c967fe0a5a04eac9353887b432b2f74ae8bd4816c576d5edc39d03501f62cd8374e9618e9ea52b19cc4fc3dd78cc10d7686970f06155ad84f85a7ee59167d6cd", @ANYBLOB="804028bd7000fcdbdf25100000000c0009000800010009000000"], 0x2}, 0x1, 0x0, 0x0, 0x80}, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, 0x0}, 0x4008) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) timerfd_settime(r1, 0x0, 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200, 0x0) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_DUMPHMAC(r7, 0x0, 0x4000000) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000480)) dup2(r6, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'gre0\x00', r8}) sendmmsg(0xffffffffffffffff, &(0x7f0000002c40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000041) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f00000002c0)=0x2) userfaultfd(0x80400) 04:00:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x4, 0x41102) ioctl$VIDIOC_SUBDEV_G_EDID(r2, 0xc0285628, &(0x7f00000000c0)={0x0, 0x1, 0x2, [], &(0x7f0000000080)=0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r3, 0x800454d2, 0x70f000) 04:00:04 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000000)={r0, 0x1, 0x6, @dev={[], 0x2b}}, 0x10) [ 356.380413] device bridge_slave_1 left promiscuous mode [ 356.385985] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.440921] device bridge_slave_0 left promiscuous mode [ 356.446487] bridge0: port 1(bridge_slave_0) entered disabled state 04:00:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 04:00:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318", 0x2e}], 0x4, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f0000000000)={0x8, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) tkill(r0, 0x20) [ 356.632459] device hsr_slave_1 left promiscuous mode [ 356.683767] device hsr_slave_0 left promiscuous mode [ 356.743736] team0 (unregistering): Port device team_slave_1 removed [ 356.768557] team0 (unregistering): Port device team_slave_0 removed [ 356.805470] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 356.844270] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 356.968023] bond0 (unregistering): Released all slaves [ 357.038471] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 357.055864] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 357.079621] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 357.090578] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25964 sclass=netlink_route_socket pig=11265 comm=syz-executor.4 [ 357.104945] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 357.160232] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 357.201212] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:00:05 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xe, 0x40, 0xa9, 0x2, 0x104, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x3c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) 04:00:05 executing program 5: write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000080)={0xc, 0x47, "0ca7103910a30aae79fbaee0332afec63aeae8edfdacba95e9fff05256b19fb8c0e2bf2de1cb4e7985832dac94e5a09854e6587d6b1d1add53d4665524b6629548c424e0c5cdb5"}, 0x4d) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) [ 357.253194] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:00:05 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="240000001a0007041dfffd946f6105000a0000001f000000000008000800100012000000", 0x24}], 0x1}, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f00000000c0)='mime_type)lokeyring\xa8\x00', 0x15) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000080)=[@in={0x2, 0x4e20, @broadcast}], 0x10) [ 357.316636] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 357.346189] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 359.370871] IPVS: ftp: loaded support on port[0] = 21 [ 360.162144] IPVS: ftp: loaded support on port[0] = 21 [ 360.173433] chnl_net:caif_netlink_parms(): no params data found [ 360.238051] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.245156] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.252379] device bridge_slave_0 entered promiscuous mode [ 360.267770] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.277986] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.284959] device bridge_slave_1 entered promiscuous mode [ 360.357618] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 360.368074] chnl_net:caif_netlink_parms(): no params data found [ 360.378105] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 360.409199] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 360.417693] team0: Port device team_slave_0 added [ 360.427795] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 360.434868] team0: Port device team_slave_1 added [ 360.446912] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 360.454173] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 360.475495] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.481896] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.488693] device bridge_slave_0 entered promiscuous mode [ 360.499843] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.507242] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.514796] device bridge_slave_1 entered promiscuous mode [ 360.563583] device hsr_slave_0 entered promiscuous mode [ 360.600380] device hsr_slave_1 entered promiscuous mode [ 360.648744] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 360.655844] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 360.671125] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 360.679900] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 360.706952] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 360.714416] team0: Port device team_slave_0 added [ 360.719952] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 360.727552] team0: Port device team_slave_1 added [ 360.733144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 360.740371] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 360.814020] device hsr_slave_0 entered promiscuous mode [ 360.870386] device hsr_slave_1 entered promiscuous mode [ 360.910829] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 360.924092] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 360.932307] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.938636] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.945221] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.951584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.973586] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.979926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.986522] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.992857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.029278] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 361.035511] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.044256] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 361.057656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.064639] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.071476] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.078421] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.085176] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.098109] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 361.104306] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.114013] device bridge_slave_1 left promiscuous mode [ 361.119465] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.170701] device bridge_slave_0 left promiscuous mode [ 361.176150] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.334282] device hsr_slave_1 left promiscuous mode [ 361.374101] device hsr_slave_0 left promiscuous mode [ 361.414117] team0 (unregistering): Port device team_slave_1 removed [ 361.423545] team0 (unregistering): Port device team_slave_0 removed [ 361.433618] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 361.483074] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 361.562044] bond0 (unregistering): Released all slaves [ 361.606864] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.613687] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 361.624886] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 361.633339] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 361.642710] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 361.648930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.657215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.664789] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.671161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.678163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.685326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.693485] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 361.704686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.712649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.720173] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.726497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.735221] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 361.744041] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 361.750256] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.756449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.766657] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 361.775844] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 361.783720] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 361.792316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.799967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.807972] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.815693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.823616] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.831265] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.837590] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.844741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.855945] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 361.865757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.874297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.884143] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 361.893919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.902007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.909473] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.915835] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.962344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 361.971922] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 361.979485] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 361.986560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.994526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 362.002531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.009990] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.019340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 362.028811] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 362.036897] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 362.044350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 362.052477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 362.061735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 362.069365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.077129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.090785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.098395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 362.112882] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 362.126650] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 362.133992] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.145776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.154514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.167814] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 362.180440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.187921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.198396] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 362.206467] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 362.213493] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.226231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.239634] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 362.257118] 8021q: adding VLAN 0 to HW filter on device batadv0 04:00:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) setregid(0x0, 0x0) getgid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r2 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid'}}, {@access_uid={'access', 0x3d, r1}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x800, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000300)={@broadcast, @rand_addr=0x334e, r1}, 0xc) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001e007e802b025a8fe3ee01000000000000000000000000ee0fe07dbbdf710253935afe5919c99dd3e88ec79a7ba99a14786f6e", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000080)={0x1, 0x3, [@empty, @random="0fbbf9ea6402", @remote]}) [ 363.476017] 9pnet: p9_fd_create_tcp (11318): problem connecting socket to 127.0.0.1 04:00:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) 04:00:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE_V2(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x400, "954e8000000000000000000000000000000029000000000000001e00"}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 04:00:12 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r0}, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) connect(r1, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) sendmmsg$inet_sctp(r1, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x934) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0x1c9c380}}, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb3}, 0x8, 0x0) read(r2, &(0x7f0000000240)=""/128, 0x28a0ae9) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}}, 0x0) 04:00:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) setregid(0x0, 0x0) getgid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r2 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid'}}, {@access_uid={'access', 0x3d, r1}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) setregid(0x0, 0x0) getgid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r2 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid'}}, {@access_uid={'access', 0x3d, r1}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0x100000067) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000040)=0x1) [ 364.390350] device bridge_slave_1 left promiscuous mode [ 364.395913] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.471129] device bridge_slave_0 left promiscuous mode [ 364.477407] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.529459] 9pnet: p9_fd_create_tcp (11342): problem connecting socket to 127.0.0.1 [ 364.727093] device hsr_slave_1 left promiscuous mode [ 364.783930] device hsr_slave_0 left promiscuous mode [ 364.846344] team0 (unregistering): Port device team_slave_1 removed [ 364.872929] team0 (unregistering): Port device team_slave_0 removed [ 364.907095] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 364.964252] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 365.075122] bond0 (unregistering): Released all slaves [ 365.143709] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 365.157352] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:12 executing program 3: ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0x1, r0, 0x0) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, 0x0) [ 365.241894] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r1 = dup2(0xffffffffffffffff, r0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000340)={0x6462b2ac, 0x0, 0x1017, 0x3, 0x87, {0x0, 0x7f}, 0x1}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) listen(0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x46802) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, 0x0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "2c503327b7d1ed8572093b931ca822f9eb7d2ce0aed5e1146f52811ad5433ed4539431ef513b596953c8ff8a328f113acac88b9d0a7c5a758ebf6ba05295b4421073deefc9ef4be0795cd619b9ba3715f9304ae31a732b45f3089988f60e76c7fb39e2480a609b45677fb38bef84b7e1b8e5b0cf0b971bc8a8c9d4a45efa3e91837af9943c5431f2e58dff414f6d43ceb127c14cf1653fdb4eee2b26e66c98ec279a95aced4d35e1d72b5a5ff9a110ee728c2f809d1036ad4ddbbac3fbdead34bf2baf4eb2fbc5741dc7fed466931b584c2a81b7de267b9e19a8c83af3ec0fd44a8692462a4f19876e3c6a18b81717d4b9757ea5d2ed3bed79d93ebb6de7647d"}}}, 0x128) pipe(0x0) close(0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080), 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000580)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"], &(0x7f0000000100)=0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={r5}, &(0x7f00000001c0)=0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r4, 0x0) ftruncate(r2, 0x48280) r6 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r6, &(0x7f0000000080)={0x14}, 0x1000003ab) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 04:00:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x3c) [ 365.282615] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:13 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x0, 0x500, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) r4 = socket$inet(0x2, 0x3, 0x29) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565b, &(0x7f0000000380)={0x1, 0x8001, 0x2}) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r7 = dup2(r2, r6) ioctl$GIO_FONTX(r7, 0x4b6b, &(0x7f0000000280)=""/242) [ 365.409493] audit: type=1804 audit(1569988813.174:143): pid=11361 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir249748104/syzkaller.Y1NMGd/12/bus" dev="sda1" ino=16849 res=1 04:00:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='./file0\x00') r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) accept$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14) unlink(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') 04:00:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e00010200"/20, @ANYRES32=0x0, @ANYBLOB], 0x20}}, 0x0) [ 365.523486] audit: type=1804 audit(1569988813.174:144): pid=11361 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir249748104/syzkaller.Y1NMGd/12/bus" dev="sda1" ino=16849 res=1 04:00:13 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) sendmsg$nfc_llcp(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x27, 0x1, 0x2, 0x2, 0x0, 0x8, "cb35d2ac97cc493b4da44cbdb076159351d91d8eee1f2e2c54b45ead5a92ae028063a87c6a3f745cf510c6f0785e8a05a777809df66f7229aada47e828d6e9", 0xb}, 0x60, &(0x7f00000001c0)=[{&(0x7f0000000100)="ca4e45e46012638a35247cf5dc9c734fe91b0d28b263fabaaa05b8dc6539da42804a66e50c1d12da5a92c49c5411442b7bfa72a1200eadcbd58a5435c592ee1d89e7006fa664215ac3d79a432d9d52b1fbc66d4c1267a566d933d5bd94b8a51f6120054a1f810df574ab8020aabc7c46d314dea1ccf9d46d76334cb8fdaf8669d876526957455b9b52f436ef59cd7f4ac6a5b4e819363b34f7b5d984dda83a9bdffd864e868248516ca61574ec2e43bd590c217c0c3024813ad53c48e53611", 0xbf}], 0x1, &(0x7f0000000200)={0x98, 0x1, 0xc1eb, "076178379e4445b8f469a2b2caf04e61c23e39e6240e18021b51e284f04003ffe1a0e6cc5651a9e784e455c3c1a7775d95b8cfc654ca4206742ddba364eff90bb292cf1f1240ab9dee9c4a79a1dda07fa92db83ff676fc1cf9ef85c2a66eddca2f580705e7eebd714c6b815c9e92e4dc4cefae31610cd44563fee2bea519e6342a6e80c18499"}, 0x98, 0xc881}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000f00000a00000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 365.619839] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 365.658621] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 365.667307] audit: type=1804 audit(1569988813.224:145): pid=11362 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir249748104/syzkaller.Y1NMGd/12/bus" dev="sda1" ino=16849 res=1 04:00:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x20000) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000080), 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e22, @remote}, 0x10) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x101000, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 365.807006] ldm_validate_privheads(): Disk read failed. [ 365.849292] loop2: p1 < > p3 [ 365.859285] loop2: partition table partially beyond EOD, truncated [ 365.906032] loop2: p1 size 2 extends beyond EOD, truncated [ 365.953423] loop2: p3 size 32769 extends beyond EOD, truncated [ 366.114059] loop_reread_partitions: partition scan of loop2 () failed (rc=-16) [ 366.134563] print_req_error: 250 callbacks suppressed [ 366.134569] print_req_error: I/O error, dev loop2, sector 0 [ 366.152699] print_req_error: I/O error, dev loop2, sector 0 [ 366.173225] print_req_error: I/O error, dev loop2, sector 0 [ 366.179238] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 366.186725] print_req_error: I/O error, dev loop2, sector 0 [ 366.192592] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 366.200100] print_req_error: I/O error, dev loop2, sector 0 [ 366.205847] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 366.218466] print_req_error: I/O error, dev loop2, sector 0 [ 366.224320] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 366.231985] print_req_error: I/O error, dev loop2, sector 0 [ 366.237722] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 366.245328] print_req_error: I/O error, dev loop2, sector 0 [ 366.251093] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 366.258403] print_req_error: I/O error, dev loop2, sector 0 [ 366.264408] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 366.271763] print_req_error: I/O error, dev loop2, sector 0 [ 366.277476] Buffer I/O error on dev loop2p3, logical block 0, async page read [ 366.285138] Buffer I/O error on dev loop2p1, logical block 0, async page read [ 366.292503] Buffer I/O error on dev loop2p3, logical block 0, async page read 04:00:15 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x16, 0x4, @tid=r0}, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) connect(r1, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x80) sendmmsg$inet_sctp(r1, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x934) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0x1c9c380}}, 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb3}, 0x8, 0x0) read(r2, &(0x7f0000000240)=""/128, 0x28a0ae9) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x77359400}}, 0x0) [ 368.211389] IPVS: ftp: loaded support on port[0] = 21 [ 369.014020] IPVS: ftp: loaded support on port[0] = 21 [ 369.080487] chnl_net:caif_netlink_parms(): no params data found [ 369.138305] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.144772] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.151647] device bridge_slave_0 entered promiscuous mode [ 369.158390] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.164839] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.171724] device bridge_slave_1 entered promiscuous mode [ 369.235871] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 369.245200] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 369.290594] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 369.297608] team0: Port device team_slave_0 added [ 369.303346] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 369.310539] team0: Port device team_slave_1 added [ 369.315583] chnl_net:caif_netlink_parms(): no params data found [ 369.328607] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 369.338935] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 369.414282] device hsr_slave_0 entered promiscuous mode [ 369.450288] device hsr_slave_1 entered promiscuous mode [ 369.504829] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 369.511904] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 369.527132] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.533992] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.541385] device bridge_slave_0 entered promiscuous mode [ 369.554182] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.560728] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.567666] device bridge_slave_1 entered promiscuous mode [ 369.589071] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 369.599546] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 369.619965] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.626359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.632990] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.639325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.656232] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 369.663762] team0: Port device team_slave_0 added [ 369.669453] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 369.677031] team0: Port device team_slave_1 added [ 369.686289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 369.693730] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 369.754084] device hsr_slave_0 entered promiscuous mode [ 369.790435] device hsr_slave_1 entered promiscuous mode [ 369.834470] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 369.841554] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 369.867664] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.874037] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.880646] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.886970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.914958] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 369.921503] 8021q: adding VLAN 0 to HW filter on device bond0 [ 369.934276] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 369.944687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 369.951821] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.958392] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.966672] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.973449] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.984060] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 369.990429] 8021q: adding VLAN 0 to HW filter on device team0 [ 369.997452] device bridge_slave_1 left promiscuous mode [ 370.003402] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.050767] device bridge_slave_0 left promiscuous mode [ 370.056232] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.192264] device hsr_slave_1 left promiscuous mode [ 370.234002] device hsr_slave_0 left promiscuous mode [ 370.274530] team0 (unregistering): Port device team_slave_1 removed [ 370.284276] team0 (unregistering): Port device team_slave_0 removed [ 370.293678] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 370.333630] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 370.394956] bond0 (unregistering): Released all slaves [ 370.442907] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 370.450322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 370.457811] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.464185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.472101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 370.479647] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.486027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.503345] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 370.510855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 370.518884] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 370.533049] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 370.541714] 8021q: adding VLAN 0 to HW filter on device bond0 [ 370.549457] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 370.560285] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 370.569992] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 370.578026] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 370.587794] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 370.597002] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 370.604322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 370.613501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 370.621084] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 370.628226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.636941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 370.645681] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 370.658984] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 370.665491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 370.720198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 370.727806] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 370.740166] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 370.746243] 8021q: adding VLAN 0 to HW filter on device team0 [ 370.766026] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 370.779527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 370.787374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 370.795444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 370.803523] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.809865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.824452] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 370.834076] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 370.844239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 370.860465] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 370.868051] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.874424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.881996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 370.892315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 370.900258] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 370.908920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 370.926295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 370.941041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 370.948710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 370.956838] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 370.972018] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 370.981312] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 370.990522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 370.998176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 371.006372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 371.018991] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 371.029033] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 371.036918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 371.045179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 371.057295] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 371.065940] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 371.086612] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 371.106528] 8021q: adding VLAN 0 to HW filter on device batadv0 04:00:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) setregid(0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0x4b1) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bic\x00', 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) 04:00:19 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) sendmsg$nfc_llcp(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x27, 0x1, 0x2, 0x2, 0x0, 0x8, "cb35d2ac97cc493b4da44cbdb076159351d91d8eee1f2e2c54b45ead5a92ae028063a87c6a3f745cf510c6f0785e8a05a777809df66f7229aada47e828d6e9", 0xb}, 0x60, &(0x7f00000001c0)=[{&(0x7f0000000100)="ca4e45e46012638a35247cf5dc9c734fe91b0d28b263fabaaa05b8dc6539da42804a66e50c1d12da5a92c49c5411442b7bfa72a1200eadcbd58a5435c592ee1d89e7006fa664215ac3d79a432d9d52b1fbc66d4c1267a566d933d5bd94b8a51f6120054a1f810df574ab8020aabc7c46d314dea1ccf9d46d76334cb8fdaf8669d876526957455b9b52f436ef59cd7f4ac6a5b4e819363b34f7b5d984dda83a9bdffd864e868248516ca61574ec2e43bd590c217c0c3024813ad53c48e53611", 0xbf}], 0x1, &(0x7f0000000200)={0x98, 0x1, 0xc1eb, "076178379e4445b8f469a2b2caf04e61c23e39e6240e18021b51e284f04003ffe1a0e6cc5651a9e784e455c3c1a7775d95b8cfc654ca4206742ddba364eff90bb292cf1f1240ab9dee9c4a79a1dda07fa92db83ff676fc1cf9ef85c2a66eddca2f580705e7eebd714c6b815c9e92e4dc4cefae31610cd44563fee2bea519e6342a6e80c18499"}, 0x98, 0xc881}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000f00000a00000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 04:00:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$packet_int(r3, 0x107, 0xc, &(0x7f00000002c0)=0xffffffe0, 0x4) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) connect$llc(r3, &(0x7f0000000200)={0x1a, 0x338, 0x2, 0x9, 0xcc, 0xff, @dev={[], 0x23}}, 0x10) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000000)=0x6, 0x4) ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, &(0x7f0000000140)={0x0, @dev={[], 0x10}}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) fsetxattr$security_smack_transmute(r5, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x1) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x408200) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000080)={0x2, "a442bf43ece8c2ca0f7cc4ad86bb679db4ec96b40d91af9a923153ae684d8010", 0x2, 0xff5, 0x2, 0x3200e0, 0x401, 0x2}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r7, 0x800454d2, 0x70f000) 04:00:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x1, 0x10000) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000001c0)={0x18, 0x0, {0x1, @empty, 'netdevsim0\x00'}}) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet_tcp_buf(r2, 0x6, 