 0x11, 0x80000, 0xabca) [ 349.040933][T10541] netlink: 'syz-executor.1': attribute type 31 has an invalid length. 02:08:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:38 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setuid(r2) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:38 executing program 1: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) [ 349.231447][ T26] audit: type=1800 audit(5873652518.958:141): pid=10550 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16771 res=0 02:08:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) [ 349.298133][ T26] audit: type=1804 audit(5873652518.988:142): pid=10550 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16771 res=1 02:08:39 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) [ 349.388238][ T26] audit: type=1804 audit(5873652519.058:143): pid=10563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16771 res=1 02:08:39 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x80082102, 0x0) 02:08:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:39 executing program 1: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:39 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:39 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x0, 0x80000, 0xabca) 02:08:39 executing program 1: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:39 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) write$P9_RREAD(r0, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) [ 350.119093][ T26] audit: type=1800 audit(5873652519.848:144): pid=10594 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16977 res=0 02:08:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(0x0, 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) [ 350.248662][ T26] audit: type=1804 audit(5873652519.848:145): pid=10594 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16977 res=1 02:08:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:40 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:40 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x80082102, 0x0) 02:08:40 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:40 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000001cc0)={0xb}, 0xb) 02:08:40 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x0, 0x80000, 0xabca) [ 350.999555][ T26] audit: type=1800 audit(5873652520.728:146): pid=10630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16979 res=0 02:08:40 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:40 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000001cc0)={0xb}, 0xb) [ 351.096860][ T26] audit: type=1804 audit(5873652520.728:147): pid=10630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16979 res=1 02:08:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(0x0, 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/268], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:41 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, 0x0, 0x0) 02:08:41 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r3, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x80082102, 0x0) 02:08:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:41 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, 0x0, 0x0) 02:08:41 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x44) 02:08:41 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x0, 0x80000, 0xabca) 02:08:41 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x44) 02:08:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:41 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x512dd4b2cbc5040e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) write$P9_RREAD(r0, 0x0, 0x0) 02:08:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(0x0, 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:41 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x44) 02:08:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x2}) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:42 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, 0x0) 02:08:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:42 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x2}) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:42 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x0, 0xabca) 02:08:42 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x2}) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(0xffffffffffffffff, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x2}) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:42 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:42 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, 0x0) 02:08:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:43 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:43 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x0, 0x0) 02:08:43 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, 0x0) 02:08:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(0xffffffffffffffff, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:43 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x0, 0x1}, 0x44) [ 353.752592][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 353.752610][ T26] audit: type=1800 audit(5873652523.478:156): pid=10745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16986 res=0 02:08:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) [ 353.863231][ T26] audit: type=1804 audit(5873652523.518:157): pid=10745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16986 res=1 02:08:43 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(0xffffffffffffffff, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:43 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) [ 353.958871][ T26] audit: type=1804 audit(5873652523.518:158): pid=10745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16986 res=1 02:08:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) [ 354.117480][ T26] audit: type=1800 audit(5873652523.848:159): pid=10769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16522 res=0 [ 354.228057][ T26] audit: type=1804 audit(5873652523.878:160): pid=10769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16522 res=1 [ 354.297589][ T26] audit: type=1804 audit(5873652523.878:161): pid=10769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16522 res=1 02:08:44 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x0, 