0x21, &(0x7f0000000200)="88f663f3f5a5df78a844c8c3e89b23130e0ea2e5efc9e4e796235f0245f28f07840d9818860d5d70bfca38686af1df25dc43971ef16a6044ddae6a19fffb2d042cc8364b12d7e42fa1dae7b00c9fe9002be9912fd8f628fa7f13806d92dbcfcd6eaf8ba14da0bc1e3ee14f1984357439632e4d0ed1d50f043000b5c2e11826eb4b563c798dd538be587b52e6ce9733b1fec59654b53b18be9989186b6d397b900191f199181638a5fa2cf5bc3844db9c2c92480e5ffb0e5c11f61b1966051570618e48beeec3c1eaa408470d96ffe064f6b0d54da158b76cce7112ff54690e108917a88f9feba20731d92123baec5d8c9392afbb4595e42055e5120573c1351045ff4cc82b3d4dab41dbd38f014885f930590269683f8a8238316ec85fc6aba758a7ed972ac2ec615c270e5a70f4140efa2a569c1c7e6a3eaf7f4370d7756507bb0e067b3dfcf1df7a67b270d022ae9b560384fd1709beea400c9a3046cebb041688a748f63804eb3e382e73a63cc8ba631db203f3e6d517d99f79855b47fc3f9fae3c2c32a3d52ace1a6dce68f6dade630e4c7735e5032823abc38ce264495be17d9887dd3ebbfe4b63af3834a7528de9a91a48eb279ef732c220779eef67fbe6893b6e319a73abeb728654c9732e7fec45c4e6478f97afa9940c6380ab8ac3fd9fae15b1cb45ab7b04e2c04ffd9a238b2dfe00dc056bac91913230e5a051961cceb75345d5f2c6a87041dd2fb4d8d24c92f017a807fd050a8e8613d1d2d4333dc9f0494ddb9504796324073f26bd4906c7e9b3cbbf7522e39a3fa71ef2c2de5faf1549ec6585735c17d2cd4a258975d2e3a8d8036d938fbaf495707fb4473692b9f77aa3f782672e08cf83cc69e2c913b86e9612db1f9b0e9e3b736635444dc7fb353810505695e11208e4773a6dd98337cc2e9793e7b3d839346cc995fa07a69a5a5e4e1a14a5020a5cd02bcc64754472ad707d05393b11ccd041130475c03d744a67e8a745dcd982dca4ac1329ca2a34980c43409fa4aca035686df05f7ad629be52bb804eef2afc7adafab45d898893f46451c989df35936f50f9ca8d9bb57dc7171614aa66d8864d6a74c03c7d2965dc164e543103bcc48aa8e244253a619450dfda69f1a20d529c1c13b136cae3131791a1044764758b6378704e374760af56889e6ec6a6fb05bdf9937b7f55710e6b5bded085db596f1d458e7f36cf751facd4155118d46a8e8497b805ad7890942360b92d79ba999dd12e4978103b71014f9859ff3c7bc21cf8ab687a443e771d9852b77b8e06152582e059dc4228e789b30a2b8972621a8ba9048f7731500b2a9771680d0555b19d3ba29fe6d17bfdecbba4a882f077733f40777edcbed8ddef783e4ebebe1f7c530837eca953c9796761cbb0196a6dbe1a6e9d5f47cfc28822a1f437bfa8719bee885c3e44103e07201bd1a20dc7d542e4cca4f74b587745cfc6b23eb50cdd28f9fdec5adbbc220764d30eb1c2001d764318541b11c4117f267b986e71189b3619b51dc79d74346a9128c85ce6afc368574cb2750b71c3745faf328d0a1a58372d35a399e4119c232862b130d1962e4b9b4c4cfa67528361653754db13562363f1a155698d38eb4280de703b4e31f31ebda4115507c117025ab41b57ce21201602c4179e2a59a3ee8c6784b73defea1ee7f2cc05e351150c9061b778be182d57b0fc28b8d7aec30a02a53a68ea74345e8020070b82b0e5346b82cd80c81efe15aeb3a6adc22985d41328898ea553a03285377f715982d6004696f85e98cc43a6f3863833594e765ce281f00f4b64ab7cf7beb329a3b955b1b49198d6db48d9a11226e0a86c0c95ec8f37af5a8391e65f049eaa0083a6e757a071174e5066acbeabac86447a8b9a3b3e783718bd614397b0f4b0d12427fdc85ef67991e6c5e557d8a8457d03a626403c76c5473770f3de8598a964d6623a01003fb00562d453f2d5432f901fa2b318b24412becdb66375ff0eb507a0571cfe59117f7483b2a67e813615608c4e21c659e253891e751c25d4fb57921d7fcab159e745553d18485a3b2d814c3cb2c734b9657708919283bbdb47b42d664f3e582e635e67e2a50dd12faf6a7f1cbd22e68404dbccbc43e01b0e591b20f100a1a36c66df041dac69c5b465915bb3826a5fb351c181d1fae7cf4ff816b064aa59a1f454e9fd14a11649b89a5d9afa1fb7416c59391bc653bb19e28aa4bd6645ea8564cd856e19a30e39673b8a53534c1f4eb86b2130b9bd25c72d480bcd143d14bcdc33aff6c12ffc31200d33f4e2632e1de32f988659bc07c9247ca091d57aebf607eeb47a541498ecdc71f28520f9699fd50ef07305804a970b295f40553122da934ab384d768ec7d2b1cd5537bd4c2ae26226e6624461bfeca33ac20d14fc381758c705da476ad495a77953ca4baa3f3140a1816ec6b64e4a68827e89ebf132d6c0e418b5eb4f5745d30b142665192bf369e9ead99d5c3cb754104724133c07c9aa05baaeddc5ae3df26f8457a94ee2e0af11e1df307cb50b8816b75adc98ffbc16ac97f9aff5197cb78b1ed5e27b55c462ebdd47148ff966abfa6df4bdf5322c33ad90139c5696acc883766e7eb19feaded5c2bc2bad59471e6ade3d6294d66e4b0cab9fdfd64194e657b651c8a9af73dcc42fb5b6dabf4f0d437d6ae3714e2ae7c0574ce325e1aef04240d9e6b677b2db648380c3a749c8a8671762b07500a10ec5d41d9b23ef543916ed9ccef6d6052ca6371e51b009d71dbeefa7a799c20a4a0b4552c099df3a610b1b0c6f890fff83bd4a7cd975533e104db6b9fdfbca433c4107beb405e3927d619478b52d8c5727ecd0e41c22af5821338519a824fecd1b6132160405444028aa191c062fa1a5fed2a7a200a022ede37b815c5454648164f475b353c61077d39cda82775fd486038725a121dbb2ddf7fa5173d9d7fe3bfa496a0797f192e45d43fc29d6dc6d7269f0795451ae178c3e8a92867898e86648df279d72b7f8af903426166408901b7a5329cb3e4ccb4116416df0f762b8e4b27ca579c71b6638e4e6e31f56578813ce897ccc88a4c40a594c28b5289f0cb49b22562dc1b74dbd815dac4c34b560875311d16ffff796c3e4f5f8217e1ac4a9302c124a0e14c20aba5d0d05ea896804f3d270d1234d3c16f46a2862bb2ef98edacb629bc658431a4d489fc64097e91b2243815fb35d7696386176e78ad2c6b102502a4762e4056115866b4265c30760e3f1c37677b3e1e78afab73e183e46fa7cf4bcef0ce545ca574745cd069385a532f6634c79920088fa5226c673ba26957a1c3d10f0892195e90c20c69cf5cb6815e5230753c4b8f704a4780f65dea6177824af5729ffdc19ebb2d23bd56b7997783abe681a37b380b6578ef2af53b4a6c8125cc9b057c972cc2527507c5d271bd09fb3ba09c082023342dba1148883cbc15ead19232f419c8dcfaaa766b879eb9a5dee71cb2afe5c285f9b0ee11b23ab940ea1a146318c7d1bab47c0db1d8ea17d6fe1c914bd63df4e27b7e07738b45fc55b2f640704fc3c6945341f2922d1c4f36e5c26330020fb8154bb503b5138e7e106511c83a2b1afbd260e35de50d7f367396e8bf76cbb131ff53e02dc37cd417c3954841056fe52f295f716c7183dcab7c7718654601356180e0133c8c0d6c1f63aa527425d348dea8ecadbf400114e824af05933afd142c96e25c8fb9bb2d6c957fb270c9804e1a11dc07e3f078494fa1fc6aff74cddcf956d1f368039ecee9bfdfe022e3aaf971d90d9f64273e9c82dfdc37e957325b17d2da8f1287a8921554a975bbbacb4ef563f7cb28d820afdcc3ab30eb74aab8017205613305f1ec2cac1fb6129c3ca9e804e65ff1771269dfebdc9effe017292ce79ac4f2383f2411e12d9a8e47af648b631471e380f4c72e93227a808db1f457891fa6cae35e77cf7499c2ded80cdb2492da0e015abe89c09c27641141a66a6a5a5577c5092fa181f79837ca0c97765701cfb189c443cc123ed1a87d15c7de2cd2b08a245b0a708961a5337eea77a50aea7d451cba1dc0905778a6884b8f37cff516655aecab1139eac82633d3900e6d934a09b8bf30ca6d89cce72dafe8f8fdc585bd8bc8601f199a6fed3953d173506db3a15da15ef1fd50f3a67a43eb3a9f934675da0791963d46b0eb3f7b7090ecd9de435f6f3d2af067841fb107493b983ce4ed291239973126b81ecfe93548742f95c2b8ea9e696fd792a0598ed4480f60f410552dc27eeb04b878a37b7743ec7e5ca189c5a9fd2e0d1dcd379668d398b91d26ba6bbdb1dc1864b5ac75a67ad0523396115282181dad5bb5748dbdce601d42c81fb39477c9abb63bc8290978251ed662299df446777f142983a0498b59d27fd72514094022c4351118ccd88d738013a21c517759a76f24096481f930bb55a080fa30499cd0f56940e1b4668a092fd9744a686be185d0d2889dfe85c10ec07377cd3594478e03d20eed9c9418215c37f12f0ea40c9b91b2d5343a8932f33181ef2d6a0d7d54a8a267cc4d8bcae28b4105b5dc1b79baec4b44253d909d26cf356dfd1b9daabf701af4e83255644d7443c7dea15c88382e91b8929dc52e9f4523fec556b987284eb8b584038846211c00593894c9455dc73ca1d0d6d78e16c70e6f293158bf51d783d88702e55d368f8445feda1a997488485029572da7ecd5b3669c033eaec43c636e51b137a5d3477d3440321d7463a649b61bdf533660bfe3c99a68c20527a51aa3713204d4ee6d44635719db37d3453eb59ecac02f169226de857ac946cd403102e1705c1dc29564a1dbb8b90938f75a7a82881ed0e55ea79e7e7a09edd91d079c953475dcc3dd72fc3b1002a7865fab4f23b47bc1ead1e65b4c397f2e6d41c431bfabdf931d70769eaa4b2b9dd4cd4f2ab35b845abff9f19bf261ed556483137e18b54cfd3071d9ee2d2de60a338c5848a4d12b522ad232cf903fc17523a81cca0c6410169c53e7809f2348b6d71bf432f9703d27da6892db61c92a068b0db37c1d4066c468f40a6ede675c4927d5f634e0d13d7d991a7dad5837724cc02da618395e9fa1d781976b513a6cad8657ddbcfc26f94606c857d26102b008791b1fed31932340b5bd616c8f4466f0134572513ad9059d8d0c93ffcf15cab85038faeb2b45449182492838300793e6f429f6a6909e3ebd3b055e84546f3083b5ef3322a48c0044efbcc1d03c72c1816ded468a3cdec0ceaf43b597114550246bbb71c41bfb42ee41fe7403adc492279d914a28b2b8dc9be9bef170cef3e8fb933e0e30df1ae58e8a996e3c035e437226370cb07d9e775abea4e9a623c274740e059a45e438e94daf61c361dd344b5d06d57d5005959704471d4315eaaca09c5f7a83c080843a20b31b6d47b77c43e5f3d752d8b9aede8d949e62078a7c111bb941cadf6735358af2dde25b4eb4c0ab7b52e539b5ff8d3fe7fa7f5dc20ac295fc3e0d62c0856c1b6206228f662b470dcfb5bdefc409223907c42c8a9ee703b7c8961efa541f373c2d125192daeaae3f419989244258ec306635b0c53b6eb6572358974857c7441204b8399fb671e3942affa64e02f7c26003d2855b39fe78e9268891b8bd41b3ae3cf4a60db1ed7d246aaa71108edb2b598167dcfa7e760b5f68ce942c990fd69e314d5fcc2987fd21f3edb890b8fdeacaed3137ecb60d4b1c902dd3a1e5f27a3a3831a124b72669fbd3ba55befa60fad41e95bd0f9a5d62b89ecb073dfce529b575bdbbed61164a", 0x1000) sendto$inet(r0, 0x0, 0x0, 0x44, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000)='\x00', 0xffffffffffffff7f, 0x8000204087ffd, 0x0, 0x138) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000000c0)={0xed5e0000, 0x0, 0x0, 0x20000fff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$alg(r3, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) write$cgroup_subtree(r3, &(0x7f0000001200)={[{0x2b, 'memory'}, {0x2b, 'memory'}, {0x2b, 'pids'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}]}, 0x20) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet6(0xa, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xffffffffffffffda, 0x10120, 0x0, 0xffffffffffffff73) [ 371.570978] 9pnet: p9_fd_create_tcp (11420): problem connecting socket to 127.0.0.1 [ 371.631825] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 371.643724] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x180, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000080)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x0, 0x3ff) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000440)="23e409d9bd472ab7ca757f5ef0b95a6fb559aee384ce8564d550cdaea81e1b2130ea2a85780bc8f8d864b57977cb47dc8682d792788aec1fc9c0762f7a0a926c82dd0c5eae59bdb8223ba8daa576a3ce137a6e9c6be12890329e135036dd0749f3498bdba93488c49a9a1bf74001b65842b9fd4ef5bb926b894d08f130f4e17a57b3ac89208ca827c028e16d608e6f765fb753ef6d00698a662c67217d181496a48b39f2be53971b28f62059cf228db5bafc410be7d63315002d80533ea95e4faec61cea1f9f69f7f74aa69c46b615600018345d314a5a15b79b6a86692edb1e63638bdc3e80", 0xe6}, {&(0x7f0000000280)="1b72671472aafd35397d937c56f0e8a54d6c76de3b2c5c48095245e32948732159a666f56d6445ef78baf8c4e923de52ae311740d271606ca5df7034efbb515ef3b653fbc9bfa8b6ef8e78a6e0fc51d537bbc99b9686088f13c58639f30cf1008f858829eb87edb17c885fa0e5e3f3ae7f238be7dd18e9fdc1032ca334a15b09e3d1db746798199be0e12f36b4c952c1447444e795e46c68e02e809b6ad2e3d1711703c587efad05bf9c8eff0c", 0xad}, {&(0x7f0000000540)="29837a3ab5b0ccc5d4818e266d28b93451018ae01dbe8c696de62b0069153cfcbe24a067622b58aef003b560de3c34855a01140f6c8f6bba9c70d51d8a28522338ce442e1ba245dd4fd581cafd3afca678db0e91efa0f3aa13e29e42c67f83863345cfd669cd0e966efd8239c0330dbd9779ad73c8a969141439ac6524084c07cab3fc67a61b497a9f79fa8ded6297c959de05c8613d5894402a311e4178e8f7777e64b20c4bc1a5f93b9293186b3b1df2b9aa908e7eedc9cd1b4b109f19f4c32a6a584560d1abd1ba5646a7ca9cae692dde1445424cce42aba488fa289877acd6927af98f88c803c5655a3afeada2b776bdec", 0xf3}], 0x3, 0xf) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e00010200"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) [ 371.796313] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 371.823829] ldm_validate_privheads(): Disk read failed. [ 371.828293] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 371.865873] loop2: p1 < > p3 [ 371.887035] loop2: partition table partially beyond EOD, truncated [ 371.945432] loop2: p1 size 2 extends beyond EOD, truncated [ 371.988620] loop2: p3 size 32769 extends beyond EOD, truncated 04:00:20 executing program 3: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x0, 0x500, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x8000) close(r2) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) r4 = socket$inet(0x2, 0x3, 0x29) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565b, &(0x7f0000000380)={0x1, 0x8001, 0x2}) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r7 = dup2(r2, r6) ioctl$GIO_FONTX(r7, 0x4b6b, &(0x7f0000000280)=""/242) 04:00:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000040)='\v\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20002, &(0x7f0000000200)=ANY=[@ANYPTR]) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x208180, 0x8) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x3, 0x101, 0x6, 0x20}, 0x8) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x8000) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x93) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000100)={0x983, 0x2}) 04:00:20 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x8, 0xa9, 0x2, 0x0, 0x1}, 0x3c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@remote={[], 0x0}, 0x4, 'nr0\x00'}) 04:00:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) setregid(0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 372.822962] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 372.835596] md: md0 stopped. [ 372.855078] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000040)=0xfeb9) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001e00010200"/20, @ANYRES32=0x0, @ANYBLOB="000000000000828e4b3209f0e6e71f67250000"], 0x20}}, 0x0) 04:00:20 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 373.056278] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="01000000", @ANYRES32=0x0], &(0x7f0000000180)=0xfffffffffffffe99) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) r5 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x6, 0x800) ioctl$PIO_UNISCRNMAP(r5, 0x4b6a, &(0x7f0000000240)="a12b69ec0f9c8c75117671b0d9877f4f054fc1ee3b58753f1f78f3885a19c75546c414447aad1fb0e8ae21653b54d64c8a6066960b9c60d53a362ace86e5cbc35b240f97e655d265dc65edb338aeb747e1fde3e1328f617ab46bba59df77f08b2ad898186d62c6026d2b55c9ad69e1a5de52382379bbaf44be4c3408ef8eb393d5f60bfc2099b05242ea4c5a6e2bee0cd9a50d1875218f5770a3f97e8dfac17be878530016a512bb1f1ad0240c13a81c664ba9d5a10819cc41c271abd131078d12b8a62b1b082a21121e5dc724f2081e8704c65a1e2eaf4a") getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r4, 0xfffffff9, 0x20}, &(0x7f00000000c0)=0xc) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) [ 373.102242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 373.120124] protocol 88fb is buggy, dev hsr_slave_0 [ 373.125230] protocol 88fb is buggy, dev hsr_slave_1 [ 373.171780] md: md0 stopped. 04:00:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="20998ffc4e402cdb6443d71b3899910000000000000709", @ANYRES32=0x0, @ANYBLOB="a37fa1bb1f1d68b218dc250469de93d65c0980fb238cb8e90100000001000000bcebc6f71b13fe7458123a4e6a915fc5aaa5c124b873221cd977b679f66b62298d43b9383eb8923e0c3a374f83d9723f59829637017fb4c6ab9b17788b2b28d0ca7d9545a4ee1472be"], 0x20}}, 0x0) 04:00:21 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 373.250410] device bridge_slave_1 left promiscuous mode [ 373.256106] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.271620] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16462 sclass=netlink_route_socket pig=11499 comm=syz-executor.4 04:00:21 executing program 2: r0 = socket$inet(0xa, 0x801, 0x4000000084) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000000)={r3, 0x33, 0x20, 0x2c6, 0x9}, &(0x7f0000000040)=0x18) sendmmsg$inet(r0, &(0x7f0000002340)=[{{&(0x7f0000000480)={0x2, 0x0, @initdev}, 0x10, &(0x7f00000008c0)=[{&(0x7f00000004c0)="d6", 0x1}], 0x1}}, {{&(0x7f0000000a40)={0x2, 0x4, @remote}, 0x10, &(0x7f0000001c40)=[{&(0x7f0000000b80)="a2", 0x1}], 0x1}}], 0x2, 0x800) 04:00:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e0049c0404600"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x30000) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x5}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x40, r2, 0x822, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x4000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040), 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000002c0)={0x458a7608b64530b0}) [ 373.322727] device bridge_slave_0 left promiscuous mode [ 373.328381] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.520095] protocol 88fb is buggy, dev hsr_slave_0 [ 373.525240] protocol 88fb is buggy, dev hsr_slave_1 [ 373.530351] protocol 88fb is buggy, dev hsr_slave_0 [ 373.535404] protocol 88fb is buggy, dev hsr_slave_1 [ 373.573710] device hsr_slave_1 left promiscuous mode [ 373.610124] protocol 88fb is buggy, dev hsr_slave_0 [ 373.615270] protocol 88fb is buggy, dev hsr_slave_1 [ 373.633974] device hsr_slave_0 left promiscuous mode [ 373.675581] team0 (unregistering): Port device team_slave_1 removed [ 373.697179] team0 (unregistering): Port device team_slave_0 removed [ 373.719551] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 373.783971] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 373.897235] bond0 (unregistering): Released all slaves 04:00:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000280)={'filter\x00', 0x0, 0x3, 0x24, [], 0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)=""/36}, &(0x7f0000000180)=0x78) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) recvmsg$kcm(r4, &(0x7f0000000600)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000300)=""/36, 0xc}, {&(0x7f00000004c0)=""/152, 0x98}], 0x2, &(0x7f00000005c0)=""/12, 0xc}, 0x40000000) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) pipe2$9p(&(0x7f0000000640), 0x80000) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) ioctl$USBDEVFS_GET_SPEED(r5, 0x551f) 04:00:21 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 374.297359] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 374.310634] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 376.120818] IPVS: ftp: loaded support on port[0] = 21 [ 377.000521] chnl_net:caif_netlink_parms(): no params data found [ 377.033072] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.039446] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.046640] device bridge_slave_0 entered promiscuous mode [ 377.053323] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.059677] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.066771] device bridge_slave_1 entered promiscuous mode [ 377.083424] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 377.092327] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 377.110137] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 377.117171] team0: Port device team_slave_0 added [ 377.123199] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 377.130337] team0: Port device team_slave_1 added [ 377.135457] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 377.142795] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 377.192915] device hsr_slave_0 entered promiscuous mode [ 377.230259] device hsr_slave_1 entered promiscuous mode [ 377.270491] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 377.277327] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 377.291205] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.297537] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.304178] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.310543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.336552] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 377.342954] 8021q: adding VLAN 0 to HW filter on device bond0 [ 377.350938] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 377.358715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 377.365991] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.372862] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.382702] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 377.388767] 8021q: adding VLAN 0 to HW filter on device team0 [ 377.396751] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 377.404313] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.410690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.419193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 377.426847] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.433200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.450766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 377.458250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 377.465860] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 377.474178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 377.486525] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 377.496627] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 377.502985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 377.509856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 377.524042] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 377.533437] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 378.001131] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:00:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) setregid(0x0, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:26 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000200)={0x20, 0x17, 0x800, 0x9, 0x66, 0x0, &(0x7f0000000100)="09287a10f04d1fde374bdbc06412022dce5f74b6646cc2c750bb138057b551612d6f6ec01df73e25a78d1777ff9fb982337fe2c423c5021e82eee67a8eb1bb2e2593fcc6e37f9efa4e641e348007c0f5ac6f46d956f77a83b7d4510ac27545b88420c6d69fd7"}) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x800, 0x0) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffc000/0x3000)=nil) write$UHID_CREATE2(r2, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/517], 0x12e) readv(r2, &(0x7f0000001600)=[{&(0x7f00000002c0)=""/183, 0xb7}], 0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f00000000c0)={0x0, 0x401, 0x1, 0x401, 0x3}) read(r2, &(0x7f0000000400)=""/141, 0x8d) write$UHID_DESTROY(r2, &(0x7f0000000280), 0xfed0) 04:00:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x22100, 0x0) connect$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x4, {0x20, 0x8, 0x72, 0x1, 0xff, 0x2}, 0x8c, 0x80}, 0xffffffa9) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='\x00\x00\x00\x00\x1b\x00', 0x1, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x62102, 0x1c6) write$UHID_INPUT(r4, &(0x7f0000000140)={0x8, "f434a9923245b4ff6675a08a839087cae9aa0218bd5b34f40adfca668fd5d82ca4a6a59f1c283069e5f17de356040d83110317880db43cfb6fbe921252ce5f2381d48147032837a372a13bca602bad32312602ce450250afe11b706e7e8dff2aa926a26efe93a0ddf01c1adaab7f193c37df2c45b6615b9b3b12bd4819bf677d6e295652f948fd6b17a5529718492c7ef61168d565292810bb228fc95decd7cc49835bd6c37f3a4f2ee777c04601f336871d0ddc844050a2afd98eb6c5f278fe4c52319a40beb74040cd37b4d021f28406cfe92dab630cbda6867c5f3103c4c81fe2c243ab174bc0684f30ff445ae1a00bac9a56c036e45300bb3f9ed391d7ae2d727ac51bcc905ba8f6769ce18a5d2f79024c1fb3c29d25a35ff32e84450c70423caa18bed017540fdb04d67a37f13e784e7b47a835f4712c579c4f145e911f3bb82f329038d54f1acd85b6045aede627472ea075b3725820789dd52112009d2562ca5c14bff16a4b60d7694cfec5bba4e0f192cbe9273c77f63c24a684253f7554a6d0a361e6b2cc7dac4fefa8aefd1d033be5abbe02b2dc29336fa69684e7f05acb26e88cf203b9344db40d854d392c95e0a10bae82f87ab70b0fd6e043ecca41390b39d99327a29ed47c46a03538688faeed219a60ebe2ff5d02904ac743fea0dc9d159da63bc414caa2e1b78832df7cf822cd119711d2ed415ba6f0819717db947ad227af9213309b655476b91a48e05d661780a76fdf2418e04784934837731d4eb1bcfc6948231a0767228c561b1886fa60100d11ba61b67d123cf066b5555302e73de97ca7db9c7993ee94f89de03a4b70a8f67f6b478321085a2ee11ad1d960e529b3d8cdc0022165a9dce947277b88b848b4fc4a15c7673e252b69624a800dbbfb530d2ef5da9328b30737438cdcb385e05d55705f8fff1d4fcc30d19e4a3e0de261755418f4939b54c8b60df2291129383bd31e2aa2cc410cb0f65fcf03de34ab8b73159491b68ff01c7bccf787ef6c9474cf3a5fe7ed3cad1ea462bee2a8351e0578903496764bbdc9be54677641c73eae615d53de288eb883d1b53a52bba10760c5f849ae875c9a2609b525b819ba22c95e6ba1e76058cc74056c7a7a9d25cfc0e83c17d8e9013a089a1820a0c9b1bd79a3efc5824c0a2bebac39dd5c3111acd17660eb60fad8f3ddfb134fac1339cb91e937e67a6f0b6b9cc16a18a5561700039f75e2e465ac6589a7e467f08d23834f5638c1ee8766721a1f26f1403958cf9cc3d74eec419f3064a3b7dd912843b06d8064ca45eff2b9d243ef72bf6dec5b307723f61593590a36f377ff3ebff1803a81eef1ed15a69bf2ee18d84f3dd01ba38734f694efca07c855d75061cfc85ce7036952b8373bb43091cf72c72a505347414ce7aed796eaaa3ba79da38d6638d1e2a1c4a43c0cd0a4b918208e5fceb9416795ab08ebaedcf1b06796dc5d692400db7c04598467a087f14bee31f1f24d4a6bfd401e2d018d05dd951b689c3885bba3e79a196934c97d073bf4beb66658f93eb8ba676304935dcb2831002943a8bda364a24607eb5a8bf4d7a8c97e3ae85ea519d24ccfe5c485e5a1c87ebdd7bf70e3c38ec22be940aec01a02b5a24a20ec977a53c855aaf3c83538aceca14a66e057248dcbff7e8f9619f90ae078662c2c145b0044d8dd86b170232abd3015e3da9cbfa6181eee88ec51c5516024e9a4580842f01253bf82853916936007858417ed9dfb5dd314f6702a9f575e1ccb1c6915f944e6e1eb43ec731eab264d0baea9b7a0dbe6cc27621a7cd9f1dcb170c7ad25fb95584091d586b2ac4231b8980a8c609238774af75ed2517f6b741009f597156f0ebae875841b53e8d2dd9e86661c85cbe42d5ada1f32689b77c39dbb3efd4cd87d106526fd87d26eb13685f414b9569196e2f51b886413067beca230a46eb5ec122aa2a11163401a90c183a00446c9470133a49c5acaf2601c66a38c98a7acfb9c78c465f2dac6e1bbcb6760c3c3db5dfca0d380959f011394defe4d1bdc41428488a4f35b8ba969a51d1943f81663fbd66f4f4379471c88c981d5301982507ea30cc483772fd1b8b6df83a838fb91ca307779c6daa1ab2b56cdb9d62248ee3b8a3dfc03799927073080a1cd389ccee03e33d89abd86dce5de1912a83b26ccadb66f40d75e56927b18b0cd31ab499b17e9abfedb83c39f8bfc7f02d33b92c05626284151bfb4a9a1e13a3d6df1f901672846f69da515ebc6b0fd2ef1cda8686c79bcc445855ad9063f0529d58d209f107cba1d36cbb7a0f2fd11043e367c4f019a8191d20d38cca9e2d956c63180eab9459792432803af2e4b81b3d1eb70430a652e3432a1375f0dc8b99e28473b8f461505ac8de2f915bb9f7132bf59027b96c460a466de60c73314bd22a70abe41e4888c73ff7e50635233235801a19d2f3648a55514c95fe9e406875994a1fd46df41cff50432384ad36e5829a394d075e49286216c8f10d95818f7181fb7796c7c078abc8c9a939232e8a9e6cef94df8ce2516105e4c2daa07a30e2ff682d7e673c5d45dc8c3af1be3dc3d997289b38b8c2a3c6b8061bdda33ec030587ea2930bcb4f93d37c1e9530100fe0659d707f2454d09313989183497ecfd08dd9a8448445345e427600134cae2f076f183b21c3568bd4cf2bc7d64e224b5a90fcb960e8878e479efa45eb8371ef3e24c5e46f0f8742d0c165e7ceb810cea071aee703b2838c00953640ad3d7d16575dc2594130c577a2caa15b468c7f125654679b0931178ba7c2ccbf2674320b6eec715bfab540e2b2d8563bf6af313b6c45d486be53169ed41afdebbbf064aaa14f13c4df9e3570634e8def919059fd5b8ed67702d72846607b70b91236d36164534fcf9bbf105ac7d171844fc375001eddfe45d49ce3e745a8aa568b57489793f4878d356897f8a58d5f89568d2c260e5d26e1b7dbc04a30345220ce93001a5da27cfd965bafab0fdb6d1e9f18481a1cb3ff5a5e7307825a4eec066fe12b0ffa643036732ffb3931c427df27d4d7bb022213b1fca05e06799cfb65c0860612789e4a18ced35b0ba3538a34e0099725b60d4455fae183e6bcbb22c4a429c7f3bdbd4c356dcb5e5fc058eae3d1013ddfb3b02fdc5a490c775b0f761b5a766d8f6639bc3c8b22e93098c8965979c491c777d1f47ff79f1eba06e568912eeb674c788afcd8c764b5f9e1fe3e73dc987bfe9d35c2ccb940ee8049317e2f3b4b976d19512efe306f2d329cce618d3c4372b59bd4ff33ddd447d79acfc677b962f5ba8038f7d14949174938923e98f4dbcfbe20de046bfb29759758e8a0d4368d62aec0479a2e4ff1042260f9255fc64012819c492a03b566c45b63d9749631bd92d686fc48ded740d478984f11c6a6da220dff6281be9daf7d3105ce0f199d65a8a1422acd5c7abf4424ce8fa8d908ff46466ae730ed148a12fedf2f722f750009778b438db38a5fc226fa455cb60e12f9a871875590b9b30fac9236590e208f30453ecbeb519fa0d4e13676d74c697cc1b81052f32d2512b120cf931e81dceba3dffc3dc6637f8ee1ef8b7cdd37594faa07ce2761f09b4ae0b68f183edba159aec35c6f9f040d8eb8914afa9cc4bbba5dedc180ec283f47fac4f5698d87f16e4ee1a20d30f9e91eb70abff0fbcd26eaae61f064bfa6245fe7eb64267dea89598670fd34a2d3fa20a9d8e5e6d84274807ace3d96beacf5684764add1b23796a9b186e4dc18b5c2d5b19c2ce55db469b6bdb1a475421d7bcb281a1132959d2def61b5f286efb71735a812ce555765a6b99ba6fe690c75383b09745920a0676c1909a3e8e7e4d738c43512ca3c3e0147cd1a262b8a9ddc3681e21c75e65bbc973912f40cb1bdc8b0b4ec4170ba1570d2f83a3267528dd7f1fdb74e7e31eca7d26f9f3a466a7bb1f0701e548459d80e8b640159dd3093c14503759eaaae317161113367c51a5cdfcbe9aaa10f69fc1fecef3952837c3be94d19f603a0c115e74b1939c4278dbd774b1888939d8bb2f74c9335b6c3968d3898f7d8cde018822aa89e3716fced4d771ada49c9e9929a5a82f55813a6c0015c14e8b0e31a5406138e0bfd942f5c84ff1c229ad4330f6efe7b195f5d6bd40ff68a1aad5c5bf36d07276f714dea9c568b56930450bc5fdb9a78fdad929406e2eae09ccd010b6f398de319685bee98974c663c6d6a7d7e8066b78eaaa5fd02fb9a3dfd1f98ec4ed27fceea93a1127459751d0afa7a5b87bcf296b94702569e705b783de5e20f8fd3b2e67ba98c6d24aef897461275ce170af5a728b60a218747904c037eed8406895d0e84eb9cad6af41e11072a7fe3f7544f846ac9b4ef2aab1682db964ce758682caf1d24682e6edddb8a21fb3c8a881d7f640cd14a172aaad289fc494836ac0d8fe2e06331f489fa0cb77ae7643acd4fdb6a52a5f53e5eedd8c1fb80d8d2287e4ba421c8a47335c41edadd7a0bdda728b1cdebf9bf150b74c44706f7903db087606cc9faf15a9cddf91531155d5d57b083f1c5d161a2aa427aeb4e8e68872a4a54e3ff6eaac736daed1b8a75a2e7d3b1ae1e6dd795f2ad459cb4ada10b4c3fb6171079058f7205c8be7fff994c8e49f34c368c9c48266491c53045251bbcf124eae1f87f3999465587812050a44766e57a6c7212a7f56999d72390ca6b967e8e771eb0cc9ee2065e705471163929b217c11a28ab07173b372aaff323a0663fb3fb88a75ec666acf36bcb6f1d06f70cd94b24d95f8bcaac46dfc93160697e772fffef033727b492dc9b52a850dda20eba98f3f44a4062884b4f002d0982127c3ea0fc9dba6b1f8b3eb9b26cac9042de486b2aed744c20bf1f1128d0e11accf39e63daf7a0213cc282bfdccf9a851bf0a7d3f39280ce97e7c566e0fdfef575df72692228dcce5ee0115d552508680b2174cd5a4c13056ad882ffc5cc7d8006fde73faa0bf1f6e2779c51bf5f81e41aab2e31206fc67163820c42d91d5be53feb412aaba7da86e47ceff8584495d16b889b9dd89f9b03308c3136145e215c1370f4d893d4de01409cb60013910b37ea16e545f5b956c9a1dda09c7d741a02780c31e6bbbdd9cd8b70b054359a7d8f2813324ab4cfb9b554d7086b99a1512c96dabfcfb6ce65bcb06994ee15dba73e80796cc718950d68aefc23189ec195d4d42b6bc92ddf80e7ab66a65c463aacfd8976cbc30bb652a985ba91b18548a993e8bafae7884f4592bb0e8a9933241d6b92da62f260ac41c74bd7a51cbc2607c13129709ac456c4854891e48cd1d85239c2b5baecbbc82e0b2d4cc8e358d60dda80896d28ef22f0863b3ee76dcd4fc85b372fbfa52ba3cb1702673bd358a6efcf94a20b8b0b2b61210e317b1183ee7aa94cf07f32e07d197d2136e7cb36d6ad2d0ba5ed8f8d373a523a1b694cb089f1093fc52f03466b6ac0be86296abdc49c4777a03df5bf0b48d8cf6a9c108c16b0984c7b48786347f5f0221d35e0996ab62a804cfe14432409430bba6e898bea55a8838c552c41d9666b265a40c88ed0474dbd0ef07b87e533ff6f0d7c8789b50abf96fbfc75e1c8e6a822e281465f69db032d3d62447a6a8cb95679165d20925fa090c1f61fc0d7db103f01de43daa39d8be2c2ca41f5a7c3f65a187307b50cf3b9dfebb2648f1ea7370d83d0e4b9eb5a64a60166a77a76233d965c068b5ff56640b8c8e48806636f21355a40003eae5a954ec5838aacdbc4f7e9952718a2f33c0bb04c75ff2d8bf9f908d3985c0f72e3e078bf69916bb", 0x1000}, 0x1006) ioctl$TUNSETOFFLOAD(r3, 0x800454d2, 0x70f000) 04:00:26 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) 04:00:26 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000380)='projid_map\x00') preadv(r0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x4) signalfd4(r0, &(0x7f0000000180), 0x8, 0x180000) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000040)) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}, {&(0x7f0000000080)='8', 0x100000}], 0x2) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000300)={r5, 0x9}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={0x0, 0xfffffffe, 0x0, 0x95}, 0xfffffffffffffea3) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x7, 0x2, 0x1f, 0x7fffffff, 0x2, 0xffffce70, 0x4}, 0x20) syz_genetlink_get_family_id$ipvs(0x0) 04:00:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xfffffffffffffddd) prctl$PR_GET_FP_MODE(0x2e) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000440)=""/244) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)=0x20) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e00010200"/20, @ANYRES32=0x0, @ANYBLOB="005554610719eca5"], 0x20}}, 0x0) [ 378.702753] 9pnet: p9_fd_create_tcp (11538): problem connecting socket to 127.0.0.1 04:00:26 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) 04:00:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0xffffffe000000000, 0x3, 0x8, 0xfffffff7, 0x2, [{0x7, 0x53, 0x398eac4, 0x0, 0x0, 0x1402}, {0x9, 0x6, 0x8000, 0x0, 0x0, 0x2000}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x6e) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) 04:00:26 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) [ 378.846397] SELinux: Context unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 is not valid (left unmapped). 04:00:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 378.927927] nla_parse: 2 callbacks suppressed [ 378.927933] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 378.956535] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:26 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:26 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000080)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r3, 0x800454d2, 0x70f000) 04:00:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r2, 0xc0485661, &(0x7f0000000100)={0x2, 0x2, @raw_data=[0x1ff, 0x4, 0x12f, 0x4, 0xb3ec, 0x5, 0x6, 0xfffffff8, 0x5, 0x5, 0x7, 0x9, 0x3f, 0x8000, 0xb9, 0x5]}) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4000, 0x0) 04:00:27 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/4096, 0x1000}], 0x1) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x7) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, &(0x7f00000011c0)={0x28, 0xd0, &(0x7f0000001180)="4060978fe4f30c612d47f5d667", {0x58c7, 0xffffff80, 0x33424752, 0x5, 0x1ff, 0x20, 0x9, 0x8000}}) ioctl$IMGETVERSION(r4, 0x80044942, &(0x7f0000001140)) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080), 0x4) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x4, 0x8, 0x37f, 0x80000000, 0x13, 0x7, 0x6, 0x3, 0x0, 0x1, 0x2, 0x5}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) [ 379.860996] device bridge_slave_1 left promiscuous mode [ 379.866595] bridge0: port 2(bridge_slave_1) entered disabled state 04:00:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x88001, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000040)=0xffffffffffffff20) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="ab2000003d8700000000008000"/26, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 04:00:27 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000380)='projid_map\x00') preadv(r0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x4) signalfd4(r0, &(0x7f0000000180), 0x8, 0x180000) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000040)) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}, {&(0x7f0000000080)='8', 0x100000}], 0x2) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000300)={r5, 0x9}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={0x0, 0xfffffffe, 0x0, 0x95}, 0xfffffffffffffea3) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x7, 0x2, 0x1f, 0x7fffffff, 0x2, 0xffffce70, 0x4}, 0x20) syz_genetlink_get_family_id$ipvs(0x0) 04:00:27 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="b7eb8049273be80c508a01b72e61355867d6fa880663b03049760ad99cec341170ac8fa7c44f130623c583d7a475472b16dae3d24dbddac4bdeba2b826d863667f35f2e46582f78f8ccf22d807000000000000005ee8859fa21bbbdf419119f10beefe2c631d98f1b0168bf20337db3d2c", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={r1}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r1, 0x6fa}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000180)={0x7, 0xf591, 0x205, 0x7, 0x0, 0x9, 0xfffffffa, 0x7, r2}, 0x20) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000280)={r4, 0x4}) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0xe00) sendfile(r0, r5, 0x0, 0xad9f) ioctl$TCFLSH(r0, 0x540b, 0x37) [ 379.931943] device bridge_slave_0 left promiscuous mode [ 379.948126] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.991818] audit: type=1800 audit(1569988827.764:146): pid=11605 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=17251 res=0 [ 380.083220] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=34621 sclass=netlink_route_socket pig=11609 comm=syz-executor.4 [ 380.225044] device hsr_slave_1 left promiscuous mode [ 380.286338] device hsr_slave_0 left promiscuous mode [ 380.346579] team0 (unregistering): Port device team_slave_1 removed [ 380.407475] team0 (unregistering): Port device team_slave_0 removed [ 380.470909] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 380.534502] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 380.712350] audit: type=1804 audit(1569988828.484:147): pid=11608 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir760433771/syzkaller.255grZ/4/file0" dev="sda1" ino=17251 res=1 [ 380.779425] bond0 (unregistering): Released all slaves 04:00:28 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:28 executing program 2: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000380)='projid_map\x00') preadv(r0, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x4) signalfd4(r0, &(0x7f0000000180), 0x8, 0x180000) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000040)) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000500)="c5", 0x1}, {&(0x7f0000000080)='8', 0x100000}], 0x2) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000300)={r5, 0x9}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={0x0, 0xfffffffe, 0x0, 0x95}, 0xfffffffffffffea3) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x7, 0x2, 0x1f, 0x7fffffff, 0x2, 0xffffce70, 0x4}, 0x20) syz_genetlink_get_family_id$ipvs(0x0) 04:00:28 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:28 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x88240, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000040)={0x20, 0x1, 0x19a, 0x2, 0x8}) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000300)=0xffe6) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000080)) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e00"/20, @ANYRES32=0x0, @ANYBLOB="000085b100001c7b"], 0x20}}, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x202) timerfd_gettime(r5, &(0x7f0000000280)) [ 381.335508] audit: type=1804 audit(1569988829.104:148): pid=11608 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir760433771/syzkaller.255grZ/4/file0" dev="sda1" ino=17251 res=1 [ 383.251383] IPVS: ftp: loaded support on port[0] = 21 [ 384.282032] chnl_net:caif_netlink_parms(): no params data found [ 384.314168] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.320650] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.327411] device bridge_slave_0 entered promiscuous mode [ 384.334048] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.340651] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.347424] device bridge_slave_1 entered promiscuous mode [ 384.364693] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 384.374250] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 384.391395] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 384.398415] team0: Port device team_slave_0 added [ 384.404072] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 384.411161] team0: Port device team_slave_1 added [ 384.416252] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 384.423575] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 384.472382] device hsr_slave_0 entered promiscuous mode [ 384.510438] device hsr_slave_1 entered promiscuous mode [ 384.552359] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 384.559310] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 384.574231] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.580653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.587230] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.593594] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.618926] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 384.625172] 8021q: adding VLAN 0 to HW filter on device bond0 [ 384.633956] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 384.642733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 384.649711] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.656406] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.665816] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 384.671961] 8021q: adding VLAN 0 to HW filter on device team0 [ 384.679716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 384.687642] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.693999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.704024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 384.711590] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.717906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.736948] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 384.746742] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 384.757743] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 384.764600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 384.773158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 384.781270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 384.788582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 384.796241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 384.803098] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 384.816465] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 384.826267] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 385.270354] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:00:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:33 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x810}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x48, r3, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffa}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000000}, 0x2000000) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xffffffffffffffa0, &(0x7f0000000000)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0x408700000002}]}}}]}, 0x3c}}, 0x0) 04:00:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0xc0000, 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f0000000340)={0xba89, 0x401, 0xf65, 0x3f, 0x8, 0x1c, 0x22, "82f5b37929539c45338e67341d0d02c81be091d4", "fd284186b98aefe68960f28e2cb658d72822c45d"}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1811) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/de\x89\xb4\xa4\x96>\xf0\xefDn\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) sendmsg$IPVS_CMD_GET_DAEMON(r5, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x102040000}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)={0x108, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3ff}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fffffff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffff7}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x60000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffde}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10001}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x26}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x60, 0xf708d8dd7c81fed6}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x434}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14, 0x11}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xc4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x1d}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x29}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xb, 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x108}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ioctl$TUNSETOFFLOAD(r4, 0x800454d2, 0x70f000) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000300)={@remote, @rand_addr=0x401, r6}, 0xc) 04:00:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x4890) 04:00:33 executing program 2: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x8ff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) io_setup(0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000040)=@name, 0x10, 0x0}, 0x0) io_setup(0x0, 0x0) sendto$rose(0xffffffffffffffff, &(0x7f0000000080)="5e4e7f9c1dadea241dc2", 0xa, 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xfffffffffffffeca, 0x0, 0x0, 0x15) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) finit_module(0xffffffffffffffff, &(0x7f0000000000)='/dev/kvm\x00', 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 386.056080] 9pnet: p9_fd_create_tcp (11656): problem connecting socket to 127.0.0.1 [ 386.149911] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 386.161699] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:33 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x20000, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000100)={{r2, r3/1000+30000}, 0x1, 0x1, 0x7fff}, 0x18) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$SG_GET_LOW_DMA(r4, 0x227a, &(0x7f0000000000)) 04:00:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffe, 0x7ff}}, 0xe8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x1c}, 0x10) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000180)=0x4, 0x0) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="0207000902000000a8a989000000fcffffffffffffffdb4e767263a7192f6f0100000028db5b8d0d22145e6313f3ea41e2f28204cede607a25340b579ac7616cbeae3a9a9e90785afd31885d362411ef23cd8fef4aa6da926e525ff5dfb67dfcd914916ee79d501a3aa4a1949a5175c2f9f8f0972e376bb9f94c5268f7ff158864d444d4bf66e8d85cc74a0000000000000000173dd3d91f2500"/167], 0x10}}, 0x0) 04:00:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:34 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffffbe, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="4000000030003b0e00000400004ae87e0c908401108edc7e27a2724700000022000000", @ANYRES32=0x0, @ANYBLOB="430200000000000008000a00", @ANYRES32=0x6, @ANYBLOB="1800120008000100767469000c00020008000400a9feef50"], 0x40}, 0x1, 0x0, 0x0, 0x4000001}, 0x800) [ 386.325480] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 386.372322] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 386.428199] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 04:00:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 386.473032] tc_ctl_action: received NO action attribs 04:00:34 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:34 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x1, 0x0) sendmmsg$unix(r0, &(0x7f00000096c0)=[{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000300)="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", 0xe4a}], 0x1}], 0x1, 0x0) pipe(&(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x4a5, 0x15}) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/de\x06\x00', 0xd72f41381c46bd92, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f0000000100)={0x1, 'ip6_vti0\x00', 0x2}, 0x18) close(r3) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'ip6gretap0\x00', 0x0}) socket$packet(0x11, 0x3, 0x300) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$packet_int(r1, 0x107, 0xc, &(0x7f00000001c0)=0x5, 0xfffffffffffffdb8) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) [ 386.900434] device bridge_slave_1 left promiscuous mode [ 386.906085] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.980913] device bridge_slave_0 left promiscuous mode [ 386.989755] bridge0: port 1(bridge_slave_0) entered disabled state 04:00:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) 04:00:34 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:34 executing program 2: syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x648, 0x0) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000400)='hybla\x00', 0xfffffffffffffce0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000140)={0x3, @null, r1}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$VIDIOC_QBUF(r4, 0xc058560f, 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000380)={0x60, 0x0, 0x1, {{0x10001, 0x80, 0x6, 0x401, 0x400, 0x4, 0x0, 0x8}}}, 0x60) syz_open_dev$video4linux(0x0, 0x8000000000007, 0x105200) r5 = dup2(r3, r3) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x1, 0x11, r5, 0x0) r6 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r6, &(0x7f0000ffc000/0x4000)=nil, 0x0) r7 = syz_open_dev$radio(0x0, 0x2, 0x2) ioctl$VIDIOC_QBUF(r7, 0xc058560f, &(0x7f0000000300)={0x1000, 0x2, 0x4, 0x1020, {0x0, 0x7530}, {0x1, 0xc, 0x0, 0x3b, 0x6, 0x0, "855c8c70"}, 0x0, 0x0, @fd, 0x4}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r7, 0xc4c85512, &(0x7f0000000440)={{0x3, 0x2, 0xc9ee, 0x7fff, '\x00', 0x8001}, 0x1, [0x10000, 0x1, 0x81, 0x4, 0x0, 0x80, 0x0, 0x100000001, 0x0, 0x4, 0x10001, 0x10001, 0x0, 0x1000, 0x0, 0x9, 0x1, 0x4, 0x0, 0x185, 0x9, 0x2, 0x4000000000000, 0x4, 0x0, 0xf0e5, 0x401, 0x3ff, 0x100000000, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x71, 0x3f, 0x7f, 0x0, 0x9f, 0x4, 0x7, 0x0, 0x1, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x80000001, 0x0, 0xffffffff, 0x20, 0x0, 0x0, 0x9, 0xff0, 0xffffffff, 0x5, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x797, 0x0, 0x0, 0x0, 0xf727, 0xffffffff, 0x1, 0x1ff, 0x1, 0x7, 0xfff, 0x5, 0x6, 0x8, 0x0, 0x1, 0x4, 0x5, 0x0, 0x2, 0x7, 0x0, 0x5, 0x9, 0x1000, 0x3f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x1f, 0x7fffffff, 0xfffffffffffffffd, 0x3, 0x4, 0x0, 0x8, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x101, 0xfff, 0x0, 0x6, 0x6, 0x0, 0x2, 0x6, 0x0, 0x6, 0xd4, 0x1000, 0x0, 0x4], {0x0, 0x989680}}) shmat(r6, &(0x7f0000ffc000/0x3000)=nil, 0x4000) shmctl$IPC_STAT(r6, 0x2, &(0x7f0000000200)=""/219) [ 387.254441] device hsr_slave_1 left promiscuous mode [ 387.313715] device hsr_slave_0 left promiscuous mode [ 387.324976] audit: type=1400 audit(1569988835.054:149): avc: denied { map } for pid=11718 comm="syz-executor.2" path="socket:[45136]" dev="sockfs" ino=45136 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=packet_socket permissive=1 [ 387.384223] team0 (unregistering): Port device team_slave_1 removed [ 387.436516] team0 (unregistering): Port device team_slave_0 removed [ 387.443133] protocol 88fb is buggy, dev hsr_slave_0 [ 387.443178] protocol 88fb is buggy, dev hsr_slave_1 04:00:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xff4d, 0x10, &(0x7f0000000040)={0xa, 0x20004e22, 0x2, @mcast2, 0x2}, 0x1c) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000001c0)=0x4, 0x4) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) write$P9_RSYMLINK(r3, &(0x7f0000000180)={0x14}, 0x10000015a) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000080)) dup3(r0, r1, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$KVM_SET_XCRS(r5, 0x4188aea7, &(0x7f0000000200)={0x7, 0x4, [{0x8001, 0x0, 0x80000000}, {0x7fff, 0x0, 0x965bab5}, {0x3, 0x0, 0x9}, {0x1000, 0x0, 0x8}, {0x5, 0x0, 0x8}, {0xadb3, 0x0, 0x100000001}, {0x13, 0x0, 0x6}]}) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x0) poll(&(0x7f0000000180)=[{r0}], 0x1, 0xffff) [ 387.524290] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 387.584608] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 387.748248] bond0 (unregistering): Released all slaves [ 387.804611] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 387.821426] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x1, 0x1}, 0x3c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xffffffffffffff55) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000100)={r1, &(0x7f0000000080)=""/2}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 04:00:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000680)='xfs\x00', &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="ba61724af17e877c3a"]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000000)) 04:00:35 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x2, 0xd9c98b2b61d9187f) sendto$ax25(r3, &(0x7f0000000140)="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", 0x1000, 0x80, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) [ 387.924605] XFS (loop2): unknown mount option [ºarJñ~‡|:]. 04:00:35 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 387.993776] XFS (loop2): unknown mount option [ºarJñ~‡|:]. [ 388.003342] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 388.023371] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 389.890895] IPVS: ftp: loaded support on port[0] = 21 [ 390.702843] chnl_net:caif_netlink_parms(): no params data found [ 390.734833] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.741304] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.748150] device bridge_slave_0 entered promiscuous mode [ 390.754856] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.761347] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.768157] device bridge_slave_1 entered promiscuous mode [ 390.785451] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 390.794658] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 390.811345] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 390.818335] team0: Port device team_slave_0 added [ 390.823921] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 390.831036] team0: Port device team_slave_1 added [ 390.836156] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 390.843490] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 390.893597] device hsr_slave_0 entered promiscuous mode [ 390.940295] device hsr_slave_1 entered promiscuous mode [ 390.980445] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 390.987263] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 390.999265] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.005645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.012289] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.018623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.045369] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 391.052582] 8021q: adding VLAN 0 to HW filter on device bond0 [ 391.060646] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 391.068711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 391.076247] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.083118] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.093205] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 391.099289] 8021q: adding VLAN 0 to HW filter on device team0 [ 391.107645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 391.115385] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.121750] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.131286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 391.138793] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.145154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.157811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 391.166235] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 391.175182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 391.189174] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 391.199074] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 391.209581] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 391.216344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 391.224201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 391.231669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 391.243321] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 391.253829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 391.690492] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:00:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) r2 = accept$netrom(0xffffffffffffffff, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@access_uid={'access', 0x3d, r1}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:40 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r3 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x2, 0x2) ioctl$SIOCX25GDTEFACILITIES(r3, 0x89ea, &(0x7f0000000300)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e21, 0x7ff, @ipv4={[], [], @multicast2}, 0xffff}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0xa6, @dev={0xfe, 0x80, [], 0x24}}, @in={0x2, 0x4e21, @rand_addr=0x1}], 0xb8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="25bca274769e620aa734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7186270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='journal_ioprio=0xf']) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000140)=@v1={0x2, '{'}, 0x2, 0x1) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000340)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r8 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0xb561, 0x80040) kcmp(r5, r6, 0x5, r7, r8) 04:00:40 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETOFFLOAD(r7, 0x800454d2, 0x14) 04:00:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e00010200"/20, @ANYRES32=0x0, @ANYBLOB="fdffffffffffffff"], 0x20}}, 0x0) 04:00:40 executing program 3: arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000300)=0x81) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x864020, 0x0) getsockname$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000ac0)=ANY=[@ANYRESDEC=r3, @ANYRES16=0x0, @ANYBLOB], 0x3}}, 0x44801) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500000000000000e994d48069a5e565038e358a51c3473f1fc0dc2719737219d84dcb29ed71191bb5f4b1093120c866cf3fa9dec46066f11897b781ead6ede4ae175c870d707a34d5a5d2652b7e1d70f0d800e71485a837578e2fa8b621f354e828e61ecfcbbb523af055c83e5e6e63e7e8a5b325c75ab6dcfcdee80331748841c6a414fcffb54affa3c68b08a7d6e12c11fc8d2f2bb852caebcc1436de59e7f1ec1ea7acc961f8d5d08684ad8fa6f9403904afd98e0dde7b6082556d6e28c1d5"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r4, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r3, 0x0, 0x0, 0x0, r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r2, 0x0, 0x5, &(0x7f00000000c0)='ppp0\x00', r5}, 0x30) sched_getattr(r6, &(0x7f0000000340)={0x30}, 0x30, 0x0) r7 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@rand_addr="0000000000a900", @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2cce}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x0, 0x33}, 0x0, @in=@local, 0x0, 0x4, 0xbc6d1ed3becfb22e, 0x6}}, 0xe8) getresuid(&(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r8, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r7, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 392.499429] 9pnet: p9_fd_create_tcp (11771): problem connecting socket to 127.0.0.1 04:00:40 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 392.557907] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 392.576479] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000000)=ANY=[@ANYBLOB="0400000000000000667c55d2a1"]) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x100, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000940)='y\x00', 0x2, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xeacc, 0x101000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=@getsadinfo={0x4c8, 0x23, 0x4cb2a34e4b5872e7, 0x70bd28, 0x25dfdbfd, 0x0, [@policy={0xac, 0x7, {{@in=@multicast2, @in=@local, 0x4e21, 0x9, 0x4e22, 0x3, 0x2, 0x60, 0xbfbefee07517e44f, 0x87, 0x0, r4}, {0x200, 0x2fc, 0x4, 0x3, 0x81, 0x40, 0x9, 0x4}, {0x5, 0x4, 0x6, 0xa21}, 0x5b, 0x6e6bba, 0x3, 0x0, 0x1, 0x3}}, @tmpl={0x184, 0x5, [{{@in=@loopback, 0x4d6, 0x6c}, 0xa, @in6=@local, 0x3505, 0x4, 0x3, 0x3, 0x7c0, 0xa50, 0x101}, {{@in=@multicast2, 0x4d3, 0xff}, 0xa, @in=@multicast2, 0x3505, 0x0, 0x3, 0x4, 0xfffffff9, 0x401, 0x7fffffff}, {{@in6=@mcast1, 0x4d3, 0xff}, 0x9952c143c50edb07, @in=@dev={0xac, 0x14, 0x14, 0x2a}, 0x34ff, 0x3, 0x1, 0x20, 0x536, 0x0, 0x4}, {{@in6=@empty, 0x4d4, 0xff}, 0xa, @in=@multicast1, 0x0, 0x0, 0x3, 0x20, 0x1, 0x66, 0x4}, {{@in=@remote, 0x4d2, 0x2b}, 0xa, @in=@loopback, 0x3507, 0x0, 0x1, 0x40, 0x7f, 0x0, 0x5}, {{@in6=@remote, 0x4d6, 0xff}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3502, 0x1, 0x0, 0x20, 0x38, 0x7, 0x1ff}]}, @tmpl={0x84, 0x5, [{{@in=@remote, 0x4d3, 0x6c}, 0x2, @in, 0x0, 0x3, 0x2, 0x1f, 0x8, 0x8001, 0x8}, {{@in=@multicast2, 0x4d2, 0x33}, 0x2, @in6=@local, 0x0, 0x0, 0x2, 0x5, 0x81, 0x223, 0x2}]}, @user_kmaddress={0x2c, 0x13, {@in6=@mcast2, @in=@loopback, 0x0, 0x2}}, @replay_val={0x10, 0xa, {0x70bd27, 0x70bd25}}, @policy={0xac, 0x7, {{@in6=@loopback, @in=@dev={0xac, 0x14, 0x14, 0x21}, 0x4e20, 0x0, 0x4e21, 0xff73, 0x2, 0x0, 0x40, 0x1d}, {0x6, 0x3c9, 0xd6, 0xb7f, 0x1, 0x9, 0x628, 0x1f}, {0xffff, 0x7, 0x80000000, 0x8001}, 0x8, 0x6e6bb2, 0x2, 0x1, 0x2, 0x1}}, @algo_auth_trunc={0x118, 0x14, {{'sha384-avx\x00'}, 0x648, 0x260, "adb7a9bcef790d61ccb1cca22360e313953d515d161c47ef1418998889ef8f5e7ffcb934153a13e12a00a9e17c5e2d16f1b4fce3f0540ba90225f3756be87266e05e2fe78fa9d195941c41251dc3fe269320a748d3c974a45b1e97ddd2380ec004126d613153b67f03d3fadeb42e5dc8a6a0ef65a3aa6eed4f4100e0fe3c5275a875ffa2047974db0a71d405aa6e54cf0393a75125f824fb8bc0c4538deafab5ee7ff1ad598a23858e3d36e057367979ec878e890e121891c5af9730a08f71d183e27a8d765e48b588"}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4104}, 0x2194da135d005604) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e8e030200"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x3}}, 0x80) 04:00:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) r2 = accept$netrom(0xffffffffffffffff, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@access_uid={'access', 0x3d, r1}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 392.670472] EXT4-fs (loop2): Invalid journal IO priority (must be 0-7) 04:00:40 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e001902002000"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00@\x00\x00'], 0x20}}, 0x0) 04:00:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) getsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(0xffffffffffffffff, 0x3b64) r2 = accept$netrom(0xffffffffffffffff, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@access_uid={'access', 0x3d, r1}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:40 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 392.918005] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 392.975567] 9pnet: p9_fd_create_tcp (11813): problem connecting socket to 127.0.0.1 [ 392.989412] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 393.580392] device bridge_slave_1 left promiscuous mode [ 393.585943] bridge0: port 2(bridge_slave_1) entered disabled state 04:00:41 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xfffffffffffffe93) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0400000000000000"], 0x20}}, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x2) [ 393.660829] device bridge_slave_0 left promiscuous mode [ 393.674569] bridge0: port 1(bridge_slave_0) entered disabled state 04:00:41 executing program 2: symlinkat(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x40, 0x0, 0x0) fanotify_mark(r1, 0x2000000000000011, 0x2, r0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000000000)) truncate(&(0x7f0000000440)='./file0\x00', 0x90002) sendfile(r3, r3, 0x0, 0x8800000) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r5) keyctl$setperm(0x5, r5, 0x49428d578420dda2) 04:00:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) fremovexattr(r3, &(0x7f00000003c0)=@random={'system.', ',&bdev\x00'}) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001ff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r4, 0xc0406619, &(0x7f0000000000)={{0x6, 0x0, @reserved="2123bd5222c3c3676a1590c40b46c9b78547b02cfad837ec3b1bbc1bbdd7b895"}}) ioctl$TUNSETOFFLOAD(r4, 0x800454d2, 0x70f000) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000002b80)='/dev/audio\x00', 0x4507c0, 0x0) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r11, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@gettclass={0x24, 0x2a, 0x52d, 0x0, 0x0, {0x0, r11, {}, {0x0, 0xf0ffff}}}, 0x24}}, 0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xb28}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_newaddr={0x34, 0x14, 0x500, 0x70bd26, 0x25dfdbfd, {0xa, 0x18, 0x238, 0xfd, r11}, [@IFA_FLAGS={0x8, 0x8, 0x10}, @IFA_CACHEINFO={0x14, 0x6, {0xfffffffa, 0x7, 0xfd, 0x3}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040000}, 0x44) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000002bc0)={0x0, @in={{0x2, 0x4e24, @local}}}, &(0x7f0000002c80)=0x84) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000200)={0xf41, 0x401, 0x4, 'queue0\x00', 0x2}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000002cc0)={r13, @in6={{0xa, 0x4e22, 0x0, @remote, 0x200}}, 0x80000001, 0x9, 0x80000000, 0x7fff}, &(0x7f0000002d80)=0x98) [ 393.787472] audit: type=1800 audit(1569988841.554:150): pid=11830 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16689 res=0 [ 393.928726] device hsr_slave_1 left promiscuous mode [ 393.983864] device hsr_slave_0 left promiscuous mode [ 394.043892] team0 (unregistering): Port device team_slave_1 removed [ 394.073831] team0 (unregistering): Port device team_slave_0 removed [ 394.110863] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 394.184560] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 394.326057] bond0 (unregistering): Released all slaves 04:00:42 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 394.396004] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 394.417212] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet_tcp_int(r0, 0x6, 0xb, &(0x7f0000000000)=0x8aa, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) 04:00:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100004}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x78, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffeffff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x940}]}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x41000}, 0x8000) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) 04:00:42 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={0x0, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 394.655823] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 394.696193] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 394.846447] audit: type=1800 audit(1569988842.614:151): pid=11841 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16689 res=0 [ 397.010811] IPVS: ftp: loaded support on port[0] = 21 [ 397.913051] IPVS: ftp: loaded support on port[0] = 21 [ 397.941690] chnl_net:caif_netlink_parms(): no params data found [ 397.997581] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.004121] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.011337] device bridge_slave_0 entered promiscuous mode [ 398.017995] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.024425] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.031263] device bridge_slave_1 entered promiscuous mode [ 398.048950] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 398.059595] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 398.109584] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 398.116634] team0: Port device team_slave_0 added [ 398.122503] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 398.129516] team0: Port device team_slave_1 added [ 398.149362] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 398.163355] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 398.183915] chnl_net:caif_netlink_parms(): no params data found [ 398.222164] device hsr_slave_0 entered promiscuous mode [ 398.280303] device hsr_slave_1 entered promiscuous mode [ 398.350719] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 398.365516] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 398.392401] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.398791] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.406078] device bridge_slave_0 entered promiscuous mode [ 398.412883] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.419219] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.426200] device bridge_slave_1 entered promiscuous mode [ 398.450657] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 