0x0) 02:08:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:44 executing program 4: ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x2}) ioctl(0xffffffffffffffff, 0x8b32, &(0x7f0000000040)) 02:08:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, 0x0, 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:44 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) 02:08:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:44 executing program 4: ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x2}) ioctl(0xffffffffffffffff, 0x8b32, &(0x7f0000000040)) 02:08:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x44) [ 354.698983][ T26] audit: type=1800 audit(5873652524.428:162): pid=10791 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16993 res=0 [ 354.802575][ T26] audit: type=1804 audit(5873652524.488:163): pid=10791 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="file0" dev="sda1" ino=16993 res=1 02:08:44 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, 0x0, 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:44 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x7fffffa7) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r4, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, 0x0) [ 354.910112][ T26] audit: type=1804 audit(5873652524.498:164): pid=10791 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16993 res=1 [ 355.125028][ T26] audit: type=1800 audit(5873652524.858:165): pid=10817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16527 res=0 02:08:45 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000080)={0x18}, 0xfffffed3) fallocate(r0, 0x11, 0x0, 0x0) 02:08:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:45 executing program 4: ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x2}) ioctl(0xffffffffffffffff, 0x8b32, &(0x7f0000000040)) 02:08:45 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, 0x0, 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:45 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, 0x0) 02:08:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:45 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:45 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, 0x0) 02:08:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:46 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xc0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, 0x0) 02:08:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x2, 0xffbf) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") sendto$inet6(r0, 0x0, 0x0, 0x20044882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 02:08:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800"/134], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:46 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, 0x0) 02:08:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800"/134], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800"/134], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x2, 0xffbf) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") sendto$inet6(r0, 0x0, 0x0, 0x20044882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 02:08:46 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d"], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, 0x90) 02:08:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x2, 0xffbf) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") sendto$inet6(r0, 0x0, 0x0, 0x20044882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 02:08:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x2, 0xffbf) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") sendto$inet6(r0, 0x0, 0x0, 0x20044882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 02:08:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d"], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) 02:08:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x2, 0xffbf) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = socket(0x10, 0x80002, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") sendto$inet6(r0, 0x0, 0x0, 0x20044882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) 02:08:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d"], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:47 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, 0x0) 02:08:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) 02:08:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/235], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00'}) ioctl(r0, 0x8b32, &(0x7f0000000040)) 02:08:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x2, 0xffbf) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socket(0x10, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20044882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) 02:08:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) 02:08:47 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/235], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:47 executing program 4: socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x2}) ioctl(0xffffffffffffffff, 0x8b32, &(0x7f0000000040)) 02:08:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x0, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 02:08:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x2, 0xffbf) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socket(0x10, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20044882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) 02:08:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x90) 02:08:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/235], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:48 executing program 4: socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x2}) ioctl(0xffffffffffffffff, 0x8b32, &(0x7f0000000040)) 02:08:48 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffa7) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) open(0x0, 0x141046, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) dup(0xffffffffffffffff) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r3, 0x80082102, 0x0) 02:08:48 executing program 4: socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x2}) ioctl(0xffffffffffffffff, 0x8b32, &(0x7f0000000040)) 02:08:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x2, 