398.458679] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.465029] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.471609] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.477932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.489936] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 398.514693] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 398.522016] team0: Port device team_slave_0 added [ 398.527813] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 398.534936] team0: Port device team_slave_1 added [ 398.540332] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 398.547605] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 398.612670] device hsr_slave_0 entered promiscuous mode [ 398.650371] device hsr_slave_1 entered promiscuous mode [ 398.696538] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 398.707297] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 398.723751] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.730135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.736700] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.743073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.773750] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 398.779811] 8021q: adding VLAN 0 to HW filter on device bond0 [ 398.788885] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 398.804533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 398.811668] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.818190] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.825409] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.832160] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.844631] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 398.850790] 8021q: adding VLAN 0 to HW filter on device team0 [ 398.860968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 398.868476] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.874830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.885475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 398.893754] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.900205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.909137] 8021q: adding VLAN 0 to HW filter on device bond0 [ 398.929213] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 398.939674] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 398.949929] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 398.956322] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 398.964494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 398.972640] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 398.980449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 398.987774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 398.995516] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 399.002457] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 399.011014] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 399.018520] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 399.030556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 399.037298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 399.045091] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 399.052358] 8021q: adding VLAN 0 to HW filter on device team0 [ 399.058769] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 399.065693] device bridge_slave_1 left promiscuous mode [ 399.072723] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.110920] device bridge_slave_0 left promiscuous mode [ 399.116404] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.199243] bond2 (unregistering): Released all slaves [ 399.208346] bond1 (unregistering): Released all slaves [ 399.252339] device hsr_slave_1 left promiscuous mode [ 399.293861] device hsr_slave_0 left promiscuous mode [ 399.342730] team0 (unregistering): Port device team_slave_1 removed [ 399.353043] team0 (unregistering): Port device team_slave_0 removed [ 399.362696] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 399.412948] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 399.483270] bond0 (unregistering): Released all slaves [ 399.525403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 399.537997] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 399.544429] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 399.552515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 399.560753] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.567105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.581921] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 399.589547] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 399.604554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 399.612368] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.618691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.629878] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 399.637327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 399.647677] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 399.654635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 399.665334] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 399.674523] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 399.682634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 399.690810] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 399.698200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 399.706133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 399.713837] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 399.729437] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 399.736321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 399.743778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 399.753887] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 399.762240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 399.769597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 399.778490] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 399.784907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 399.834331] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 399.852797] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 399.894140] 9pnet: p9_fd_create_tcp (11887): problem connecting socket to 127.0.0.1 04:00:47 executing program 2: symlinkat(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) r1 = fanotify_init(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) fanotify_mark(r1, 0x2000000000000011, 0x2, r0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000440)='./file0\x00', 0x90002) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockname$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c) sendfile(r2, r2, 0x0, 0x8800000) 04:00:47 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={0x0, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, 0x9, 0x0, 0x80, &(0x7f0000ffa000/0x3000)=nil, 0x5}) 04:00:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x2, 0x201200) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000340)='threaded\x00', 0x9) r4 = open(&(0x7f00000002c0)='./file0\x00', 0x200000, 0x2) ioctl$KDGETMODE(r4, 0x4b3b, &(0x7f0000000300)) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, &(0x7f0000000180)="0f30f3ad660f67b899002082100066b9330200000f320f01ca66b9800000c00f326635001000000f30650f7826540a66b80f0000000f23c00f21f86635030007000f23f80f1f4000", 0x48}], 0x1, 0x20, &(0x7f0000000240)=[@cstype3={0x5, 0x6}, @cstype0={0x4, 0x4}], 0x2) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r6 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$HDIO_GETGEO(r6, 0x301, &(0x7f0000000080)) r7 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4, 0xa002) setsockopt$inet_dccp_int(r7, 0x21, 0xd23e30743ab162c4, &(0x7f0000000140)=0x7, 0x4) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r5, 0x800454d2, 0x70f000) 04:00:47 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={0x0, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 400.012417] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 400.031970] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 400.103019] audit: type=1800 audit(1569988847.874:152): pid=11907 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=17137 res=0 [ 400.394919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25964 sclass=netlink_route_socket pig=11903 comm=syz-executor.4 [ 400.940362] audit: type=1800 audit(1569988848.704:153): pid=11916 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=17137 res=0 04:00:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=@setlink={0xac, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x78, 0x2b, [@IFLA_XDP_FD={0x74, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_IFALIAS={0x14, 0x14, 'rose0\x00'}]}, 0xac}}, 0x0) 04:00:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x932168397a31777c, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = accept$inet6(r1, 0x0, &(0x7f0000000080)) fchmod(r4, 0x40) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'vet\x00#\x99\x00', 0x43732e5398416f1a}) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$RTC_VL_CLR(r6, 0x7014) write$cgroup_type(r5, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$KVM_ASSIGN_SET_MSIX_NR(r5, 0x4008ae73, &(0x7f0000000000)={0x2, 0xfff}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) 04:00:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f00000002c0)=0xffffffffffffff13) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="200000001e00010200002a08dc370a8aba0b6c4c913b9359f57b9a21c0a13479295542007be2c2f06698517e53236be4931eb8405b404545b1d48b65780414120a27fd7a7e4e60603a3fd2d38655f409b28615e5a72e476bc290c7fbd78b8abf3cf0f40b692e622f03679ba1268f5ab51bf783b36364684252ccbde07eac6cd0382b716791341b43811fe277dcd5110c21ba9eab2c1164228fe00e40ac7884dde47789d53fc76474e80f12ff6477248fcc2b70d31fbc8c8c3551292dbb4f077b1b6804bd7b1375d84e199cb55b5ef0d9709fc5db0e594f22ebc02b7e06dd2e769d026245173480ae4cffd94b3f5ce570fd0c00000000000000", @ANYRES32=0x0, @ANYBLOB="b742c6242dde7c00acf1f7040cdbcb15f5df1f64ef0b5854b6cb57a7cad8212d79865c022cbd0c9f68632a9c0384564bce18f4654ffe6e7962feafc1bd264533ae55d15f5e3ec65fc217b2d9352851a97271e268322ee65d03f03e2b0cd3bd3c39342f17477c580db8f8dfcafb3ddba09f9c7c559a891ebfd53bc026632ade20bd1b996fd52ac3541997195f636c7df0392fabe2f3048aee4a9b291d77d88c703e7f3b09e1b359cabbd2725fa60c4ff8fc6940dfa077"], 0x20}}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000280)={0x1}, 0x1) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000000)={0x0, 0x0, [], @raw_data=[0x8f, 0x4fa324f5, 0x2, 0x8000, 0x6, 0x1, 0x401, 0xffff, 0x8, 0x0, 0x8, 0x5, 0x40, 0x3, 0x411c, 0x20, 0x80000001, 0x1, 0x0, 0x3, 0xecc7, 0x1, 0x401, 0x200, 0x80000000, 0x3, 0xffffffff, 0x3, 0xacbc, 0x8, 0xf1e, 0x5]}) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000100)={0x1, 0x0, {0x80000001, 0x8, 0x3d, 0x7116}}) 04:00:48 executing program 2: symlinkat(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) r1 = fanotify_init(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) fanotify_mark(r1, 0x2000000000000011, 0x2, r0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000440)='./file0\x00', 0x90002) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockname$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c) sendfile(r2, r2, 0x0, 0x8800000) 04:00:48 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 401.105773] 9pnet: p9_fd_create_tcp (11925): problem connecting socket to 127.0.0.1 04:00:49 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 401.221105] audit: type=1800 audit(1569988848.984:154): pid=11931 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16977 res=0 04:00:49 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000371000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000040)={{0x80}, '\nL\xea\xa0]\x9a\x00\x00\x00\b\x00\x00\x00\x03\x9b?\xd4\xce\xc3\a\xe8\xef=\x13\xeby\x0e\xc9\xc6Z\xba\xf9\r\"\x9d\xb6\x92T.[x\xf8\xb2\x9e\n\'\x80\x0f\x00\x00\x00\x00\x00\x00\x00\t\xfbB\xf3vX\x97\x01\xa4', 0xa9824f69d1376637, 0x10000a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000}) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={r1}) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) 04:00:49 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:49 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) dup2(0xffffffffffffffff, r2) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r10, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:49 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) dup2(0xffffffffffffffff, r2) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r10, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:49 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) dup2(0xffffffffffffffff, r2) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r10, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={0x0, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:49 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:50 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r1, 0x800454d2, 0x70f000) [ 403.770335] device bridge_slave_1 left promiscuous mode [ 403.775806] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.830692] device bridge_slave_0 left promiscuous mode [ 403.836131] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.881682] device bridge_slave_1 left promiscuous mode [ 403.887161] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.921026] device bridge_slave_0 left promiscuous mode [ 403.926474] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.085233] device hsr_slave_1 left promiscuous mode [ 404.132787] device hsr_slave_0 left promiscuous mode [ 404.172717] team0 (unregistering): Port device team_slave_1 removed [ 404.182470] team0 (unregistering): Port device team_slave_0 removed [ 404.191716] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 404.235498] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 404.320961] bond0 (unregistering): Released all slaves [ 404.402257] device hsr_slave_1 left promiscuous mode [ 404.454989] device hsr_slave_0 left promiscuous mode [ 404.513751] team0 (unregistering): Port device team_slave_1 removed [ 404.523365] team0 (unregistering): Port device team_slave_0 removed [ 404.533282] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 404.575034] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 404.650872] bond0 (unregistering): Released all slaves [ 407.201342] IPVS: ftp: loaded support on port[0] = 21 [ 407.942259] IPVS: ftp: loaded support on port[0] = 21 [ 408.016176] chnl_net:caif_netlink_parms(): no params data found [ 408.061486] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.067860] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.076624] device bridge_slave_0 entered promiscuous mode [ 408.085751] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.092602] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.099381] device bridge_slave_1 entered promiscuous mode [ 408.122904] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 408.134508] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 408.179694] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 408.186741] team0: Port device team_slave_0 added [ 408.192358] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 408.199377] team0: Port device team_slave_1 added [ 408.206820] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 408.216003] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 408.223172] chnl_net:caif_netlink_parms(): no params data found [ 408.293676] device hsr_slave_0 entered promiscuous mode [ 408.340499] device hsr_slave_1 entered promiscuous mode [ 408.380656] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 408.387640] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 408.413464] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.419857] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.427100] device bridge_slave_0 entered promiscuous mode [ 408.433994] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.440396] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.447268] device bridge_slave_1 entered promiscuous mode [ 408.467110] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 408.477482] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 408.498760] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 408.506025] team0: Port device team_slave_0 added [ 408.511561] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.517894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.524534] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.530881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.542482] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 408.551837] team0: Port device team_slave_1 added [ 408.557092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 408.566451] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 408.623435] device hsr_slave_0 entered promiscuous mode [ 408.670441] device hsr_slave_1 entered promiscuous mode [ 408.715047] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 408.723019] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 408.740642] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.746973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.753588] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.759913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.778334] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 408.784740] 8021q: adding VLAN 0 to HW filter on device bond0 [ 408.796193] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 408.806670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 408.814178] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.821388] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.829966] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.836655] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.846362] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 408.852750] 8021q: adding VLAN 0 to HW filter on device team0 [ 408.862766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 408.870527] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.876857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.892698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 408.900364] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.906686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.914092] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 408.922690] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 408.934142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 408.948540] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 408.960460] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 408.971221] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 408.979203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 408.987004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 408.996223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 409.003347] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 409.010497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 409.022616] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 409.029683] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 409.039406] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 409.046309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 409.053587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 409.063642] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 409.074415] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 409.082491] 8021q: adding VLAN 0 to HW filter on device team0 [ 409.091438] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 409.098438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 409.106865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 409.114464] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.120825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 409.129579] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 409.139708] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 409.147629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 409.156027] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 409.163707] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.170095] bridge0: port 2(bridge_slave_1) entered forwarding state [ 409.177417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 409.187184] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 409.194625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 409.207014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 409.215138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 409.223903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 409.239459] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 409.251297] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 409.256631] 9pnet: p9_fd_create_tcp (11992): problem connecting socket to 127.0.0.1 [ 409.265160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 409.275314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 409.288688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 409.296219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 409.304313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 04:00:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:57 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:57 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@gettclass={0x24, 0x2a, 0x52d, 0x0, 0x0, {0x0, r3, {}, {0x0, 0xf0ffff}}}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', r3}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) 04:00:57 executing program 2: symlinkat(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) r1 = fanotify_init(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) fanotify_mark(r1, 0x2000000000000011, 0x2, r0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000440)='./file0\x00', 0x90002) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockname$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x1c) sendfile(r2, r2, 0x0, 0x8800000) 04:00:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getpeername$unix(r1, &(0x7f0000000200), &(0x7f0000000000)=0x6e) [ 409.313525] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 409.321074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 409.328491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 409.349570] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 409.356261] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 409.398163] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 409.427540] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 409.437455] audit: type=1800 audit(1569988857.204:155): pid=12005 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=17326 res=0 [ 409.450787] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 409.508323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 410.275315] device bridge_slave_1 left promiscuous mode [ 410.280933] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.321935] device bridge_slave_0 left promiscuous mode [ 410.327570] bridge0: port 1(bridge_slave_0) entered disabled state 04:00:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:00:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x8, 0x2, &(0x7f0000002440)=[{0x0, 0x0, 0x80}, {&(0x7f0000001440)='ERu', 0x3}]) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000080)={0x26, 0x1, 0x2, 0x80}, 0xc) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000000)={0x1, 0x4, "f1b75789"}) 04:00:58 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:58 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e00010200"/20, @ANYRES32=0x0, @ANYBLOB="00000000e3ffffff"], 0x20}}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000440)={r3, 0xff, "56cf303eda36bf524c57efa0edc9bbe04d60583c32ffebbac4f5aea68c25522e3014834a6699f614c52bc8ceb29ef3e7bfe27f8977f0d08e0a95efc4780408b8b021bf0cf70dc0eea8b7277e779cb1c66fd161184d5df214449dd6419c59cafe2861324f702afd5c2d90589897a14ae341561746eebe2cff9816e721e7a4dbb30bad02d57ad6bea75fce9a740630d576b82cd97bab0695843e82cdc385eb45694e6dbd6b7ad5759350d463ed7886bb816ff15a4086d0e486cebbfceb946e14985f93a56f3bf6776d20d52346d97159cb592147b2ffa1d4ed08a548e5ecb51283e7a6cedf9e305f8fd3a29050010f18b1b242c00cc9850eb204538638bcb66b"}, &(0x7f0000000000)=0x107) 04:00:58 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r3 = fcntl$dupfd(r0, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r4, 0x800454d2, 0x70f000) [ 410.465284] device hsr_slave_1 left promiscuous mode 04:00:58 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='thr\x00\x00\x82\xbb\b\x00', 0x9) r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) write$vhci(r0, &(0x7f0000000080)=@HCI_VENDOR_PKT={0xff, 0x40}, 0x2) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xc) process_vm_writev(r4, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/58, 0x3a}], 0x1, &(0x7f00000013c0)=[{&(0x7f0000000340)=""/104, 0x68}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x2, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x9, &(0x7f00000000c0)=""/180) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000240)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$BLKRRPART(r6, 0x40480923, 0x0) [ 410.513467] device hsr_slave_0 left promiscuous mode [ 410.574821] team0 (unregistering): Port device team_slave_1 removed [ 410.615716] team0 (unregistering): Port device team_slave_0 removed [ 410.671038] bond0 (unregistering): Releasing backup interface bond_slave_1 04:00:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x1ff}) r2 = syz_open_pts(r1, 0x4000000000000002) sendfile(r2, r0, 0x0, 0x6f0a77bd) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) write$binfmt_misc(r3, &(0x7f0000000080)={'syz1', "a2a4027d540c375426d12af6d229ea3e46407daa8cfac087bc90dcca8710e8be46c2a12afecf7d61e135b610234fcec0aa29dc8f582caa3c60768f2e92d336736780655391370cf8d3b8a4c9c8a9b63acc238dfef08f0dad96b2ba12bcd79133c95c07a211847e42e94cf9f6e89eb11216627b9ff3e74b2ee71c8bbe7ee195487f36d4"}, 0x87) [ 410.757483] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 410.876531] bond0 (unregistering): Released all slaves 04:00:58 executing program 3: r0 = open(0x0, 0x8200, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x100, 0x8001) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="6800000010000507000000000000000000000000772cdbd79a9e4f74e668402679c72fab2a8889189341c4c19b27cdf96edc14932be829b5b1", @ANYRES32=0x0, @ANYBLOB="000000000000000048001200100001006970366772657461700000003400020014000600fe8000000000000000000000000000aa14000700fe8000000000000000000000000000aa08000100", @ANYRES32=r3], 0x68}}, 0x0) [ 410.967601] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 410.985011] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:00:58 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 411.049618] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. 04:00:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000900)='/dev/zero\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f00000002c0)={0x9, 0x1, 0x1f, 0x9, 0xd1}, 0xc) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000000)={{0x2, 0x0, @identifier="c78a6b4f863bfa2834ca94b932216a15"}}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) recvmmsg(r4, &(0x7f0000000240)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/45, 0x2d}], 0x1, &(0x7f0000000180)=""/189, 0xbd}, 0x10000}], 0x1, 0x40000000, &(0x7f0000000280)={0x0, 0x989680}) sendfile(r0, r3, 0x0, 0xedc0) 04:00:58 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:00:58 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) accept(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000), 0x1c) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) splice(0xffffffffffffffff, &(0x7f0000000100), 0xffffffffffffffff, &(0x7f0000000400)=0x3ff, 0x5, 0x9502bb7e212d3429) listen(r1, 0x6) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x8000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x1ff) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt(r3, 0x10d, 0x800000000d, &(0x7f0000000700)="07d46c8e3963bef1855a3907e3ada98ff400d535bca5a88523a4570c2c3dc139b128d75bf990b1010fdb2ffac1dacf3b24c3ea82c8276bb5c259c3c4a11084a46aea90273a2eaabc11d8dff0fe8bc65578eaf2145a97e646f489491476f5f85e2c68418d94c9f8dd509f83e8229aac9a7a88147afb59d8e1110c034927ccf989ab98e852baa6fe410dfd426fb711c912fec7abbc5124e115534819f57006c8803966de673a0705a965472c1cef0bacac6f5b81db328fd67d9d54e50b2f5cbffaa6f29a191de49adb2d65ccca3eb3384b08584e76df094464c4ee4dc3591ebe4120114e906a51e5", 0xe7) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r5 = fcntl$getown(0xffffffffffffffff, 0x9) process_vm_writev(r5, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f0000000ac0)=[{&(0x7f00000003c0)=""/23, 0x17}], 0x1, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000040)={0x20}) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=ANY=[@ANYBLOB="6331f62311ac5e298c5fd2b97b60a221a200b557e0a935f2c25ccc9ac85c032e0a7b63c94d6b722731d4d96741e526e8cfe25c234d4807389013f75170798963469469b5e4d07b6dec81d9a5a2b8a040ac50402103f8ee2d00219f5307eaea1edbaa4a69fa24cb742d42003968f7335a756839"], 0x1}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='io.stat\x00', 0x0, 0x0) r6 = gettid() fcntl$setown(0xffffffffffffffff, 0x8, r6) r7 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x200, 0x10000) ioctl$VT_OPENQRY(r7, 0x5600, &(0x7f0000000180)) [ 411.292259] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 411.319629] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 411.455474] device nr0 entered promiscuous mode [ 413.461963] IPVS: ftp: loaded support on port[0] = 21 [ 414.394948] chnl_net:caif_netlink_parms(): no params data found [ 414.426974] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.433492] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.440614] device bridge_slave_0 entered promiscuous mode [ 414.447146] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.453590] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.460798] device bridge_slave_1 entered promiscuous mode [ 414.475975] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 414.484866] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 414.504126] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 414.511331] team0: Port device team_slave_0 added [ 414.516719] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 414.523932] team0: Port device team_slave_1 added [ 414.529066] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 414.536534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 414.602140] device hsr_slave_0 entered promiscuous mode [ 414.640411] device hsr_slave_1 entered promiscuous mode [ 414.690549] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 414.697447] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 414.709329] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.715708] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.722339] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.728673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.754533] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 414.760834] 8021q: adding VLAN 0 to HW filter on device bond0 [ 414.768471] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 414.777232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 414.784534] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.792012] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.801314] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 414.807373] 8021q: adding VLAN 0 to HW filter on device team0 [ 414.816567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 414.824162] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.830514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.851192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 414.858715] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.865168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.873861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 414.882724] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 414.890230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 414.897517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 414.905509] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 414.911624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 414.918523] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 414.929661] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 414.939750] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 415.380398] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:01:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:03 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000000)={0x3, 0x1, 0x6, 0x5b4}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) 04:01:03 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x16c) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffffe) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e23}, 0xd5d8230dec37c5be) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000380)=0x9) r4 = syz_open_dev$midi(0x0, 0x9e7e, 0x1201c2) syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000480)={0x2, 'syz_tun\x00', 0x1}, 0x18) write$P9_RLOPEN(r1, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r3, 0x200000000002) r5 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000400)=[@in6={0xa, 0x4e24, 0x7e0fdecf, @mcast2}, @in6={0xa, 0x4e24, 0x4ca, @mcast1, 0xfffffffffffffffa}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e23, 0x3, @local, 0x100000000}, @in={0x2, 0x4e21, @local}], 0x74) ioctl$VIDIOC_ENUMAUDIO(r4, 0xc0345641, &(0x7f00000003c0)={0x800, "45343e2dcb31b8b5c3be52e072b800a41540f59a91ae9e5c6ea47b016ce0f3a5", 0x3, 0x1}) signalfd4(r2, &(0x7f0000000100)={0xffffffffffffffff}, 0x8, 0x0) renameat2(0xffffffffffffffff, 0x0, r1, 0x0, 0x0) dup(0xffffffffffffffff) 04:01:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) socket$nl_route(0x10, 0x3, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f00000000c0)=@rose={'rose', 0x0}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x600c00, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @empty}, &(0x7f0000000080)=0xc) 04:01:03 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80400, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r2, @ANYBLOB="0a042abd7000fbdbdf250b00000018000300140002007665746831000000000000000000000008000500050000001425da0f4761c56dd90466041e11000200080022004e23000008000d007500000008000400ff00000008000500ff00000048000100080006007272000008000200040000000c00070039593e940000000008000500060000000800050002000000080009006f00000008000b0008000b007369700000000000"], 0xa0}, 0x1, 0x0, 0x0, 0x4000}, 0x40031) [ 416.113857] 9pnet: p9_fd_create_tcp (12105): problem connecting socket to 127.0.0.1 04:01:03 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 416.193253] audit: type=1400 audit(1569988863.964:156): avc: denied { map } for pid=12111 comm="syz-executor.3" path="/dev/sg0" dev="devtmpfs" ino=15464 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file permissive=1 [ 416.219870] Unknown ioctl 4703 [ 416.234693] Unknown ioctl 4703 04:01:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) r3 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) close(r3) 04:01:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:04 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:04 executing program 2: prlimit64(0x0, 0x9, &(0x7f0000000040)={0x7f}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) accept(r1, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, &(0x7f0000000100)=0x80) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x89f29288dfa09f7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0x10001) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x594204ba96966eb0) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000200)=0xc) socket$nl_generic(0x10, 0x3, 0x10) readahead(r2, 0x100000001, 0xfffffffffffffff7) [ 416.446423] 9pnet: p9_fd_create_tcp (12129): problem connecting socket to 127.0.0.1 04:01:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:04 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETOFFLOAD(r3, 0x800454d2, 0x37) 04:01:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:05 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r8 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r8, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r10, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r9, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:05 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/checkreqprot\x00', 0x19cf247be9da7b5a, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@gettclass={0x24, 0x2a, 0x52d, 0x0, 0x0, {0x0, r4, {}, {0x0, 0xf0ffff}}}, 0x24}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa7, 0xfffffffe, 0x0, r0, 0xfd6f, [], r4}, 0x3c) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xa0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:power_device_t:s0\x00', 0x24, 0x0) [ 417.345457] device bridge_slave_1 left promiscuous mode [ 417.351379] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.421691] device bridge_slave_0 left promiscuous mode [ 417.429462] bridge0: port 1(bridge_slave_0) entered disabled state 04:01:05 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x1}}, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x61883bea5100b932, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xf17) unshare(0x40040400) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000080)={{0x100000000, 0x7, 0x12000, 0x0, 0x774}}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x1, 0x8, 0xa5c, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x7, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x4, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x2, 0x4}, 0x0, 0x5e, 0xeb67, 0x0, 0x0, 0x5, 0x6}, 0x0, 0x9, r4, 0xc) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x4200) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x14) r5 = fanotify_init(0x0, 0x0) fanotify_mark(r5, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) write$P9_RREAD(r2, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x208) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) close(0xffffffffffffffff) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r6, 0xc4c85513, &(0x7f0000000c80)={{0x1, 0x1, 0x6, 0x80000001, 'syz1\x00', 0x2}, 0x1, [0x6, 0x101, 0x7, 0x80, 0x3, 0x5, 0x3f, 0x1, 0x2, 0x0, 0x7f, 0x9, 0x8, 0x8, 0x8, 0x1f, 0x33da, 0x4, 0x7, 0x80000000, 0x0, 0x5, 0x100000001, 0x8, 0xb500000000000000, 0x7ff, 0x0, 0x1d3, 0x3, 0x4, 0xa35, 0x1000, 0x0, 0x7fae80fd, 0xfffffffffffffa05, 0x6cc8, 0x3, 0xfffffffffffffff8, 0x6, 0x10001, 0x9, 0xcf1e, 0x1, 0x200, 0x4, 0xffffffff7fffffff, 0x5, 0xffffffffffffffc1, 0x80000001, 0x2, 0x9, 0x7, 0x1000, 0x8, 0x37, 0x6, 0x1fa, 0x4, 0xcb, 0x7, 0x81, 0x8000, 0x5, 0x40, 0x1, 0x1, 0x7, 0x101, 0xb2, 0x2ea, 0x0, 0x7, 0xfbe, 0x800, 0xfff, 0x3, 0x8, 0x8, 0x10001, 0x9, 0x101, 0x6, 0x0, 0x1848, 0x5, 0xd44, 0x4, 0x5, 0x4, 0x3, 0x1, 0x1, 0x80000000, 0x6, 0x2, 0x23f, 0x1ff, 0x5, 0x7, 0x5a20, 0xffffffffffffffff, 0x3ff, 0x38000, 0x1, 0x1, 0x101, 0x2, 0xcedc, 0x9, 0x6, 0x8e, 0x2, 0x0, 0x8, 0x6, 0x7, 0x80, 0x5, 0x3, 0x4, 0x8, 0x24, 0x1cf, 0x401, 0x6, 0x81, 0x3, 0x1], {0x0, 0x1c9c380}}) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000480)={0xffffffffffffffff, r4, 0x9f7, 0x63, &(0x7f0000000040)="afadd26e7504c5f39e22000b0b9b81136075d19d7e724c84e17330c2b77f599eaa454d42859a1b4ae09d7840cc7d1abca1fb636017f91eca69b09982011b18b41ab97877596225a1c1143898b8b5175ccf09dd7b3854112c49ecc0548ee15a0d70237e", 0x9439, 0x4, 0x6, 0x8, 0xfe00, 0x0, 0x3, 'syz9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe3\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x009[JB\xf7\xda\x8f\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00\x01\x00'}) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x0, 0x0, 0x0, 0xb, 0x3, 0x401, 0x3}}) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000380)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) [ 417.657019] device hsr_slave_1 left promiscuous mode [ 417.669430] rtc_cmos 00:00: Alarms can be up to one day in the future [ 417.716927] device hsr_slave_0 left promiscuous mode [ 417.736852] team0 (unregistering): Port device team_slave_1 removed [ 417.749649] team0 (unregistering): Port device team_slave_0 removed [ 417.765049] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 417.789711] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 417.879379] bond0 (unregistering): Released all slaves 04:01:05 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r8 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r8, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r10, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r9, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 417.915900] audit: type=1400 audit(1569988865.684:157): avc: denied { relabelto } for pid=12154 comm="syz-executor.4" name="file0" dev="sda1" ino=17347 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:power_device_t:s0 tclass=file permissive=1 [ 417.965984] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 417.983211] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 418.013311] audit: type=1400 audit(1569988865.784:158): avc: denied { write } for pid=12154 comm="syz-executor.4" name="file0" dev="sda1" ino=17347 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:power_device_t:s0 tclass=file permissive=1 [ 418.021094] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 418.046798] audit: type=1400 audit(1569988865.784:159): avc: denied { open } for pid=12154 comm="syz-executor.4" path="/root/syzkaller-testdir034659906/syzkaller.m75NRP/197/file0" dev="sda1" ino=17347 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:power_device_t:s0 tclass=file permissive=1 04:01:05 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r8 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r8, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r10, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r9, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 418.082362] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:01:05 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") write$input_event(r4, &(0x7f0000000900)={{}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r8 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r8, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r10, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r9, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:06 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") write$input_event(r4, &(0x7f0000000900)={{}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r8 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r8, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r10, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r9, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 418.283198] audit: type=1400 audit(1569988866.054:160): avc: denied { relabelfrom } for pid=12154 comm="syz-executor.4" name="file0" dev="sda1" ino=17347 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:power_device_t:s0 tclass=file permissive=1 [ 418.379529] audit: type=1400 audit(1569988866.144:161): avc: denied { getattr } for pid=6819 comm="syz-executor.4" path="/root/syzkaller-testdir034659906/syzkaller.m75NRP/197/file0" dev="sda1" ino=17347 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:power_device_t:s0 tclass=file permissive=1 [ 418.480976] audit: type=1400 audit(1569988866.144:162): avc: denied { unlink } for pid=6819 comm="syz-executor.4" name="file0" dev="sda1" ino=17347 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:power_device_t:s0 tclass=file permissive=1 [ 420.440825] IPVS: ftp: loaded support on port[0] = 21 [ 421.387086] chnl_net:caif_netlink_parms(): no params data found [ 421.423980] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.430425] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.437192] device bridge_slave_0 entered promiscuous mode [ 421.444413] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.450845] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.457620] device bridge_slave_1 entered promiscuous mode [ 421.477761] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 421.486579] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 421.505825] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 421.513059] team0: Port device team_slave_0 added [ 421.521069] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 421.528061] team0: Port device team_slave_1 added [ 421.533348] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 421.541068] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 421.602135] device hsr_slave_0 entered promiscuous mode [ 421.640277] device hsr_slave_1 entered promiscuous mode [ 421.683531] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 421.690487] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 421.704546] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.710900] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.717448] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.723824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.753265] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 421.759335] 8021q: adding VLAN 0 to HW filter on device bond0 [ 421.767077] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 421.777702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.785134] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.792416] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.801546] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 421.807611] 8021q: adding VLAN 0 to HW filter on device team0 [ 421.818017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.826101] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.832465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.841489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.849048] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.855432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.875737] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 421.885550] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 421.896280] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 421.905735] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 421.913239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 421.921819] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.929320] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 421.936812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 421.943618] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 421.957219] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 421.968126] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 422.070428] device bridge_slave_1 left promiscuous mode [ 422.075910] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.125459] 9pnet: p9_fd_create_tcp (12197): problem connecting socket to 127.0.0.1 [ 422.133530] device bridge_slave_0 left promiscuous mode [ 422.133642] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.262816] device hsr_slave_1 left promiscuous mode [ 422.302456] device hsr_slave_0 left promiscuous mode [ 422.342629] team0 (unregistering): Port device team_slave_1 removed [ 422.352392] team0 (unregistering): Port device team_slave_0 removed [ 422.361543] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 422.396341] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 422.450947] bond0 (unregistering): Released all slaves 04:01:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:10 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000006980)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000006780)=[{{&(0x7f0000000000)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/186, 0xba}], 0x1, &(0x7f0000000440)=""/77, 0x4d}, 0x5}, {{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000540)=""/146, 0x92}, 0x3}, {{&(0x7f0000000600)=@pppol2tpv3, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000180)=""/7, 0x7}, {&(0x7f0000001680)=""/20, 0x14}, {&(0x7f00000016c0)=""/222, 0xde}], 0x4, &(0x7f0000001800)=""/123, 0x7b}, 0x1}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001880)=""/40, 0x28}], 0x1, &(0x7f0000001900)=""/4096, 0x1000}, 0x7}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000002900)=""/10, 0xa}], 0x1, &(0x7f0000002980)=""/61, 0x3d}, 0x1000}, {{&(0x7f00000029c0)=@ipx, 0x80, &(0x7f0000004b40)=[{&(0x7f0000002a40)=""/4096, 0x1000}, {&(0x7f0000003a40)=""/4096, 0x1000}, {&(0x7f0000004a40)=""/241, 0xf1}], 0x3, &(0x7f0000004b80)=""/103, 0x67}, 0xf24}, {{0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004c00)=""/55, 0x37}, {&(0x7f0000004c40)=""/220, 0xdc}, {&(0x7f0000004d40)=""/168, 0xa8}, {&(0x7f0000004e00)=""/90, 0x5a}], 0x4, &(0x7f0000004ec0)=""/208, 0xd0}, 0x1}, {{&(0x7f0000004fc0)=@sco, 0x80, &(0x7f0000006680)=[{&(0x7f0000005040)=""/193, 0xc1}, {&(0x7f0000005140)=""/126, 0x7e}, {&(0x7f00000051c0)=""/244, 0xf4}, {&(0x7f00000052c0)=""/132, 0x84}, {&(0x7f0000005380)=""/4096, 0x1000}, {&(0x7f0000006380)=""/70, 0x46}, {&(0x7f0000006400)=""/226, 0xe2}, {&(0x7f0000006500)=""/138, 0x8a}, {&(0x7f00000065c0)=""/169, 0xa9}], 0x9, &(0x7f0000006740)=""/3, 0x3}, 0xaf0}], 0x8, 0x2020, &(0x7f00000069c0)={r1, r2+10000000}) clock_gettime(0x0, &(0x7f0000006a40)={0x0, 0x0}) sendmsg$can_bcm(r3, &(0x7f0000006b40)={&(0x7f0000006a00), 0x10, &(0x7f0000006b00)={&(0x7f0000006a80)={0x3, 0xd08, 0x4, {r4, r5/1000+10000}, {}, {0x4}, 0x1, @can={{0x3, 0x0, 0x1, 0x1}, 0x7, 0x3, 0x0, 0x0, "aa365d6449a9c59f"}}, 0x48}, 0x1, 0x0, 0x0, 0x4008000}, 0x40000) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) 04:01:10 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") write$input_event(r4, &(0x7f0000000900)={{}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r8 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r8, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r10, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r9, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xffffffffffffffe1, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r3, 0xc0206416, &(0x7f00000001c0)={0x9, 0x7, 0x1, 0x6, 0x1, 0x8}) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'dummy0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast1, @local}, &(0x7f0000000400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@broadcast, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000075c0)={'team0\x00'}) [ 422.520382] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 422.553453] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 422.562189] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 422.582294] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 422.629035] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 424.100839] IPVS: ftp: loaded support on port[0] = 21 [ 424.933344] chnl_net:caif_netlink_parms(): no params data found [ 424.973269] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.979639] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.986800] device bridge_slave_0 entered promiscuous mode [ 424.997481] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.003903] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.011081] device bridge_slave_1 entered promiscuous mode [ 425.026664] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 425.035464] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 425.056423] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 425.063452] team0: Port device team_slave_0 added [ 425.068669] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 425.075785] team0: Port device team_slave_1 added [ 425.081073] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 425.088185] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 425.153965] device hsr_slave_0 entered promiscuous mode [ 425.220290] device hsr_slave_1 entered promiscuous mode [ 425.290676] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 425.297540] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 425.312049] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.318389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.325008] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.331354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 425.357598] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 425.364246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 425.372492] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 425.383246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 425.390990] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.397582] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.406367] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 425.412928] 8021q: adding VLAN 0 to HW filter on device team0 [ 425.423291] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 425.431678] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.438008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 425.452708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 425.460624] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.466955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.474588] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 425.482369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 425.497833] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 425.505409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 425.514929] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 425.527277] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 425.533328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 425.540504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 425.553877] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 425.565601] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 425.670420] device bridge_slave_1 left promiscuous mode [ 425.675874] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.730831] device bridge_slave_0 left promiscuous mode [ 425.736485] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.758848] 9pnet: p9_fd_create_tcp (12222): problem connecting socket to 127.0.0.1 [ 425.823305] device hsr_slave_1 left promiscuous mode [ 425.862581] device hsr_slave_0 left promiscuous mode [ 425.912904] team0 (unregistering): Port device team_slave_1 removed [ 425.922496] team0 (unregistering): Port device team_slave_0 removed [ 425.931828] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 425.996329] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 426.064348] bond0 (unregistering): Released all slaves 04:01:13 executing program 3: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r2 = fcntl$getown(r0, 0x9) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000040)={{0x4, 0x5, 0x0, 0x80, 'syz1\x00', 0x200}, 0x8, 0x400, 0x4000, r2, 0x2, 0x3, 'syz1\x00', &(0x7f0000000000)=[']!*\x00', '\\\x00'], 0x6, [], [0x3, 0x6, 0x1, 0x3]}) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 04:01:13 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x0, 0x70bd25, 0x25dfdbfe, {}, [""]}, 0x14}}, 0x40000) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r4, 0x100, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x24004040) 04:01:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000540)=""/169) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x6, 0x18200) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@gettclass={0x24, 0x2a, 0x52d, 0x0, 0x0, {0x0, r5, {}, {0x0, 0xf0ffff}}}, 0x24}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@ipv4_deladdr={0x0, 0x15, 0x800, 0x70bd2b, 0x25dfdbff, {0x2, 0x20, 0x25, 0xc8, r5}, [@IFA_LABEL={0x0, 0x3, 'veth0\x00'}, @IFA_LABEL={0x0, 0x3, 'ip6tnl0\x00'}, @IFA_FLAGS, @IFA_LABEL={0x0, 0x3, 'vlan0\x00'}, @IFA_ADDRESS={0x0, 0x1, @multicast1}, @IFA_BROADCAST={0x0, 0x4, @local}, @IFA_LABEL={0x0, 0x3, 'caif0\x00'}, @IFA_LOCAL={0x0, 0x2, @rand_addr=0x4}, @IFA_BROADCAST={0x0, 0x4, @remote}]}, 0x20}}, 0x0) socket$netlink(0x10, 0x3, 0x13) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1ff, 0x119400) 04:01:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 426.104660] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:01:13 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 426.169113] 9pnet: p9_fd_create_tcp (12229): problem connecting socket to 127.0.0.1 04:01:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x10000}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) dup(0xffffffffffffffff) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r5 = dup(0xffffffffffffffff) write$evdev(r5, &(0x7f0000000240), 0x0) r6 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r7 = memfd_create(0x0, 0x0) pwritev(r7, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(0xffffffffffffffff, r7, 0x0, 0x20000102000007) tee(r5, r7, 0x7ff, 0x53f08917c92716e9) r8 = gettid() process_vm_writev(r8, &(0x7f0000c22000), 0x1a9, &(0x7f0000c22fa0)=[{&(0x7f00007a9000)=""/1, 0x207a9001}], 0x1, 0x0) write$FUSE_LK(r5, &(0x7f0000000100)={0x28, 0x0, 0x2, {{0xbc95, 0x0, 0x1, r8}}}, 0x28) write$P9_RCREATE(r4, &(0x7f00000000c0)={0x18}, 0xfffffffffffffd94) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) socket$inet6_sctp(0xa, 0x10000000005, 0x84) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 04:01:14 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@null=' \x00', 0x1, 'hsr0\x00'}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc80}, 0xc, 0x0}, 0x40040804) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x7, 0x80801) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200000, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f00000000c0)=0x100) 04:01:14 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:14 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, 0x0, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:14 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) accept4$alg(r0, 0x0, 0x0, 0x80400) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1f3bf) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000140)=""/167, &(0x7f0000000000)=0xa7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getpgid(0x0) getpgid(0x0) r4 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r4) ptrace$setopts(0x4206, r4, 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) tkill(r4, 0x6) r5 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r5) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x6) prctl$PR_SET_PTRACER(0x59616d61, r5) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x5, 0x1, 0x8, 0x80000001, 0x80}, 0x14) tkill(0x0, 0x6) r7 = getpgid(0x0) capset(&(0x7f0000000080)={0x20080522, r7}, &(0x7f00000000c0)={0x3f, 0x1, 0x8, 0x3, 0x80000000, 0xa}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/de~/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'lapb0\x00', 0x100}) ioctl$TUNSETOFFLOAD(r8, 0x800454d2, 0x70f000) 04:01:14 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, 0x0, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='memory.swap.current\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(0xffffffffffffffff, 0x6431) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x202, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x80) perf_event_open(&(0x7f0000000400)={0x1, 0xce, 0x1, 0x0, 0x2, 0x2, 0x0, 0x7b, 0x1000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x8000000000000000, 0x3, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f00000001c0), 0x19a, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x448222, 0x0) r4 = shmget(0x1, 0x1000, 0x200, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_INFO(r4, 0x3, &(0x7f00000001c0)=""/62) write$P9_RXATTRCREATE(r0, &(0x7f00000003c0)={0x7, 0x21, 0x2}, 0x7) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10) ioctl$CAPI_CLR_FLAGS(0xffffffffffffffff, 0x80044325, &(0x7f0000000080)=0x1) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000000, &(0x7f0000000600)=0x203, 0x4) bind$inet(r5, &(0x7f0000000140)={0x2, 0x200000000004e23}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r5, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2) getpeername(r5, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000140)=0x80) 04:01:14 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, 0x0, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:14 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001ea8c40200"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 04:01:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockopt$SO_TIMESTAMP(r3, 0x1, 0x23, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 427.168922] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43038 sclass=netlink_route_socket pig=12269 comm=syz-executor.4 [ 429.151344] IPVS: ftp: loaded support on port[0] = 21 [ 429.928350] chnl_net:caif_netlink_parms(): no params data found [ 429.968811] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.975300] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.985584] device bridge_slave_0 entered promiscuous mode [ 429.992512] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.998893] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.010270] device bridge_slave_1 entered promiscuous mode [ 430.031632] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 430.043689] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 430.064715] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 430.072386] team0: Port device team_slave_0 added [ 430.077671] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 430.085447] team0: Port device team_slave_1 added [ 430.090772] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 430.097929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 430.153563] device hsr_slave_0 entered promiscuous mode [ 430.170748] device hsr_slave_1 entered promiscuous mode [ 430.244908] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 430.252056] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 430.263781] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.270158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.276714] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.283074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.315546] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 430.322863] 8021q: adding VLAN 0 to HW filter on device bond0 [ 430.330492] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 430.341400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 430.348480] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.355160] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.364271] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 430.370918] 8021q: adding VLAN 0 to HW filter on device team0 [ 430.381294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 430.388872] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.395262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.411353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 430.418861] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.425225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.433594] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 430.441705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 430.453717] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 430.462969] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 430.474049] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 430.484353] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 430.490809] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 430.497749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 430.511999] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 430.521910] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 430.910463] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:01:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:18 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 431.164935] 9pnet: p9_fd_create_tcp (12288): problem connecting socket to 127.0.0.1 [ 431.391000] device bridge_slave_1 left promiscuous mode [ 431.396469] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.450633] device bridge_slave_0 left promiscuous mode [ 431.456073] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.511461] device bridge_slave_1 left promiscuous mode [ 431.516912] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.550947] device bridge_slave_0 left promiscuous mode [ 431.556396] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.591599] device bridge_slave_1 left promiscuous mode [ 431.597049] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.640836] device bridge_slave_0 left promiscuous mode [ 431.646280] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.823977] device hsr_slave_1 left promiscuous mode [ 431.863801] device hsr_slave_0 left promiscuous mode [ 431.903013] team0 (unregistering): Port device team_slave_1 removed [ 431.912906] team0 (unregistering): Port device team_slave_0 removed [ 431.921833] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 431.982944] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 432.042748] bond0 (unregistering): Released all slaves [ 432.162594] device hsr_slave_1 left promiscuous mode [ 432.202714] device hsr_slave_0 left promiscuous mode [ 432.254037] team0 (unregistering): Port device team_slave_1 removed [ 432.264472] team0 (unregistering): Port device team_slave_0 removed [ 432.275261] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 432.332687] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 432.388783] bond0 (unregistering): Released all slaves [ 432.472677] device hsr_slave_1 left promiscuous mode [ 432.542512] device hsr_slave_0 left promiscuous mode [ 432.582736] team0 (unregistering): Port device team_slave_1 removed [ 432.592401] team0 (unregistering): Port device team_slave_0 removed [ 432.601580] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 432.635060] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 432.691324] bond0 (unregistering): Released all slaves [ 436.091319] IPVS: ftp: loaded support on port[0] = 21 [ 437.125572] chnl_net:caif_netlink_parms(): no params data found [ 437.159774] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.166995] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.175846] device bridge_slave_0 entered promiscuous mode [ 437.183066] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.189439] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.196495] device bridge_slave_1 entered promiscuous mode [ 437.217776] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 437.226438] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 437.243765] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 437.251037] team0: Port device team_slave_0 added [ 437.258855] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 437.266097] team0: Port device team_slave_1 added [ 437.271422] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 437.278533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 437.333151] device hsr_slave_0 entered promiscuous mode [ 437.370362] device hsr_slave_1 entered promiscuous mode [ 437.423422] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 437.430508] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 437.442544] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.448880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.455499] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.461846] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.488810] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 437.494944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 437.502731] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 437.511714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 437.518664] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.526178] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.536048] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 437.542162] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.553948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 437.561605] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.567946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.581210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.588703] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.595065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.609927] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 437.619657] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 437.630137] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 437.636747] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 437.644779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 437.652205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.659501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.667258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 437.674022] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 437.686730] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 437.697569] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 437.890367] device bridge_slave_1 left promiscuous mode [ 437.895881] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.940748] device bridge_slave_0 left promiscuous mode [ 437.946237] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.093843] device hsr_slave_1 left promiscuous mode [ 438.176707] device hsr_slave_0 left promiscuous mode [ 438.213441] team0 (unregistering): Port device team_slave_1 removed [ 438.223864] team0 (unregistering): Port device team_slave_0 removed [ 438.233957] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 438.273492] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 438.342369] bond0 (unregistering): Released all slaves [ 438.383962] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:01:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffff7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000280)={[{@uid={'uid', 0x3d, r1}}, {@type={'type', 0x3d, "6b1a3337"}}, {@nodecompose='nodecompose'}, {@nls={'nls', 0x3d, 'iso8859-2'}}, {@part={'part', 0x3d, 0x1ff}}, {@barrier='barrier'}], [{@obj_user={'obj_user', 0x3d, '!