0xffbf) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) socket(0x10, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20044882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) 02:08:48 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540100001000130700000000000000000000000000000000400000000000000000000000000000000000ff7fac14ffaa06000000000000000000007c16be1a00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000002000000001c001f00000001000000000000000000000000000000000000000000480001006d643500"/252], 0x4}, 0x1, 0x0, 0x0, 0x1}, 0x44) 02:08:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x90) [ 358.802286][ T26] kauditd_printk_skb: 13 callbacks suppressed [ 358.802307][ T26] audit: type=1804 audit(5873652528.528:179): pid=10977 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="file0" dev="sda1" ino=16769 res=1 02:08:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000040)={'virt_wifi0\x00', 0x2}) ioctl(r0, 0x0, &(0x7f0000000040)) 02:08:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x2, 0xffbf) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071") sendto$inet6(r0, 0x0, 0x0, 0x20044882, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}}, 0x1c) [ 359.153194][T10977] ================================================================== [ 359.161328][T10977] BUG: KCSAN: data-race in __add_to_page_cache_locked / invalidate_inode_pages2_range [ 359.171905][T10977] [ 359.174238][T10977] write to 0xffff8881254ea3f8 of 8 bytes by task 10967 on cpu 1: [ 359.181942][T10977] __add_to_page_cache_locked+0x298/0x780 [ 359.187644][T10977] add_to_page_cache_lru+0xc4/0x260 [ 359.192829][T10977] ext4_mpage_readpages+0x329/0x1580 [ 359.198099][T10977] ext4_readpages+0x92/0xc0 [ 359.202600][T10977] read_pages+0xa2/0x2d0 [ 359.206841][T10977] __do_page_cache_readahead+0x353/0x390 [ 359.212458][T10977] ondemand_readahead+0x35d/0x710 [ 359.217464][T10977] page_cache_sync_readahead+0x1ad/0x1e0 [ 359.223089][T10977] generic_file_read_iter+0xeb6/0x1440 [ 359.228564][T10977] ext4_file_read_iter+0x10c/0x380 [ 359.233681][T10977] generic_file_splice_read+0x35c/0x500 [ 359.239219][T10977] do_splice_to+0xf2/0x130 [ 359.243636][T10977] splice_direct_to_actor+0x1b6/0x540 [ 359.248989][T10977] do_splice_direct+0x161/0x1e0 [ 359.253824][T10977] do_sendfile+0x384/0x7f0 [ 359.258240][T10977] __x64_sys_sendfile64+0x12a/0x140 [ 359.263445][T10977] do_syscall_64+0xcc/0x3a0 [ 359.267948][T10977] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 359.273818][T10977] [ 359.276155][T10977] read to 0xffff8881254ea3f8 of 8 bytes by task 10977 on cpu 0: [ 359.283803][T10977] invalidate_inode_pages2_range+0x52/0xbb0 [ 359.289695][T10977] iomap_dio_rw+0x540/0x9a0 [ 359.294198][T10977] ext4_file_read_iter+0x2e4/0x380 [ 359.299303][T10977] generic_file_splice_read+0x35c/0x500 [ 359.304836][T10977] do_splice_to+0xf2/0x130 [ 359.309251][T10977] splice_direct_to_actor+0x1b6/0x540 [ 359.314605][T10977] do_splice_direct+0x161/0x1e0 [ 359.319456][T10977] do_sendfile+0x384/0x7f0 [ 359.323856][T10977] __x64_sys_sendfile64+0x12a/0x140 [ 359.329047][T10977] do_syscall_64+0xcc/0x3a0 [ 359.333537][T10977] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 359.339403][T10977] [ 359.341712][T10977] Reported by Kernel Concurrency Sanitizer on: [ 359.347854][T10977] CPU: 0 PID: 10977 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 359.356502][T10977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.366537][T10977] ================================================================== [ 359.374610][T10977] Kernel panic - not syncing: panic_on_warn set ... [ 359.381194][T10977] CPU: 0 PID: 10977 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 359.389852][T10977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.399893][T10977] Call Trace: [ 359.403206][T10977] dump_stack+0x11d/0x181 [ 359.407535][T10977] panic+0x210/0x640 [ 359.411421][T10977] ? vprintk_func+0x8d/0x140 [ 359.416000][T10977] kcsan_report.cold+0xc/0xd [ 359.420577][T10977] kcsan_setup_watchpoint+0x3fe/0x460 [ 359.425934][T10977] __tsan_read8+0xc6/0x100 [ 359.430339][T10977] invalidate_inode_pages2_range+0x52/0xbb0 [ 359.436216][T10977] ? __rcu_read_unlock+0x66/0x3d0 [ 359.441239][T10977] ? pagevec_lookup_range_tag+0x58/0x70 [ 359.446802][T10977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.453064][T10977] ? __filemap_fdatawait_range+0x1a4/0x1d0 [ 359.458879][T10977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.465105][T10977] ? __filemap_fdatawrite_range+0x14a/0x230 [ 359.470980][T10977] ? constant_test_bit+0x12/0x30 [ 359.475901][T10977] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 359.482123][T10977] ? filemap_check_errors+0xb6/0xd0 [ 359.487317][T10977] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 359.493556][T10977] iomap_dio_rw+0x540/0x9a0 [ 359.498076][T10977] ? constant_test_bit+0x12/0x30 [ 359.503158][T10977] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 359.509402][T10977] ext4_file_read_iter+0x2e4/0x380 [ 359.514540][T10977] ? ext4_file_read_iter+0x2e4/0x380 [ 359.519847][T10977] generic_file_splice_read+0x35c/0x500 [ 359.525390][T10977] do_splice_to+0xf2/0x130 [ 359.529790][T10977] ? add_to_pipe+0x1c0/0x1c0 [ 359.534417][T10977] ? add_to_pipe+0x1c0/0x1c0 [ 359.539025][T10977] splice_direct_to_actor+0x1b6/0x540 [ 359.544533][T10977] ? generic_pipe_buf_nosteal+0x20/0x20 [ 359.550103][T10977] do_splice_direct+0x161/0x1e0 [ 359.555020][T10977] do_sendfile+0x384/0x7f0 [ 359.559436][T10977] __x64_sys_sendfile64+0x12a/0x140 [ 359.564657][T10977] do_syscall_64+0xcc/0x3a0 [ 359.569153][T10977] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 359.575032][T10977] RIP: 0033:0x45af49 [ 359.578951][T10977] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 359.598539][T10977] RSP: 002b:00007ff971c6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 359.606947][T10977] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045af49 [ 359.615371][T10977] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000005 [ 359.623541][T10977] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 359.631508][T10977] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007ff971c6b6d4 [ 359.639474][T10977] R13: 00000000004c9b06 R14: 00000000004e2ae0 R15: 00000000ffffffff [ 359.648986][T10977] Kernel Offset: disabled [ 359.653327][T10977] Rebooting in 86400 seconds..