+\x9e%\''}}, {@fowner_lt={'fowner<', r2}}, {@euid_lt={'euid<', r3}}]}) mmap$usbmon(&(0x7f000011e000/0x2000)=nil, 0x2000, 0x1000005, 0x50010, r0, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r4, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 04:01:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xffffffffffffffa4) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000440)={@remote={[], 0x1}, 0x2, 'batadv0\x00'}) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$KVM_CREATE_DEVICE(r3, 0xc00caee0, &(0x7f0000000080)={0x3, r4, 0x1}) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000200000000000000000060117b1dff7a06ebf7", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 04:01:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040), 0x6) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000001c0), 0x11}, 0x24a00, 0x0, 0x0, 0x4, 0x400, 0x8001, 0x9}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x12) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440), 0x4) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x400) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000300)=@assoc_value={r4, 0x7ff}, 0x8) r5 = getpgrp(r1) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) syz_open_procfs$namespace(r5, &(0x7f0000000480)='ns/pid\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r8, 0x800454d2, 0x70f000) 04:01:26 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:26 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 438.900285] ntfs: (device nullb0): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 438.923642] 9pnet: p9_fd_create_tcp (12319): problem connecting socket to 127.0.0.1 [ 438.940996] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. 04:01:26 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:26 executing program 3: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@sr0='/dev/sr0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x104084, &(0x7f0000000280)='wlan0security:*:$security:^vmnet0^@securitycgroupmd5sum\x00') r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) faccessat(r1, &(0x7f0000000200)='./file0\x00', 0x200000003, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.system.Security\x00', &(0x7f0000000080)='\x00', 0x1, 0x1) [ 439.010889] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 04:01:26 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 439.068084] ntfs: (device nullb0): ntfs_fill_super(): Not an NTFS volume. [ 439.080348] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12334 comm=syz-executor.4 04:01:26 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="71756f74615f71752c3374756d3d3078303030303030303030303030103430302c00"]) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) shutdown(r3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x78) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0x5, 0x100, 0x3, 0x1f, 0x9, 0x81, 0x9, 0x3, 0x94}) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x40880, 0x0) setsockopt$inet6_int(r5, 0x29, 0x19, &(0x7f0000000140)=0x5, 0x4) 04:01:27 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={0x0, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 439.712128] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 439.730372] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12346 comm=syz-executor.4 [ 439.742545] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 439.767588] ntfs: (device nullb0): ntfs_fill_super(): Not an NTFS volume. [ 441.320457] device bridge_slave_1 left promiscuous mode [ 441.325977] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.390889] device bridge_slave_0 left promiscuous mode [ 441.396359] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.542889] device hsr_slave_1 left promiscuous mode [ 441.582891] device hsr_slave_0 left promiscuous mode [ 441.623787] team0 (unregistering): Port device team_slave_1 removed [ 441.634409] team0 (unregistering): Port device team_slave_0 removed [ 441.645318] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 441.683357] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 441.759623] bond0 (unregistering): Released all slaves [ 443.651395] IPVS: ftp: loaded support on port[0] = 21 [ 444.664495] chnl_net:caif_netlink_parms(): no params data found [ 444.695528] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.702022] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.708843] device bridge_slave_0 entered promiscuous mode [ 444.715747] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.715795] IPVS: ftp: loaded support on port[0] = 21 [ 444.722198] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.734741] device bridge_slave_1 entered promiscuous mode [ 444.756795] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 444.769233] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 444.792570] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 444.799567] team0: Port device team_slave_0 added [ 444.805188] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 444.812498] team0: Port device team_slave_1 added [ 444.819534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 444.828617] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 444.882713] device hsr_slave_0 entered promiscuous mode [ 444.920362] device hsr_slave_1 entered promiscuous mode [ 444.970771] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 444.977660] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 445.021502] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.027861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 445.034472] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.040833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 445.053269] chnl_net:caif_netlink_parms(): no params data found [ 445.093960] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.100473] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.107242] device bridge_slave_0 entered promiscuous mode [ 445.114149] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.120579] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.127342] device bridge_slave_1 entered promiscuous mode [ 445.146307] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 445.155115] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 445.172649] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 445.179674] team0: Port device team_slave_0 added [ 445.185368] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 445.192494] team0: Port device team_slave_1 added [ 445.198255] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 445.205583] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 445.272048] device hsr_slave_0 entered promiscuous mode [ 445.350399] device hsr_slave_1 entered promiscuous mode [ 445.400771] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 445.410659] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 445.427944] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.434308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 445.440912] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.447237] bridge0: port 1(bridge_slave_0) entered forwarding state [ 445.458570] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 445.464868] 8021q: adding VLAN 0 to HW filter on device bond0 [ 445.474169] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 445.485099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 445.492450] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.499014] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.506320] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.513074] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.523427] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 445.529488] 8021q: adding VLAN 0 to HW filter on device team0 [ 445.551132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 445.558653] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.565045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 445.572714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 445.580988] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.587321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 445.594716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 445.602512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 445.613275] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 445.626406] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 445.636393] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 445.647090] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 445.658712] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 445.666498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 445.674194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 445.682183] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 445.696426] 8021q: adding VLAN 0 to HW filter on device bond0 [ 445.705197] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 445.712565] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 445.720712] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 445.727228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 445.734461] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 445.743064] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 445.749114] 8021q: adding VLAN 0 to HW filter on device team0 [ 445.758754] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 445.767771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 445.779418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 445.786730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 445.794624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 445.802402] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.808714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 445.815562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 445.823654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 445.831219] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.837535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 445.847019] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 445.858134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 445.868674] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 445.876597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 445.887205] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 445.894277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 445.902606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 445.910780] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 445.923533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 445.934936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 445.946840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 445.950661] 9pnet: p9_fd_create_tcp (12366): problem connecting socket to 127.0.0.1 [ 445.956530] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 445.974572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 445.982961] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 445.992804] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 445.999866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 446.008729] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 446.017754] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 446.027354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 446.038925] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 446.049315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 446.622475] hfsplus: unable to parse mount options [ 446.683137] hfsplus: unable to parse mount options [ 446.721499] device bridge_slave_1 left promiscuous mode [ 446.727035] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.761409] device bridge_slave_0 left promiscuous mode 04:01:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffff7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000280)={[{@uid={'uid', 0x3d, r1}}, {@type={'type', 0x3d, "6b1a3337"}}, {@nodecompose='nodecompose'}, {@nls={'nls', 0x3d, 'iso8859-2'}}, {@part={'part', 0x3d, 0x1ff}}, {@barrier='barrier'}], [{@obj_user={'obj_user', 0x3d, '!+\x9e%\''}}, {@fowner_lt={'fowner<', r2}}, {@euid_lt={'euid<', r3}}]}) mmap$usbmon(&(0x7f000011e000/0x2000)=nil, 0x2000, 0x1000005, 0x50010, r0, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r4, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 04:01:34 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') listen(r0, 0x6) r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x6, 0x20) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x300, 0x0) write$selinux_load(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578c5471d05a386d98d017b54e2528d888a466c6c3e15356a5a30b3793c0f857eb824574de9b50a2365e9e7b987369587f9d27d4b275964685cbf936f5c80e11c064da00bcfa7c9c16f5108d96957879344d231b1da587a303c503ba96e26281d01b5d4bdc1f1e647216540820cd814f6c775637bc54f9926a1fee08c7cf1566f7d1ffddd6d671d535a949727a82c3cf12e18b10e5e7b4bf7bf"], 0xa8) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = open(&(0x7f00000008c0)='./file0\x00', 0x20145242, 0x814be0d9510f34ee) ftruncate(r6, 0x28007d) sendfile(r6, r6, 0x0, 0x2008000fffffffe) 04:01:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000080)={0x7, &(0x7f0000000140)="97d7bd7d57ff293dfa5a4e7ee7e4387d42500d2422682c25eed04dd6a00fc7f86ded8ddcda22c3f1623f82ea2d28d173ed23c8c88462185c47ed09bd08722afc7a2989bf25e1f5c4f3f92f0e85a2e9"}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000001c0)) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) 04:01:34 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={0x0, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000440)) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x800, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x15) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="e45d2c192192c93d11ff82215f0fbab75d16d5df391753e53df26a7e36fecb2935bcc0437f4ad656ee05b7269ba69d2d4868f43f0bd628fc66069df5a83d59cc396a703dbd9990a44a78a434d7ecea294a41c4472b1efe34a13a4bfb3e71b870d4bac9425c5c8c25d45c294d23e1c2aae75b00"/126, @ANYRES32=0x0, @ANYBLOB="0000000000009c00"], 0x20}}, 0x0) 04:01:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 446.766954] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.884239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=37409 sclass=netlink_route_socket pig=12392 comm=syz-executor.4 [ 446.949957] hfsplus: unable to parse mount options 04:01:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0x66) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) [ 447.007847] device hsr_slave_1 left promiscuous mode [ 447.043559] device hsr_slave_0 left promiscuous mode 04:01:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 447.087826] team0 (unregistering): Port device team_slave_1 removed [ 447.113704] team0 (unregistering): Port device team_slave_0 removed [ 447.149980] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 447.194529] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 447.222868] 9pnet: p9_fd_create_tcp (12407): problem connecting socket to 127.0.0.1 [ 447.325542] bond0 (unregistering): Released all slaves 04:01:35 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={0x0, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040), 0x6) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000001c0), 0x11}, 0x24a00, 0x0, 0x0, 0x4, 0x400, 0x8001, 0x9}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x12) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440), 0x4) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x400) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000300)=@assoc_value={r4, 0x7ff}, 0x8) r5 = getpgrp(r1) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) syz_open_procfs$namespace(r5, &(0x7f0000000480)='ns/pid\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r8, 0x800454d2, 0x70f000) [ 447.380165] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 447.388731] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:01:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xffffffffffffff58) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000000)={@rand_addr=0x9, @broadcast}, 0x8) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x20, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) 04:01:35 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 447.543438] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 447.555609] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:01:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) [ 449.700845] IPVS: ftp: loaded support on port[0] = 21 [ 450.491942] IPVS: ftp: loaded support on port[0] = 21 [ 450.503494] chnl_net:caif_netlink_parms(): no params data found [ 450.554588] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.561156] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.567988] device bridge_slave_0 entered promiscuous mode [ 450.577640] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.584088] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.591365] device bridge_slave_1 entered promiscuous mode [ 450.611116] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 450.619893] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 450.638392] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 450.645540] team0: Port device team_slave_0 added [ 450.651081] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 450.658081] team0: Port device team_slave_1 added [ 450.673756] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 450.706817] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 450.782021] device hsr_slave_0 entered promiscuous mode [ 450.820302] device hsr_slave_1 entered promiscuous mode [ 450.862738] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 450.869660] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 450.878292] chnl_net:caif_netlink_parms(): no params data found [ 450.919510] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.925884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.932521] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.938851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.949737] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.956149] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.965810] device bridge_slave_0 entered promiscuous mode [ 450.973282] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.979684] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.986818] device bridge_slave_1 entered promiscuous mode [ 451.010805] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 451.020740] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 451.039256] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 451.046732] team0: Port device team_slave_0 added [ 451.052334] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 451.059357] team0: Port device team_slave_1 added [ 451.065490] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 451.075890] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 451.132132] device hsr_slave_0 entered promiscuous mode [ 451.180360] device hsr_slave_1 entered promiscuous mode [ 451.231271] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 451.243787] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 451.261052] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 451.267142] 8021q: adding VLAN 0 to HW filter on device bond0 [ 451.274267] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.280638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.287226] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.293592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.309981] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 451.322559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 451.329475] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.336271] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.344045] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.351263] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.360743] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 451.366941] 8021q: adding VLAN 0 to HW filter on device team0 [ 451.381147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 451.388690] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.395078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.410789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 451.418278] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.424641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 451.432170] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 451.446978] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 451.464147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 451.474048] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 451.481415] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 451.489425] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 451.498309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 451.506966] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 451.513764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 451.521524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 451.528868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 451.535739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 451.546696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 451.555151] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 451.565415] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 451.572209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 451.579738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 451.587593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 451.596219] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 451.602748] 8021q: adding VLAN 0 to HW filter on device team0 [ 451.612355] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 451.619599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 451.627707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 451.635417] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.641800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 451.650781] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 451.657974] device bridge_slave_1 left promiscuous mode [ 451.663670] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.721817] device bridge_slave_0 left promiscuous mode [ 451.727268] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.852994] device hsr_slave_1 left promiscuous mode [ 451.903810] device hsr_slave_0 left promiscuous mode [ 451.944125] team0 (unregistering): Port device team_slave_1 removed [ 451.953942] team0 (unregistering): Port device team_slave_0 removed [ 451.964498] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 452.012749] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 452.080870] bond0 (unregistering): Released all slaves [ 452.126340] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 452.133086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 452.143205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 452.151387] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.157706] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.166605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 452.177116] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 452.184014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 452.191680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 452.201543] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 452.212634] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 452.219485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 452.227562] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 452.237671] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 452.247111] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 452.255255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 452.263085] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 452.278864] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 452.285905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 452.293813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 452.303092] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 452.309870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 452.317710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 452.327465] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 452.335020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 452.381581] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 452.405625] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 452.442518] 9pnet: p9_fd_create_tcp (12447): problem connecting socket to 127.0.0.1 04:01:41 executing program 3: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x28010}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="220858668a5ca365b31b90bce1c4a06a"}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @multicast2}}]}, 0x48}}, 0x4000000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x600, 0x40) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x9effffff00000000, &(0x7f0000000080)={&(0x7f00000001c0)={0x5c, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}]}, 0x5c}}, 0x0) 04:01:41 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:41 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f00000002c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) sendto$rxrpc(r1, &(0x7f0000000040)="75012714baf455731c01a4c1d24785171d8fd45b60108e4ab4b85c3714b29b459089dbb6dec6f13af91cc635d8ddf2b096d3938643d3432f659092615fdc352fba65d1d95c024737c3eeddace4096641bc738fcc515a057fcc39061819fa9bee220f55ff09602e9d31a296", 0x6b, 0x20040001, &(0x7f0000000100)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}, 0xffff}}, 0x24) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@bridge_getneigh={0x2, 0x1e, 0x201, 0x0, 0x0, {0x1b00}}, 0x20}}, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) 04:01:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040), 0x6) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000001c0), 0x11}, 0x24a00, 0x0, 0x0, 0x4, 0x400, 0x8001, 0x9}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x12) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440), 0x4) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x400) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000300)=@assoc_value={r4, 0x7ff}, 0x8) r5 = getpgrp(r1) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) syz_open_procfs$namespace(r5, &(0x7f0000000480)='ns/pid\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r8, 0x800454d2, 0x70f000) 04:01:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETOFFLOAD(r3, 0x800454d2, 0x1) 04:01:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 453.669952] devpts: called with bogus options 04:01:41 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:41 executing program 3: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@remote}, {}, {0x0, 0x0, 0x0, 0x2}}, {{@in=@local}, 0xa, @in=@empty}}, 0xe8) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x240, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040)={0x77359400}, 0x10) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x57, 0x40, 0xf, 0x6, 0x4, 0x1f}, 0xf2}) 04:01:41 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(0xffffffffffffffff, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:41 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x4) open(&(0x7f0000000000)='./bus\x00', 0x20200, 0x0) ftruncate(r0, 0x2081fc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) fcntl$setstatus(r1, 0x4, 0x40400) write$FUSE_WRITE(r1, &(0x7f0000000080)={0x18}, 0x18) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x5fb8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r3, r4) 04:01:41 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(0xffffffffffffffff, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 454.012677] audit: type=1804 audit(1569988901.784:163): pid=12482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir321860475/syzkaller.LV2h6O/3/bus" dev="sda1" ino=17400 res=1 04:01:41 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(0xffffffffffffffff, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:41 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x7f, 0x40, 0x3, 0x8}, {0x1, 0x0, 0x8, 0x3e00000000000000}, {0x0, 0x7, 0x1f, 0x3}, {0x0, 0x7ec3, 0x5, 0x3}, {0x1000, 0x6, 0x0, 0x9}, {0x100000000, 0x2, 0x8}]}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) write$selinux_load(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8cff7cf908000000534520326bcde5ad4c696e7578349ffcf3ef7bf2575456090a3390b94cbac1ca073297a57973d51914ccbbe72de259e0fef36e516c5be4f96df8385576f92265a9053e09f8902b8851c312b2f6cdbe05fa7bf8222e427b010cfe81fb6bddd0d41d63c2a634f4f391a9988ef650897b173ca7326ba9012726e639970a2330d447dbbc76167766425179303bfd70e561874f85e14183a79ecfd5bc4ef480a57695ab59692e4d12335683c13df259c951552fbcb13711fa68f203f3959de43daf609dbeb57d58046c741e3b06931346d7ea3aff9825cb1d"], 0xd9) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r6, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000280), &(0x7f0000000580)=0x4) sched_setattr(0x0, 0x0, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x9) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x400000000) 04:01:42 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 454.172254] audit: type=1804 audit(1569988901.814:164): pid=12482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir321860475/syzkaller.LV2h6O/3/bus" dev="sda1" ino=17400 res=1 [ 454.291637] audit: type=1804 audit(1569988901.824:165): pid=12482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir321860475/syzkaller.LV2h6O/3/bus" dev="sda1" ino=17400 res=1 [ 454.478688] audit: type=1804 audit(1569988901.824:166): pid=12482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir321860475/syzkaller.LV2h6O/3/bus" dev="sda1" ino=17400 res=1 [ 454.560233] audit: type=1804 audit(1569988901.824:167): pid=12482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir321860475/syzkaller.LV2h6O/3/bus" dev="sda1" ino=17400 res=1 04:01:42 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 454.653872] audit: type=1804 audit(1569988901.834:168): pid=12482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir321860475/syzkaller.LV2h6O/3/bus" dev="sda1" ino=17400 res=1 [ 454.748554] audit: type=1804 audit(1569988901.854:169): pid=12482 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir321860475/syzkaller.LV2h6O/3/bus" dev="sda1" ino=17400 res=1 [ 454.803246] audit: type=1804 audit(1569988901.854:170): pid=12485 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir321860475/syzkaller.LV2h6O/3/bus" dev="sda1" ino=17400 res=1 [ 454.940375] device bridge_slave_1 left promiscuous mode [ 454.945998] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.001074] device bridge_slave_0 left promiscuous mode [ 455.006582] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.162866] device hsr_slave_1 left promiscuous mode [ 455.213700] device hsr_slave_0 left promiscuous mode [ 455.256238] team0 (unregistering): Port device team_slave_1 removed [ 455.276617] team0 (unregistering): Port device team_slave_0 removed [ 455.315084] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 455.363962] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 455.459935] bond0 (unregistering): Released all slaves [ 457.171361] IPVS: ftp: loaded support on port[0] = 21 [ 457.976412] chnl_net:caif_netlink_parms(): no params data found [ 457.984277] IPVS: ftp: loaded support on port[0] = 21 [ 458.017964] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.024491] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.031310] device bridge_slave_0 entered promiscuous mode [ 458.037718] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.044155] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.051727] device bridge_slave_1 entered promiscuous mode [ 458.080931] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 458.091994] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 458.115662] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 458.122953] team0: Port device team_slave_0 added [ 458.129332] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 458.136421] team0: Port device team_slave_1 added [ 458.142024] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 458.149525] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 458.203583] device hsr_slave_0 entered promiscuous mode [ 458.230313] device hsr_slave_1 entered promiscuous mode [ 458.310686] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 458.319890] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 458.377890] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.384310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.390971] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.397311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.405126] chnl_net:caif_netlink_parms(): no params data found [ 458.446295] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.452803] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.459608] device bridge_slave_0 entered promiscuous mode [ 458.467060] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.473750] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.480930] device bridge_slave_1 entered promiscuous mode [ 458.498301] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 458.507283] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 458.527130] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 458.534338] team0: Port device team_slave_0 added [ 458.540182] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 458.547214] team0: Port device team_slave_1 added [ 458.552563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 458.560121] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 458.622083] device hsr_slave_0 entered promiscuous mode [ 458.680336] device hsr_slave_1 entered promiscuous mode [ 458.720783] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 458.729145] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 458.744507] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 458.750709] 8021q: adding VLAN 0 to HW filter on device bond0 [ 458.761480] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 458.768273] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.774668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.781437] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.787825] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.802144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 458.809130] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.816119] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.823317] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.829872] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.840393] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 458.846459] 8021q: adding VLAN 0 to HW filter on device team0 [ 458.856989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 458.864779] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.871163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 458.881971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 458.889560] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.895932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.917335] 8021q: adding VLAN 0 to HW filter on device bond0 [ 458.927214] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 458.937020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 458.944860] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 458.956190] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 458.964818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 458.972336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 458.981344] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 458.987418] 8021q: adding VLAN 0 to HW filter on device team0 [ 458.995895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 459.002849] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 459.010694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 459.019869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 459.028110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 459.036316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 459.043941] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.050306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.058036] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 459.065671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 459.073749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 459.082229] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 459.089248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 459.097484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 459.105675] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.112035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.123637] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 459.129642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 459.137449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 459.145544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 459.157205] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 459.164908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 459.175431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 459.184037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 459.191993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 459.199505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 459.208994] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 459.219831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 459.226978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 459.234580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 459.243405] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 459.252002] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 459.259213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 459.267330] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 459.278128] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 459.286732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 459.298750] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 459.307929] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 459.314150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 459.327861] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 459.337092] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 460.437766] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 460.446443] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 460.459819] ntfs: (device nullb0): ntfs_fill_super(): Not an NTFS volume. 04:01:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x22, 0x2, 0x4) bind$isdn_base(r0, &(0x7f0000000040), 0x6) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000001c0), 0x11}, 0x24a00, 0x0, 0x0, 0x4, 0x400, 0x8001, 0x9}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x12) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ntfs\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440), 0x4) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x400) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000300)=@assoc_value={r4, 0x7ff}, 0x8) r5 = getpgrp(r1) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x1) syz_open_procfs$namespace(r5, &(0x7f0000000480)='ns/pid\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r8, 0x800454d2, 0x70f000) 04:01:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000001600)='/dev/vbi#\x00', 0x0, 0x2) clock_gettime(0x0, &(0x7f0000001580)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001500)=[{{&(0x7f0000000000)=@xdp, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/24, 0x18}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000100)=""/3, 0x3}], 0x3, &(0x7f0000000280)=""/22, 0x16}, 0x2}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/39, 0x27}], 0x1, &(0x7f0000001440)=""/157, 0x9d}, 0x9}], 0x2, 0x10000, &(0x7f00000015c0)={r1, r2+10000000}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e00010200"/20, @ANYRES32=0x0, @ANYBLOB="08ec3ae3d6000600"], 0x20}}, 0x0) [ 460.543666] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 460.554732] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:01:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:48 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x80, 0x38) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x9) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) 04:01:48 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x7f, 0x40, 0x3, 0x8}, {0x1, 0x0, 0x8, 0x3e00000000000000}, {0x0, 0x7, 0x1f, 0x3}, {0x0, 0x7ec3, 0x5, 0x3}, {0x1000, 0x6, 0x0, 0x9}, {0x100000000, 0x2, 0x8}]}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) write$selinux_load(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8cff7cf908000000534520326bcde5ad4c696e7578349ffcf3ef7bf2575456090a3390b94cbac1ca073297a57973d51914ccbbe72de259e0fef36e516c5be4f96df8385576f92265a9053e09f8902b8851c312b2f6cdbe05fa7bf8222e427b010cfe81fb6bddd0d41d63c2a634f4f391a9988ef650897b173ca7326ba9012726e639970a2330d447dbbc76167766425179303bfd70e561874f85e14183a79ecfd5bc4ef480a57695ab59692e4d12335683c13df259c951552fbcb13711fa68f203f3959de43daf609dbeb57d58046c741e3b06931346d7ea3aff9825cb1d"], 0xd9) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r6, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000280), &(0x7f0000000580)=0x4) sched_setattr(0x0, 0x0, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x9) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x400000000) 04:01:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x1, 0x1}, 0x3c) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x33, 0x80000000, 0x6, 0x7, 0x0, 0x1, 0x1, 0x5, 0x4, 0x9, 0x9, 0x3}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="200000001e000102000000000000000000000000ac53fa6e4330bd2ac5fe06376a398f99770bd01b6e57a2dcf739a52dc030e65a0c3b8892b09f70e15d0c4f8d66cc8d98400a78445b4de0ddd7facda20c09717d094a7b7865e1eee0e0f020a826fb6c5df7f73941de5367eb4bf9ceb377f5ece50347c8f7620fa8c8b818cf7390ccc1448e9beec7ca976b8f409921f6e91d81ee1aec3c89515971409b8ca5df56067da052a7", @ANYRES32=0x0, @ANYBLOB="000000000000baed"], 0x20}}, 0x0) [ 460.601486] 9pnet: p9_fd_create_tcp (12542): problem connecting socket to 127.0.0.1 [ 460.607094] ntfs: (device nullb0): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 460.623553] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 460.637587] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 04:01:48 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 460.664813] ntfs: (device nullb0): ntfs_fill_super(): Not an NTFS volume. [ 460.669526] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 460.687064] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:01:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:48 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYRESHEX=r4, @ANYRES32=r2, @ANYBLOB="000000000000dfff00000000"], 0x3}}, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200000, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xf, 0x40, 0xa9, 0x2, 0x8, r6, 0x8, [], r2, 0xffffffffffffffff, 0x0, 0x3}, 0x3c) r7 = openat$cgroup_ro(r5, &(0x7f0000000540)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r8 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = gettid() r12 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r12) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r13 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r13, 0x0, 0x0) tkill(r11, 0x2d) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="c9bf", 0xffffffc4) ptrace$cont(0x18, r13, 0x8, 0x1ff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x4000, 0x800000, 0x1ffffffc, 0x9c}) r14 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r15 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r15, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) write$cgroup_type(r15, &(0x7f0000000180)='threaded\x00', 0xfffffffffffffe57) ioctl$KVM_GET_SUPPORTED_CPUID(r14, 0xc008ae05, &(0x7f0000000280)=""/146) ptrace$setregs(0xd, r13, 0x0, &(0x7f0000000080)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) ptrace$cont(0x9, r13, 0x0, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="001e0029de59f4e2012208000040cd5b3d", @ANYRES32=0x0, @ANYBLOB="1000ff0100000000"], 0x20}}, 0x0) 04:01:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 461.204531] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23006 sclass=netlink_route_socket pig=12577 comm=syz-executor.4 04:01:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x1, 0x1}, 0x3c) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x33, 0x80000000, 0x6, 0x7, 0x0, 0x1, 0x1, 0x5, 0x4, 0x9, 0x9, 0x3}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="200000001e000102000000000000000000000000ac53fa6e4330bd2ac5fe06376a398f99770bd01b6e57a2dcf739a52dc030e65a0c3b8892b09f70e15d0c4f8d66cc8d98400a78445b4de0ddd7facda20c09717d094a7b7865e1eee0e0f020a826fb6c5df7f73941de5367eb4bf9ceb377f5ece50347c8f7620fa8c8b818cf7390ccc1448e9beec7ca976b8f409921f6e91d81ee1aec3c89515971409b8ca5df56067da052a7", @ANYRES32=0x0, @ANYBLOB="000000000000baed"], 0x20}}, 0x0) 04:01:49 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$KDSKBLED(r3, 0x4b65, 0x5) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) 04:01:49 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x7f, 0x40, 0x3, 0x8}, {0x1, 0x0, 0x8, 0x3e00000000000000}, {0x0, 0x7, 0x1f, 0x3}, {0x0, 0x7ec3, 0x5, 0x3}, {0x1000, 0x6, 0x0, 0x9}, {0x100000000, 0x2, 0x8}]}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x2, 0x2) write$selinux_load(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="8cff7cf908000000534520326bcde5ad4c696e7578349ffcf3ef7bf2575456090a3390b94cbac1ca073297a57973d51914ccbbe72de259e0fef36e516c5be4f96df8385576f92265a9053e09f8902b8851c312b2f6cdbe05fa7bf8222e427b010cfe81fb6bddd0d41d63c2a634f4f391a9988ef650897b173ca7326ba9012726e639970a2330d447dbbc76167766425179303bfd70e561874f85e14183a79ecfd5bc4ef480a57695ab59692e4d12335683c13df259c951552fbcb13711fa68f203f3959de43daf609dbeb57d58046c741e3b06931346d7ea3aff9825cb1d"], 0xd9) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_ifreq(r6, 0x8937, &(0x7f0000000100)={'veth0\x00', @ifru_settings={0x10001, 0x0, @fr=0x0}}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000280), &(0x7f0000000580)=0x4) sched_setattr(0x0, 0x0, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x9) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x400000000) 04:01:49 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 461.558997] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 461.578722] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 04:01:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0xfffffffffffffffa, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0xfffffffffffffefd, 0x1, &(0x7f0000000180), 0x10000000000000a2) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 461.804076] device bridge_slave_1 left promiscuous mode [ 461.810538] bridge0: port 2(bridge_slave_1) entered disabled state [ 461.872200] device bridge_slave_0 left promiscuous mode [ 461.877813] bridge0: port 1(bridge_slave_0) entered disabled state 04:01:49 executing program 2: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000001c0)={0xacbe9f8aec33ea82, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000280)=0x5, 0x4) write$binfmt_script(r1, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000140), 0x10) io_setup(0x9, &(0x7f0000000380)=0x0) io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x38}]) r5 = syz_open_dev$admmidi(&(0x7f0000000580)='/dev/admmidi#\x00', 0x8, 0x84d97415b2b61bd5) r6 = dup3(r2, r2, 0x80000) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r8 = syz_init_net_socket$ax25(0x3, 0x8ac20e0fd6611cfa, 0xcb) r9 = open(&(0x7f0000000bc0)='./file0\x00', 0x40000, 0x86) r10 = syz_open_dev$cec(&(0x7f0000000cc0)='/dev/cec#\x00', 0x0, 0x2) r11 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r11, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r12 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r12, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r13 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r13, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r14 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r14, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r15 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r15, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r16 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r16, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r17 = syz_open_dev$vcsa(&(0x7f0000001100)='/dev/vcsa#\x00', 0x20000000000c, 0x0) io_submit(r4, 0x9, &(0x7f0000001180)=[&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f0000000880)="6d6f0dd74491b111c37d8bae3147f4617dde69ee472c70fe3052a2f62259334a29ab1c4a82498a9504bd9ee3f56091e5fe15ac486a75ef560878bdf226e4793b4cec6934828f36295c366c5290e732a4699fd20546480550f2c68c503490da651a0b33342851fbd264df3fff60512936a230bc4446599a216c3aff87d7836f670793305c38a78a1a3086043025be7523dab1e1d1c7e7b963fdfa72dd48059949ac5cb66d0ab4fd9f9d7d2ac5a7e2279c1077ec8d66b5ae7ae6a6667d59", 0xbd, 0x3, 0x0, 0xe4ae1c559dd98564, r5}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x4, 0x40, r0, &(0x7f0000000940)="f16871582bd793a5e60086d94b57c9717382ba69cad04312d1158ae1c6bb81a473f2502a0d0e0c261e01f5ae6cbe8f593cd17481d89d374bc70ab69623ecdd52616821f6936883a1422d182329da1f6fa76f3122b8a7d0148e51bea7eaa36f5f4aa50ec14a75590e991e7ff6feacec6e6e2e96c47b349d64eaf5e29c26c6103f7eabadf5dbe7e8ae7c43c0c17ee7b5ec1a6063543c390dd9658dbf5c28fb1997cf18968cffbe7dc8ff0748242554cc14ff6792ac4b739cd3f9e1432cca50a9bcdf15728728bc466eef639edaab003afbbbc6a1c2e47c1b0a629301af974ea94b0d72", 0xe2, 0x1, 0x0, 0x2, r6}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x2, 0x5, r0, &(0x7f0000000a40)="fffe097a5707c88487ff54dc9782afb793f2a19da49ac54214adbbd98d57c6aced464758e6586886eff7c5134bc5e03e89f7f1857aa7687df2ec4300f5bbdc2183abfbd97ddc95779f7dd69198e8f7b3382043e636327e45d5461f24c90d5ea776160cf19c175030f251c920a9c836f1b7b82cc939d3805a4b87c79a3c7359aaf39b03fe54a4dbd561bcfb0e6a51ea6fa9978cb072a560694cbf64c5c7cd1edd181de77fc54acefd90e1ae3e3087003d506365112ab29c334a0b", 0xba, 0x7, 0x0, 0x0, r7}, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0xbe7511c38900d4f2, 0x6, r8, &(0x7f0000000b00)="7a976efbb3982ab68c435330689ee9a7ffdfe25653ed279b8b6a892d98cb1fda9960d0ccaa357bf491737c5a89dc573a14290afc32408e6662b09f3d9d1766b9d9468db0d74fde60336100eebcdd3d270c79c2e67d5d4e0ef4e03a8eac65bce6ebfaabdd27bef23f6b69afb8baef56cd2f830a008ddd01d91300b1f32995164b0e6331db3781", 0x86, 0x9, 0x0, 0x0, r9}, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x1, r10, &(0x7f0000000d00)="554c727f96cb7046847a5dbf73d070109462d9529c70df65ee9fbace4f9eff892190336661f591b9b703588f63abfd6498a6cd97966edf08e6285558b72d4f68cda8148a393df7bd3fe15239e106f860fe81d629219b734fbdb14c5dfba5328725701f80a0392e6dea2be8ce1d1dfa71c40290ce84a4ee1e1b4087ae225149939b901c0f2bb8fe149f70f08e90d5c4c27e0910cf7d367caa9eb586e137aabcd3c0f4cd6985021dd26cea97a4edeb783eafd7e1ae2ea457c0a5590f8a987fa419fbd2c8f702bc85cee5530318dfb2bee98dc892c7c7b849dafa4f13800b1fe81da3792c83", 0xe4, 0x9, 0x0, 0x2, r0}, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x2, 0x0, r11, &(0x7f0000000e40), 0x0, 0x7fff, 0x0, 0x1, r12}, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x2, 0x5, r13, &(0x7f0000000ec0)="ef37d864e428e29f86ba1c1d4d931fd63dad8b35204703d3c5d8a5169a7ede2b917e1aa135950d188a6f416852138e7fc6a841b3a783240bbf2ccd8ba1aef51729b05faf133ebf1d32e54cf278b9aac8319ec6db155072240671ecbbf6c5252ba359e120a2fa8c61337071ce637fa661038ad08c343cf988b947470a73641e4276", 0x81, 0x5, 0x0, 0x2, r14}, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x6, 0x4, r15, &(0x7f0000000fc0)="a169f4f4972d09fa60a546588ef96d85ba7203c42f63fc7d51fd0e9bb4567c9b913dba11553b81887369c7378c9ce0dc1739bb985571fecf9878d386", 0x3c, 0xa05d, 0x0, 0x2, r16}, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x2, 0x1e4, r0, &(0x7f0000001040)="e66b68b2d5a439a581507181fa5cd68155a07ac70e57f237174575c2a0484f82755329479ce14ca37f6e295a8b6b75efffbbc4a494f51e68c7d6267e4379fdcf0af050d8f1bba82d21455502ab4ca8dffaf4f96eabc3286c289170428be0b4eeb871394555b8b26925b82ab1d13dd2c79783e89456768ac74f5ef96d652ad534275a80219e968f606a6ed12c27ff6113279cf9c22864d6737543675a33b5e7c694849e26b38347ef95e90bbca167eef9040aaca63124961bc95060", 0xbb, 0x5, 0x0, 0x6, r17}]) sendmsg$key(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020700090200000000000000000000e5"], 0x10}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)) r18 = creat(&(0x7f00000002c0)='./file0\x00', 0x4) r19 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7, 0x10000, 0x1, 0x7fffffff, 0x38cf, 0x5, 0x5, 0x1889, 0x1, 0x8000, 0x8, 0x0, 0xffffffff00000001, 0x8ed, 0x401, 0x6, 0x2, 0x10000, 0x101, 0x6ab1, 0x200, 0x71, 0x6, 0x5ab, 0x4, 0x81, 0xffffffff, 0x49a4, 0x4f63, 0x4, 0x7, 0x0, 0xfb00000000, 0x1, @perf_config_ext={0x0, 0x3ff}, 0x4200, 0x7, 0x13f, 0x9, 0x4, 0x1}, r1, 0x3, r19, 0x8) r20 = socket$inet6(0xa, 0x3, 0x6) utimensat(r18, &(0x7f0000000340)='./file0\x00', &(0x7f0000000500), 0x0) ioctl$LOOP_SET_DIRECT_IO(r18, 0x4c08, 0x0) request_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000300)='/dev/uinput\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000800)='ceph\x00', &(0x7f0000000840)={'syz', 0x1}, &(0x7f0000000600)="998e55bb413992a631d44d403830dbf922d9e03ca4ba06d0bcb90d18f365f49d97d6ed8a80903f792d0f11fb43ce0fabc276f245", 0x34, 0xfffffffffffffffd) connect$inet6(r20, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r20, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r18, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) ioctl$UI_SET_FFBIT(r18, 0x4004556b, 0x1f) socket$inet_udplite(0x2, 0x2, 0x88) r21 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r21) ptrace$setopts(0x4206, r21, 0x0, 0x0) tkill(r21, 0x6) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000006c0)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000740)) [ 462.092975] device hsr_slave_1 left promiscuous mode [ 462.143740] device hsr_slave_0 left promiscuous mode [ 462.184262] team0 (unregistering): Port device team_slave_1 removed [ 462.203301] team0 (unregistering): Port device team_slave_0 removed [ 462.222354] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 462.265004] bond0 (unregistering): Releasing backup interface bond_slave_0 04:01:50 executing program 3: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x101, 0x4, 0x3, "5fb7663ec99e277affd270035ea45fd8", "84a7275f5a89606c886fa9810fb68d85e6ccad30643bea25dd46d592ed0e76f56701e1850b903b6230669c5b99731654e8acd19e4ef0df2b5e3b6c18f2b5af8b783179f9b96ceeeef68c905b7d1a89573f94484752a3d604ae52db962bb63c982958f8013015a60c7e0494a795aeac802233feb705da271ab1d1f7712067de1554ea959cfa9be593499356c775761a221b861eab0a2846891fb9d7cd2709bdfb6bc7595a3839a6b32c24833eb4d251263e5e2f7e5d7fe018d757b44d5efacb0d26d2c2023f5d5b6f7727298381f44f08c28f284392080d07e81deb2f29876ef68477fba2027dd7fa2ee2c300"}, 0x101, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x15) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r1, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) listen(0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r2, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) [ 462.289992] audit: type=1804 audit(1569988910.054:171): pid=12609 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir859486366/syzkaller.w3BJ8L/4/file0" dev="sda1" ino=16945 res=1 [ 462.317269] audit: type=1804 audit(1569988910.074:172): pid=12610 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir859486366/syzkaller.w3BJ8L/4/file0" dev="sda1" ino=16945 res=1 [ 462.414378] bond0 (unregistering): Released all slaves [ 462.437523] audit: type=1804 audit(1569988910.204:173): pid=12608 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir859486366/syzkaller.w3BJ8L/4/file0" dev="sda1" ino=16945 res=1 04:01:50 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:50 executing program 3: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0x101, 0x4, 0x3, "5fb7663ec99e277affd270035ea45fd8", "84a7275f5a89606c886fa9810fb68d85e6ccad30643bea25dd46d592ed0e76f56701e1850b903b6230669c5b99731654e8acd19e4ef0df2b5e3b6c18f2b5af8b783179f9b96ceeeef68c905b7d1a89573f94484752a3d604ae52db962bb63c982958f8013015a60c7e0494a795aeac802233feb705da271ab1d1f7712067de1554ea959cfa9be593499356c775761a221b861eab0a2846891fb9d7cd2709bdfb6bc7595a3839a6b32c24833eb4d251263e5e2f7e5d7fe018d757b44d5efacb0d26d2c2023f5d5b6f7727298381f44f08c28f284392080d07e81deb2f29876ef68477fba2027dd7fa2ee2c300"}, 0x101, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x15) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r1, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) listen(0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r2, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 04:01:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) r0 = getpid() sched_getscheduler(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000004c0)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r2) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000280)="15d457a93b184d92c9f050eb9f59514f9aa14ddf731ad01b29f1da69642f42dac78330eec04ea1eacb0b7a0b1fc295391a21dee2f437f21349d806345f09602ae26da879833af9d13ce62c878e3dc0aa7c87c0fd", 0x54, 0xffffffffffffffff) keyctl$update(0x2, 0x0, &(0x7f0000000640)="5bd670917d8b5553a29865e534e6579f2dd0b628c7a9f4fc71e7325d5665ae4841da033d300c92575c3c99330321caf1414b870aead1f8c1c7e8898eb7f1e1cd7e46720bc8e3a3717f0235d6a7438b2e73790b2cf2570c2c19c11475b5ff91f0f36c9b647c1cbaa2fb15860500000059df02d30881dad7a0209f3c77976860ccf02ead37756ee7053e316e06b8cec502723ea373a67638aae97d1670147b828499695e658df6cd99fdf405a6d7b44bfbfd89accd77919d712db9f388b382ab8ca165be3bb89a07d74b59eb5def9add013376f7f605839deedea6e1ccfdb5a07b86b8817ec7d4e96dca82b67fb1c5745a3fbed856d0bf1c94c181e90b0f8c1d98fb3fd1324ab74fcffcfa5bdb67959f7423bbf2369467e18af901db4e5fbdf8655423259c7c4b506e8a5c8fba375faeff662da049528cac4d47865432a8b0d3926e92c100627c4159a04bfbca52a84dbe09c476ced544f88ec26c2432b571e585e6b6e539edf239df04b7a6d6f19afe3d46174bb0a91dadd60d3c6cffd9564c902faa23a073aad93699163b", 0xfffffffffffffd05) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e0100000000000000000000001b0000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) [ 463.965863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=286 sclass=netlink_route_socket pig=12638 comm=syz-executor.4 [ 464.300838] IPVS: ftp: loaded support on port[0] = 21 [ 465.217738] chnl_net:caif_netlink_parms(): no params data found [ 465.248855] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.255514] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.262757] device bridge_slave_0 entered promiscuous mode [ 465.269240] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.275812] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.282891] device bridge_slave_1 entered promiscuous mode [ 465.300401] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 465.309007] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 465.326463] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 465.334237] team0: Port device team_slave_0 added [ 465.339522] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 465.346730] team0: Port device team_slave_1 added [ 465.352032] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 465.359180] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 465.433515] device hsr_slave_0 entered promiscuous mode [ 465.470477] device hsr_slave_1 entered promiscuous mode [ 465.530707] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 465.537581] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 465.549470] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.555972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 465.562628] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.568962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 465.595249] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 465.601704] 8021q: adding VLAN 0 to HW filter on device bond0 [ 465.609236] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 465.617368] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 465.625206] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.631971] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.641360] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 465.647435] 8021q: adding VLAN 0 to HW filter on device team0 [ 465.656500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 465.664066] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.670436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 465.679103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 465.687133] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.693509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 465.711508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 465.718998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 465.726707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 465.736228] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 465.743648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 465.754060] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 465.760476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 465.771894] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 465.782771] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 466.220944] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:01:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x40}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) syz_open_dev$sndpcmp(0x0, 0x1, 0x2280) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) shutdown(0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet_dccp_int(r1, 0x21, 0x3, &(0x7f0000000040)=0xc87, 0x4) shutdown(0xffffffffffffffff, 0x2) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = socket$inet6(0xa, 0x6, 0x0) r4 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000080)={{}, [@remote, @remote, @rose, @bcast, @default, @remote, @remote, @null]}, &(0x7f0000000100)=0x48, 0x40000) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000200)) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r5, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x4000000000000d0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000240)={{0x2, 0x0, 0x9, 0x3, 0x400}}) 04:01:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x9, 0x4000) fcntl$dupfd(0xffffffffffffffff, 0x3b6a541615677d20, 0xffffffffffffffff) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'gre0\x00', 0x10}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) 04:01:54 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:54 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000200)=0x5a2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2, 0x9) ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, &(0x7f0000000180)={0x4, &(0x7f0000000080)="5df8af4b"}) bind$alg(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfb3f) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000000)={{0x6, 0x20}, 0x4}, 0x10) creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) r4 = creat(&(0x7f0000002440)='./file0\x00', 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r5, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000001c0)=r5, 0x4) 04:01:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001e00010200"/20, @ANYRES32=0x0, @ANYBLOB="00003d8d853c93799bde33000000000000"], 0x20}}, 0x0) [ 466.965530] 9pnet: p9_fd_create_tcp (12651): problem connecting socket to 127.0.0.1 04:01:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) write$cgroup_type(r4, &(0x7f0000000180)='thre\x00', 0xffffffffffffff5c) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r3, 0xc0305710, &(0x7f0000000000)={0x0, 0x5, 0x2, 0xffff1654}) [ 467.033828] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 467.072696] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:01:54 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 467.086875] 9pnet: p9_fd_create_tcp (12662): problem connecting socket to 127.0.0.1 04:01:54 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x1f, 0x21a080) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, r0}, 0x3c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x8) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000080)=0xfffffffffffffe37) r3 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r3, 0xc0585605, &(0x7f0000000280)={0x1, 0x0, {0xfffffffd, 0x208008, 0x2007, 0x8, 0xc, 0x6, 0x5, 0x1}}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001e00010200"/20, @ANYRES32=0x0, @ANYBLOB="000000180000000080a595ba4eae3959b2cbf5b35f0bcd3d899c963fc75c16d870c0097b410709f2fbdafd6f7367085aedaca03d7d"], 0x20}}, 0x0) 04:01:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:55 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:55 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 467.363200] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 467.411144] 9pnet: p9_fd_create_tcp (12693): problem connecting socket to 127.0.0.1 [ 467.427632] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 04:01:55 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:56 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:56 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:56 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:56 executing program 3: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000140)={0x1, 0x3d6d65f312d9660, 'client0\x00', 0x1, "023c4a4e741c0690", "4b9cc88b198340f2bbe0b1d03a3afb6f653f762beb9f8d5d8501bba7fc3de8e0", 0x8, 0x100}) 04:01:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xfffffffffffffeeb) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001e000100000000000000000000001050", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 04:01:56 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 468.588500] 9pnet: p9_fd_create_tcp (12735): problem connecting socket to 127.0.0.1 04:01:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x40, 0xa9, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000040)=0xe8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="201b02de1d00437bb9770b722c8ce4522a06e88101e8a2ae78001000003292052f", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x0) 04:01:56 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000080)) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$int_in(r3, 0x5452, &(0x7f00000000c0)=0x9) 04:01:56 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000001c0)={0x3, &(0x7f0000000180)=[{0x2}, {0x0, 0x40, 0x0, 0xfffffffa}, {0x0, 0x0, 0x3, 0x8}]}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000100)=0x20) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$RNDCLEARPOOL(r4, 0x5206, &(0x7f00000003c0)=0x700dc84a) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000f1fffffb0000000800010000000000"], 0x38}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="406e00001200220229bd7000fddbdf2507000000", @ANYRES32=r8, @ANYBLOB="000001006000000008000d000400000008001e008000000008002500030000000800210001000000"], 0x40}, 0x1, 0x0, 0x0, 0xa0}, 0x88005) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r9, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e24, 0x6, @mcast2, 0xe7f}, {0xa, 0x4e21, 0x7f, @empty}, 0x7, [0x1, 0x7, 0x3, 0xfffff9e5, 0x81, 0x5, 0x3, 0x12]}, 0x5c) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f00000000c0)={0x3, @null}) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000140)={0x9, 0x3, 0x1, 0x1, '\x00', 0x7}) [ 468.869444] 9pnet: p9_fd_create_tcp (12769): problem connecting socket to 127.0.0.1 [ 468.899624] 9pnet: p9_fd_create_tcp (12772): problem connecting socket to 127.0.0.1 [ 469.141041] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 04:01:56 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:56 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:56 executing program 3: chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000a00)=[{}, {}]}) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000200)=0xfffffffc, 0x4) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000005c0)) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) getdents64(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2e00200000000000f1af00000000e90009040000000085000200"], 0x1a) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="16aa38556cca81a3f171ad659f7d7f2989ced4fb412171dc3aafc6c2c16210d63e443ee90f5550a79247877e69c2479a7a61b520126567382f580c855c7ae3548459cd7da205892ba4365a8b197ae5f64c14dd02cb089af4a345a929c66d8e7435a2e41e13267d6eea9e6f19f2c5047abb9a659c06bbfc0df2da51f5", 0x7c, 0x4000, &(0x7f00000002c0)={0x2, 0x4e23, @multicast2}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000c40)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) chdir(&(0x7f0000000180)='./file0\x00') openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000b00)={0x0, 0x1, 0x30, 0x40, 0xe5}, &(0x7f0000000b40)=0x18) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000c80)={0x1, 0x0, [{0x294, 0x0, 0x80000001}]}) pivot_root(&(0x7f0000000340)='./file2\x00', &(0x7f0000000440)='./file1/file0\x00') mount$9p_virtio(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', &(0x7f0000000500)='./file1/file0\x00', &(0x7f0000000600)='9p\x00', 0x1, &(0x7f0000000940)={'trans=virtio,', {[{@privport='privport'}, {@access_user='access=user'}, {@version_u='version=9p2000.u'}, {@access_user='access=user'}, {@access_client='access=client'}], [{@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@seclabel='seclabel'}, {@appraise_type='appraise_type=imasig'}, {@dont_appraise='dont_appraise'}, {@appraise_type='appraise_type=imasig'}]}}) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x6, 0x200) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000800)={0x1, &(0x7f00000007c0)=[{0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000680)={r3}) socket$caif_stream(0x25, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f00000003c0)=""/115, 0x73}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/71, 0x47}}, {{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000840)=""/217, 0xd9}, {&(0x7f0000000a40)=""/148, 0x94}], 0x2}, 0x40}, {{0x0, 0x0, &(0x7f0000002d80)=[{&(0x7f0000000b80)=""/47, 0x2f}, {&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000000bc0)=""/90, 0x5a}, {&(0x7f0000000cc0)=""/38, 0x26}], 0x4, &(0x7f0000002e00)=""/178, 0xb2}, 0x3}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {0x0}, {&(0x7f0000003040)=""/30, 0x1e}, {0x0}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x6}}, {{0x0, 0x0, 0x0}, 0xfffffffffffffffd}, {{0x0, 0x0, &(0x7f0000007040)=[{0x0}, {&(0x7f0000006f40)=""/255, 0xff}], 0x2, &(0x7f0000007080)=""/57, 0x39}}, {{&(0x7f00000070c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000007500)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x4}, {{0x0, 0x0, 0x0}, 0x2}], 0x9, 0x0, &(0x7f0000008b40)) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 04:01:56 executing program 2: socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1c4, 0x0, 0x0, 0xfffffffffffffd92) ioctl$PPPIOCDISCONN(r3, 0x7439) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0xfffffffffffffffd, &(0x7f0000000180)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) socket$can_bcm(0x1d, 0x2, 0x2) r4 = socket$inet_smc(0x2b, 0x1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r5 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x7, 0x7, 0x0, 0x1}, 0xfffffffffffffd70) bind$inet6(r5, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r6 = socket$inet_sctp(0x2, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="5e030aee4da5b7ef64454530e7a4ff7aeb828f63713b2e6695f09fa5a52fc50ffacd9b11fb232d868455558cd3ff727329d73aed3e", @ANYRES32=0x0], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) r8 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$CAIFSO_LINK_SELECT(r8, 0x116, 0x7f, &(0x7f0000000200)=0xcb2, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) fcntl$setstatus(r4, 0x4, 0x400) dup3(r0, r1, 0x0) poll(0x0, 0x0, 0xffff) 04:01:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={r3, 0x800, 0x20}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r4, 0x800454d2, 0x70f000) [ 469.240864] Dev loop4: unable to read RDB block 1 [ 469.245991] loop4: unable to read partition table 04:01:57 executing program 1: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:57 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 469.303650] loop4: partition table beyond EOD, truncated [ 469.340887] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:01:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 469.429090] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12792 comm=syz-executor.4 [ 469.442626] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 469.456271] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:01:57 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 469.557141] Dev loop4: unable to read RDB block 1 [ 469.568076] loop4: unable to read partition table [ 469.594782] loop4: partition table beyond EOD, truncated [ 469.621639] 9pnet: p9_fd_create_tcp (12827): problem connecting socket to 127.0.0.1 [ 469.621650] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:01:57 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x16c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffffe) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000380)=0x9) r5 = syz_open_dev$midi(0x0, 0x9e7e, 0x1201c2) syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000480)={0x2, 'syz_tun\x00', 0x1}, 0x18) write$P9_RLOPEN(r2, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000400)=[@in6={0xa, 0x4e24, 0x7e0fdecf, @mcast2}, @in6={0xa, 0x4e24, 0x4ca, @mcast1, 0xfffffffffffffffa}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e23, 0x3, @local, 0x100000000}, @in={0x2, 0x4e21, @local}], 0x74) ioctl$VIDIOC_ENUMAUDIO(r5, 0xc0345641, &(0x7f00000003c0)={0x800, "45343e2dcb31b8b5c3be52e072b800a41540f59a91ae9e5c6ea47b016ce0f3a5", 0x3, 0x1}) signalfd4(r3, &(0x7f0000000100)={0xffffffffffffffff}, 0x8, 0x0) renameat2(0xffffffffffffffff, 0x0, r2, 0x0, 0x0) dup(0xffffffffffffffff) 04:01:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:57 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:57 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 469.915272] 9pnet: p9_fd_create_tcp (12843): problem connecting socket to 127.0.0.1 04:01:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 470.154702] 9pnet: p9_fd_create_tcp (12861): problem connecting socket to 127.0.0.1 [ 470.319834] overlayfs: './file0' not a directory 04:01:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:58 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:58 executing program 2: socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x1c4, 0x0, 0x0, 0xfffffffffffffd92) ioctl$PPPIOCDISCONN(r3, 0x7439) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, 0xfffffffffffffffd, &(0x7f0000000180)) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) socket$can_bcm(0x1d, 0x2, 0x2) r4 = socket$inet_smc(0x2b, 0x1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) r5 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x1, 0x7, 0x7, 0x0, 0x1}, 0xfffffffffffffd70) bind$inet6(r5, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r6 = socket$inet_sctp(0x2, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="5e030aee4da5b7ef64454530e7a4ff7aeb828f63713b2e6695f09fa5a52fc50ffacd9b11fb232d868455558cd3ff727329d73aed3e", @ANYRES32=0x0], 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}, 0x20) r8 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$CAIFSO_LINK_SELECT(r8, 0x116, 0x7f, &(0x7f0000000200)=0xcb2, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) fcntl$setstatus(r4, 0x4, 0x400) dup3(r0, r1, 0x0) poll(0x0, 0x0, 0xffff) 04:01:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$USBDEVFS_DISCARDURB(r2, 0x550b, &(0x7f0000000000)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r3, 0x800454d2, 0x70f000) 04:01:58 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000002c0)=0xffffffffffffff59, 0x7fffc) write$binfmt_script(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="2321202e2f46696c6530202a2d206d696d655f74797065766d6e65743174727573746564202f7b23406d64f3c5198e5d9e09d87f1bc5113573756d5e08643573756d20245b29266b657972696e67736563757269747976626f786e0274316b0a1138594b54e624129a76db695350b27626469a23841f65fb48aaf3be8dca87b37960257354c9e2f969795d72739f41ca5586e6b92dbcc1b4e8135550c6ccc410b0019384c30b316ca1d3a1a645afb515f1086cae351ae3aa680d9c608e390a2524db84b163a87cd6e430617750e8126921cddb2c5f4b9b6187b6fd36858973998fae94a65d92cd5f590224cc15567f9b4772118123a2c4b666eb63d688c91927ecdb405ae597ec8c09675ef993d9a60797f0981d2150fe6dc2d895ae40001bac683e39cc8b83f81d723027dffbb4793952725b2e695d194868d5ac6b7235f85739518b51f5d59dd0080023f785ce8688e0a696cd171ac14ee0e073cb27bf17773a0ae0f37e8f6007749c3a3938eeea11cca554f6f2ce9735ada92c2375fa71fbea36754f8073bc5f1ce6bd63c34b08add7eebec560bfda71ad824d16859cc1b8897148f7d6f214deddab327f42"], 0x16c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200, 0x0) symlinkat(&(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80000, 0x100) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffffe) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x4e23}, 0x1c) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000380)=0x9) r5 = syz_open_dev$midi(0x0, 0x9e7e, 0x1201c2) syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000480)={0x2, 'syz_tun\x00', 0x1}, 0x18) write$P9_RLOPEN(r2, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x20, 0x0, 0x5}}}, 0x18) listen(r4, 0x200000000002) r6 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000140), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000300)) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000400)=[@in6={0xa, 0x4e24, 0x7e0fdecf, @mcast2}, @in6={0xa, 0x4e24, 0x4ca, @mcast1, 0xfffffffffffffffa}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e23, 0x3, @local, 0x100000000}, @in={0x2, 0x4e21, @local}], 0x74) ioctl$VIDIOC_ENUMAUDIO(r5, 0xc0345641, &(0x7f00000003c0)={0x800, "45343e2dcb31b8b5c3be52e072b800a41540f59a91ae9e5c6ea47b016ce0f3a5", 0x3, 0x1}) signalfd4(r3, &(0x7f0000000100)={0xffffffffffffffff}, 0x8, 0x0) renameat2(0xffffffffffffffff, 0x0, r2, 0x0, 0x0) dup(0xffffffffffffffff) 04:01:58 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(0xffffffffffffffff, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 470.494859] 9pnet: p9_fd_create_tcp (12881): problem connecting socket to 127.0.0.1 04:01:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) [ 470.597077] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 470.604837] 9pnet: p9_fd_create_tcp (12891): problem connecting socket to 127.0.0.1 04:01:58 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x4c2000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r2 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="01"], 0x1) dup3(r2, r1, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x40, 0x40) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x7) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000240)=0x0) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x40000}]) 04:01:58 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(0xffffffffffffffff, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 470.754286] kauditd_printk_skb: 5 callbacks suppressed [ 470.754295] audit: type=1804 audit(1569988918.524:179): pid=12908 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir321860475/syzkaller.LV2h6O/15/bus" dev="sda1" ino=16593 res=1 [ 470.768381] 9pnet: p9_fd_create_tcp (12903): problem connecting socket to 127.0.0.1 04:01:58 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = socket$inet(0x2, 0x3, 0x2) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(0xffffffffffffffff, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 470.849132] audit: type=1804 audit(1569988918.614:180): pid=12912 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir321860475/syzkaller.LV2h6O/15/bus" dev="sda1" ino=16593 res=1 04:01:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:58 executing program 4: write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) openat(0xffffffffffffffff, 0x0, 0x40040, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000324, 0x0, 0xfffffffffffffdfc}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_open_dev$sg(0x0, 0xfffffffffffffff7, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00\x00\x00\x00)\x00', @ifru_flags}) socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) r2 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x15c9ee17a32b9ec5) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r3, 0x800fe) openat$vcs(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000440)) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 04:01:58 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) connect$pptp(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@gettclass={0x24, 0x2a, 0x52d, 0x0, 0x0, {0x0, r6, {}, {0x0, 0xf0ffff}}}, 0x24}}, 0x0) sendmmsg(r2, &(0x7f0000006d40)=[{{&(0x7f00000000c0)=@can={0x1d, r6}, 0x80, &(0x7f0000001540)=[{&(0x7f0000000140)="1c37c5a32bbf6032e86eb4c7c4437ba689fdda57ca58dc09f1ffb99bf31c19694701f092052dd91ce0254d7a9779600d7130cb5180f54eac086d01c2eb55f1ec022b79442f355ec38ead56fa10e6320069a539f70b92", 0x56}, {&(0x7f00000001c0)="8f3f04be9e62a3cf329d5bda2cf0477fe6e6a7de9f1c17b18391c868420e95e9ad10e5d6701491e6bc4d1978f4a4910069fb0ca69779b5ceabf3f1841ce461221d33ffdf206b863b17f084e36243f5cdd18b98d327d7a76f708db9e8c53359d5857095b8672cb6e36657d522ad0325ee0e6b33dc3bb1e501745ce3791dcb091377dfd295feedc98d58b24b5d6b2441146bd924637e30018b51d3b76abf7e995ff91b46ed29206aef99238f6dfbbcccbe5f088cc51309a188184a8feb0c", 0xbd}, {&(0x7f0000000280)="cc719e912e47da09dbb6178f89871cbb155c5c062ebac9adab2ea2e746c5c8f2eee5b8674669fb4502a8321137c26a2d4f4b207cef7ac335fbd886b2c2fd6e5d5579330650279b96f1f5cf123e531bb82c06e29718f8521bb2f3c701aba933a0f438125767670d019e", 0x69}, {&(0x7f0000000040)="abb3812a7229c1c65a", 0x9}, {&(0x7f0000000440)="d867fb8f77d3359db40d2a4da3c0a610d279731984c33a11470dc4fab803f69248366981d2557ba6dfab61dac142214cb9562c7dca65e0b4b86ffde0e609e101d9dbad7dea15d96e9b46e243fef9e8ded7b0d4552c46dfd3ff4c7cbc81ea051f60e5dc20e22aac71cb5d0eff4260ec99e45b9b84dba9f1a09a9b265dfa542787386842658b107c5c40e3fac9efd04316347482457c3809bb0dae7c764767c9765a50f70c981a941ecaf3051dd9925d5a4f7d5a78ecfd6b09ffeff9f6db2270ec71ca288f5b9c4556eb49c6d53a4696fbfa9f034612f4e5dd121c3e7782f6b19871", 0xe1}, {&(0x7f0000000300)="ee47451b71c8f9ffb18140540b44f9f4dac88958ee6ed08cb875d93ecdef98a25858bbef2b3415", 0x27}, {&(0x7f0000000540)="930b5a1d9731ee3b61e3f3ae1d1180a42a4b4aca850577bb80ca514bcc635d5bd2282fa31095711ad5618d868a01f7d8f4a4dd82be6e8c5f4f8ec49d466ef478ef9d4ef253a1217b16436aa7ed7abdb4c893d1c834f03a8e69fc06ff2b9d2707261d0fe5c83f63d7f87efd633136d7e9d05d279d4460b7347e76112f538e8ab1378edf0d8aef69b1ff8ac773c0357bd5d1b77318ed9f10854c809ae0447b6410f42129a5ae6331d92f00f8ee56834ddb1dae2e06e71af6855d652546dd2217461109100037234b285ba55f780ed9dfdcceaf45898a0fba215eb14eb1ae6cbf5cff8d4f88d848af0a035b78cecf28b97a2fec82ae2b40baa3ba773da7d616f6b3badbe60001d064c3850b3b4cb004917a7b8fe3e1cf5a2e5c99b75c27b56e391c3b1c4019dcc3599373add034e2e55bb076851cf7a5bc3ea5bbc99aa0ddf16905d992bc898c6a210e8ac1b78663a1ffd459c7054a82cb745718ca5195f5913a63c59b0d45e2b9b3749fb00acbf9e4a01e9a6e5378679b94df7ed82a5f3ef279f83589b4531b0ec597e936e60f103a976cb211698c8a7404431f9ad1aab6be2f63b3a968476e19e6f0594bcd179dc566692f550705c5908ede4afa5d07ee98e43a74020ac98ac3c3e826f7014ba4d7763ece49725265c334c7859b885941feaa22f30323c8cf0648c3dd6c60cb28f6d488d359dd479570634329cd4e7deba8ba16d57e69dc27183d26acba67379db23866a02ba60f8f5d6daa1971540221eb4b2776752ee627e14f1339abd49a9e3764eab5ac650041cb0b9eaee575ca3393669b0482ca15ec8084c8feaa386a2d96674244a782552ce4c2ddfdb5f5cc9d1ae893e0b4e49d7b7006d63a0c796ea7763565ae0f65924b5974343ff0fbd62e563f7347ca12640dd9b669400c5fb46136cb6d9d120c72c2a76e1525aed32d7d05b287090103bc2dacf01a868a42bf247473f8f785729d38a8a84fec5f4af8b4c5cd8c873e3bcf442968875d485e8f3dc581b4989b9f4e2942f8415e372754d92f88aecdae56fc41cf7433524c0f498fbdd37bda661b1068e08c9444774da4468c06c9aafcff8babc649924321bba4013883d8c5038551f71e9d9a8bd1014459b5f84a70b02cdd33db86c84f79e963dc01c71ad6bcffb9f6e203aec5885c83075d94647704353d49f0d60ffa26b344f2ec0e96878631f655a6233f403b510e812349211e2aa7842590a748e83901a6d12e956322c395b3f7a9cd9f8e96332edce0927082ee294156a4ece8e10f24debb8907b6f963c1b7204c7e7133dbac3da6ca3ba500599c98dde3b6f8d6dd3437ce7dda0c4e0f4b8687a20309e5d72038505fd7389304ca5456ec1d4700f72a44dc55e367fbdab7a26bd908e76087a79c81b6beb73e4cefbb5defdae1784546388f719b3bbf373ae171461293ce23f6c608bf20862442ae8a2a4ed0e5e0118fea6aadf6361eb102c41b39a5948da128aa3de573f8dacfcc0f15ba06c4928c1da61bd0f4c793e30391a167a30b64d8d32b628624ba1dfa84cfbf3ea5e01a26538479dbe667be544ccbadac34ffdd48a49eedad03e315f163580e93cccff9a773efc0ba8ae94dc43a36e1933ac1ba3d3b23921d560bd951aabd9547bd074a6230d16641ca481de7ef6a0d62439acd57d9577222250b39c379ad37a4147c1b6b46d9d30d0d7f4c83afc87ca0c1b4aeccaad251b610bac033acc6f68e783d165e46c7af85c48548f89616adcb205c38fccd599b1cc82b310d3ec57b214349f3bf3c08d24c235bc94abfb163cc04ff8f4c73c43d42f8a53cc3f4688d6261981e11e21a3a7bb7170c97dfe632d29ebd442b0a44af37397d75598147ee84c102dcec30666fbe9a0b937a1ef6520dfc65fbb9e1f6d5a47fc175eae04561159bf558732162e83501fe21390aecaf4bd3e95867ca9a1180a49063bde0f792f73f772199eca5d77185c9e69a425a76ac2e58a0fbebcca4b904fb9979a26d12685b8a3ba3a1172459372dc7d90aa19f99f5838fa7e5382ffaa6424c5325385be3713dc1819ccc4480b8ad926abacf545ae454b86c7ac7fd1c2f2caaf307d45924e8a9edaf737c01e71a337e55e7a470c32d06d3498c23a842f64674723aecba99b3026c5dda89e2a2d2c28ef3c45f11f99277249ffce2d30ef124b566e39c9519c5dbddc4834241174e47b487497c0b906c46703e49327911b44b1cd7eb36d2501a9eb46f70e699939e35582cfcec21f66b21898488b21c2e76d85783357be62cef75aa42f2716871df3ff9b0cc528b73a86a194f39292109bc2641cfc4343b8030b3fbe752344707b6c3416682fb30378bcd1949432a8b4a696099b3aa57157c70c0e4bda1069d988098de9c0b43d5b573bf620ecf039d491455274ca8cadf447910a9e22c5f1315626597991ed3e58fe24e85661f89794864cd9ef5c3c9632029ddfb2b5b3a8288057cf1e429e96794e6a2e728d2059957f3f48528127deb2eca7869041bf365728a142e64dd474ffe34815946b54cac08ae0c8508a1fb042576aee36b79cff0e08d3ea7642f603c56cd73a88797d5f951d20e7a614e400a83ce82a5b606f9b83e97fc43b2ed9801f2ac529b82c80b0362bed04297f1770d65405ee0c68d5bff40893f2316349947eb2c7fc11e062fb360161c02ed1959b4ed0cc77bfb6a74a5d921c8bd21b5f607d93e75df052b016c81842b1dc3ad7080f23968b949afb2e82556fddab7aafc6512e16c7ac6b476ab1d59f683bee16c5971aacb338470b8389f48358f31385815b32ed178747c3edfb8a5c6237790b1ca240703e7720bf6fbfe114b68e0503a759178cad8e6f8fff386839ff694523b51c31f2146883ff75fd184bbce8fc9b216e1b159204f3c4aed0bb5d667539c382ac03bf602f612f9cd65b5407640d8f555e8792e1a5d3277eb1f0d3831af3988842500bb221b0498bc138550636205bf03378aa2cb31d9ae3baf850c6f7d9fa732b4f519af750cabaed6244dc407f60271a0dc64fedca86069f1643fa506b3c9b30dc609444460474701a7cba34c6924ea20347c06c52ee38659243d9fa85787462178f3e54fecc5950bb6dd5819afce67eb13c3ec42fbcce15efead801033902855878caf6c371de78b5c52a74f106de002dbc41a6dae92c2f5c58905536673d946672ab8caa8c445967be72ca573c1e856f2204d2b9c9641655faafe123865b6e6525d8779ed9697741f613b01d827f1c583812f168bdd407327ac07775aa9f78ff15b3c4daf506050714c70862681c70d0fc15c21808c423233543539093b157ec5755a7697b4fff09cfe1d5b98a11d6ac7e7e4f4219ef0b0080a7976dff0edceb0f4a6e7243e21c5c3b3714cc5eea667364e5f64c2b9b35ce2aa556502fa28e84ebfcf78ab9941f72f0ba3d566f01f81806f91db1959991910222cf28c73a8b9a3d9330cbee7221e5668f08c41587af3741375ae5aef2753dbf9744991bd33a74af489799dfb0c6b9e21c4b5aa7b7b54d448aab69cea7dfea75f40c1a9c55becc957bf84e1536be3bd83abba4a6e4d17bc462fe4cc1445cac198aad916f3b322bfab6afdde85bb97633962a90e9d789853cc233cf098b3f16ba2201d6e31989c90b7069fcfc37c88a9b7dd40cf705d266169cfb98b8e08051694c40037f1a6cf11f73467187b8a547d9b3585737fcc8e499e5c52768b3b828f92926f97ea653c8c0e6f23ec806f756cd69a4328f6d19f28d044e332124ad69c2b070d84f0afe15d3845725e901e699d58ea2e5a58e2a217691c02ef97b84e2f60badd5deb15203ca28b9574d66d1f6a738431b18fab335b6e0b0dbbfa96a82bc5e68f34730d6f0d2489825909c54ca19f006a4c025d0f0c49d032da06ec70aa4428787e5d88425e198d0bfee3ec25c94baba9e593e68f69cf1dee6868ac8f205d2c0242918fc50aa2951caa611ffba719b15aa87ddfc7e6abed65c9bfe4ba45e34a953937f3ff2503395b59d8230f4413f1318b4e337460ab24b43191b94212ae0a44b4a9b6c4501a33787dd02583ed433a37c1204898ef5e22d1fe59e0eaff7cae6deb2a661eecd11849e90d005ae4cb946a9788afe8bdbb25fa012cf39721734df4ec1f86c3fa641df3339263bb230cb22e8f4cfdbfa3b95ac5fea1c251bed292f46970d7a81871dfb4b7ee88554c4dbb537e7a56dd072097ac3465867529e3ea64229e5e5b270256304cdcbf5a5b9c11ab7edadb43be6c884c3b0d66a8f6f605026475eaaccfdcc17ccb1bfe1b7c4d198f689ede08b1eff4a66498fdfc48f63d381d8d4d89689cdcdcd58b8603f710ea6e5bbd8404d98050ef0bd2b5fbf41b634217db252abb6f258b61d62a83dc0a98f511b48bc748d0b9d545d7d6cb6f84d49af6e63afccb203006079d7477c6bd6955b201c0730a80ffff8cc29be71c981c502b74420744595c0057baf143236125bc0b63c3baeb100d08e29cff6bfc04e9039c2f24409fc45bf4be7eb59d4effb41d644945e72cc91da8823c98794fe70ce91f361b0eb7d821724189f53fedf358067336ff204774c4553ff37117e8dfbc523de3b7e2ec7644832ca3dbf24cc426135bf43e862b6be5884297b35b8563aa959b2ebc387c03dee7dc59770300e1245f5b47170215ebdfb11484692e7b372b777a7dbe1aab3c85697dd1b76770cd28efc8c8c1a8f874aa98d66c33b2c8dda01fe2692c91286202aaf8d11e569bf585b04575eb31738ca200924d46d4c70482175299f6eae0d6dbb8b931fca0161b2db92edd75a4cce80e986eb42d95d4f2c0ace642c7cb169f9ca961acbe4200cef2c4ce0b3c28b331bf25bf3b7436276ef75ef4fe63e8bd256b67e006ac437eee357451cfa384ebc4788d8677c0c84c594468c61b0d960260419b79a7bf85bd8a1fcd0a68ce0b6cd9a920cc2173f4bb9b614431d954ebf15fbdad633f4e55e37c4a53daeccc759d117045b0203bfd669ab91333e1b738ea495f191aa552d667379139e298ee60f2d6c9dd889eab35d693d58ed032ef2f73f49f969f9cdab67b378aa9f2d05ac53b42e9b9cf0347e14a5a314b8e2624e8aa4ea4f67495c68f4ed9891ffabdadebfeb1ae3eb75e79154da0f7ea253021ba0e35096e1b9068c322e193eab630a1a8d9d57c3f50b62d459654534a477b66de40a9c4e424f5b724a6bf601c696b46a04b668ea87b16a8b35e64100aa0f435f798d8bd20fbeabf5040c063081380c6acb977fbb03fb7d11bc752882c5a8ccc6ea41bca7f2afbee8686b6aef76a878f17160160ce5d148edb1edadb4a424d6f1265c8da01dabd659755e1586da8f49340fbff68a04a62ab4a5acc7fe683ff2c6b39f8052ec365be89fc1bb71d5c79c9e40208f2e155b21fa2be7421b16ffea7a53814480a667dde99282e9a48c4cf5236a4384adf8a11b4c2963889c78da9b3463b7fc6155daaf693a5716d8d3fccac4f5490d7e68d28f04cf2f96f244eb7f529efdd988b972f627af6720053313d3237a6ede61df285bee4fa4d580e68744b4de55f3ff911071d9d12bf431b1308235f52eb419a5057a77f0247de428696fd6e034e1087799a6c43a8e414567f8b26a9833bd84f6d42be8755c3d8b6a10a6aa782942fb4e23c57e837f50cb60ad0309957b3b439345790c379476294393152a5b6b2aac17b1c578faa109ea9567f75224424ee993d4ff48d064c404c6c0cdd5166676648a7f6a52a389041d1b626841830b1858ba5842d0ae241847d396a0fcc4444a46b881538dc2cdd422b193e09137ee234152cd9719a3589", 0x1000}, {&(0x7f0000000380)="19ba439662e6ad1fd866973fe08b64b4591e5058acc5763598a75d2e5f84a16ff704", 0x22}], 0x8}}, {{&(0x7f00000015c0)=@l2={0x1f, 0x53fb, {0xbd, 0xff, 0x3, 0x1, 0x2, 0x80}, 0x0, 0x8}, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000001640)="f8430ad14237f1ceaef6e1b62f17e6f6598b67d9ff3381fb20b28cc8e6f3afb9e4a0ce3a87a14534df8da9f4dfd606e168e8ae8ee643b3437cffd47f6a1081ee3c8a3f533170af71421b97d82feb7c3782da63cbff80d19e0c455b26d723cfb5f3bb1a3f9e8b760e", 0x68}, {&(0x7f00000016c0)="ea84fca0354e695553cc32b897c86117a5ff79126c7dc1bc9c5d82952934fb31b086940bb3c09038ee05c88226cda512018017f156b60728857888516edc58e30fd39270c7", 0x45}, {&(0x7f0000001740)="1bc0b55ab643fe02300fcb22c064bec60f64e1c557495dda89dbf421a478e57ce11a39dc07a08b9500a4ac82bdcda534a35064e150fc48c2219f08dd8d66a814c49fd75811df76250d976d8fd272a54c84f39209760655e475b9f4ed8fda66d14a9dee87465f85dd6fde2064d8efc9b0b590f55c70d9b83d24f8486ea62be5f30077bad8eb21c5aa9c799eba002fc1f71602319098a2bcf9e58788ae93ad80a6535c55d0015c84b6e82fd76b7e7f611de961fcefd5ec1ccdd5c044677799081199cac435fa4ad351b32d4383f5f8261ff75d37d93b2bf815fae2576149618977c66d8e1beddce8346507175784fa2325711f576d39d9", 0xf6}, {&(0x7f0000001840)="1ed7a69b6755b17e04eeaa9593cbf2205ec71f7614bbda62279d06c01da947aa27b5f55b50a6907d36e8faf508cfe9800e09fe04e5fc63b54c2905214b44f71d15dd89af9b0fd14ee15a786033315eeefa11a31217da7336dd5a1bee73c52345e5fe05ceb2fd0a01dd12e36122cbcb1a0e61511bee5f074041a28620fa09776950dd79e85c221b6df2a8dd5c29", 0x8d}, {&(0x7f0000001900)="685c807c712bb57822e5600431a54c6469b6d8d685260cd6d93db72067bbcaf73e70f1a6d7b752e88a4d247ef83e3ae60016cdc50ae63b1d1de3f80f8779e5b4c870fd4b186842993b10f81487f3c830893324ecdea7b5063a117a563bff77800a63459ed4a1dc", 0xfe13}, {&(0x7f00000003c0)="ff5e0974c06451844fda5f5eee24f2f1f6797f349f3eb1ed8d9a5681", 0x1c}, {&(0x7f0000001980)="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", 0x1000}, {&(0x7f0000002980), 0xfffffffffffffdbd}, {&(0x7f00000029c0)="d5e867d99d6e3e3f0195d610c07359f8ecc2411781fcd5c3230a56eae58ce7a5c01398452642360c3141b4aa4fcb8ade747cbb1c3cf52044f4f24c14aa123f0edf38f14159460fb4a0077d9c0d0b46539df11c59c66b64e395eba4e1049c2013fc975dcd9d2c49367722e358e070723ee20b1ced66bbc919b8c4d7422bc2293baefa02b58460925f3fb6110890a63602de4f1a965fba91ff8367c0fa3fa697a4be2f496a5c949d0dfcfdf0a93f45b824cd3ccc099983935e06c0c785a9c0df173591391ede5c1492511e08c9fa492cf8dcfcf3e8d9cd168c84b048e7a334d5e49df416e988", 0xe5}], 0x9, &(0x7f0000002b80)=ANY=[@ANYBLOB="180000000000000003010000c0080000116e4621ac00000060000000000000000c0100009600000048db3e70cc15b17eb113baa9fd9d0e358d5bddcc57db7eb9f32ac1553aadce34037b1d490c690639b3a574381765838f2b28e429d841fabb47db20f302c920009594794b2e6707e23b57412b2af42435"], 0x78}}, {{0x0, 0x0, &(0x7f0000002c80)=[{&(0x7f0000002c00)="f8efbaa66b61c6b770f0a715fbe744016411eda6f0f55708021931bf7f5fce659600e146d6caab83c3cb583a9e8ae576b6ce44b9c8b93c8cec33e8974801c8eeceb7edb3ee9be01e81af2818cefc0a8a64b20379e28f00ccd01e", 0x5a}], 0x1}}, {{&(0x7f0000002cc0)=@hci, 0x80, &(0x7f0000003fc0)=[{&(0x7f0000002d40)="72e7db9d2b1a8adfa96a38fa3945ed4ed9a9d89a65e6ae4be54a13b4772069119f14c50d5617255b4bb21c714b242e1ee2feabb88f43059f693e8801cfd6c90aa9423f97c66fbac6d15011daeb60e90399f59bcc979b6dffb28203570d17c8", 0x5f}, {&(0x7f0000002dc0)="4de0325f3de09c5b71e129ebf958380af0e858dd5ba2fc62b1acdf4153ced155882977fc7725828e42fd7c2ef790907258376b986ac7113fa804c7636374a57dbfe09ace51e7a768ad7947b345b3ca2052d129", 0x53}, {&(0x7f0000002e40)="adb9883a7e4a39266201330a1d3121de56c291e7e879e40f4c2dea9e9088f5dd23f2b9fa95d2fbe7889ec69ed6f9150a8ba50af5a68ae692be0373de0e2684c600103f5d9ef81a551dd4e01498f3ea3b7e0ec1756f9d2f0f1736be1dc9ed43c68ea46ced7f99d74d8d8fbae02b0b1cb12a3465aa1332b1699406d4bf4dfcaec91a7bfb86cddfc13b1adfee54f8d4fb296da50a929a526a2810690ac541864fd2fb62892fb948747b54b7fe64c7e0c865dcae75ec30db2d54ce469c34846635227e90725a6af4dceff344e89a24962462d3a965dcb2f17f6e0aa8c7f94588a74ffd1df0a2e0cc77d3ce013e6de8eae57d82ba3c4512fdf4be5171d59a5e53c27ca8fca25a477cb7c1d0132cbbd86342f12be5d1edbe0e76610b8cda7504d978fdff49c45b07e80e7888985b52a672c44d1e4f1cae1fca76e3d058782096c5b4bb75ec6bc2669731fb8ea648744320132ab6f568485fb82ad9d47da245aa99d5301249b944393af66aada21c35d49831fd8e47e1f8d9b3816f958e57a8afe2f9d09fc615842bc35bca3791115f24ffff27abaa7cc856ec857438d59772cbf66ffecdf6aeedf890b2dd0feb0735dfcb66f93c335dc374a6964d242d51634b752cadb0ef62ed0c9aeccc689454f24ba9c281d49a01bd7f9812beee9efd77dd29368da15cab35b27bfb28b04a408e69ff4e799f0ef7dc03c9d010c96aced60956ea97ff85114a5dda478a129e5207fa9c345ed719decc4640d4efcbc1fb849934063f54dd92b12f12dc48b794b652717bfefa8b4246418aff799febe1d0c6eb1039d58dc753e411823f1b60903812efe7ac5b242365b376ac4afb1ce078720390d7c0e43e30e79399de8cdb0888c076cb772bf2a430a2bd1d4942979841acbdc97555f0484276cbd49b0a0e5b2d2da2c5ed8475aabbbc0e115519cdaa702085a8c5ff38eb071ac17041a34818e93065b532ee0c8f6b1d8b28a0ca14ce09d0222392f49da821dd5c4cf424dddf0d7d6f672756e21599761fbe0381d33d54a1effa73ddfdd021cf9d40d42d9edcf2f64cd953a433abee46871da30b92ba0f8115b8d249dc293eb025774525c7c7cf95b6d1bbc645757242268a2f16d0aed3d66d30beb2ee4a7448c12330c734b45b201bbd97d9e9bab944a2af80e6f07e8dfbda19cbfc177ce4260e01d248a1294eb9b0d08dbb90ca0d65e20641908d362b9766b1645558c77dad2f2d6d1b0f489c50d5458102a6b52ceef50afbe919b57d8c9aeec87774b7ff388acc96d2dbf2ebe71e821794a40cf6614141b86c62867cc3f356806371e16d2153400de4c0161fb34098d37cf5a13467d2eb4a1620eb5d94c93ae64437c6d3a45781924e6c3003dd685420213c7ea1fb90ddbb89b33588bd5f6838c61cf899c43a7b883a12e49d78a1ef221f87799878bb23b40c02354fbeecbcd7219ae199e7d739fab3f799f0ef4d7bb20e7d39ecb257bbc56a52192b1a0be37f6cb5a8627edc135698aa24a11f7f30b1934df008f3e1d4e11e65322c394a514a383594ef6cbf9ed83030310df7fb28936b0a0f58e8f0de129cb26f00580f9a678d41a2146a402990532fdf3d25339a0f3c6f3793c4ee031d39dd0bcd3585dc85d6e038675c00d152b27ecf07ef0898e953b9bbf88937046c81b3abb9d6f75858a45bf7f108e4805c19fc9b986bab9fb1a586d795e3ce9e3b29c5388822431859b8ba2588c801b178251ea8acd45f4165d9e8686891c1a1c42ae6addcc1a7deaa10697ef56ccf2be7c9e5e0632b824dedae71d8b5a8d6909456e58204222166ef5a0a8f9359e9fdc6fd25ec66b4741faae3b005ff240f77040e8200691312df704fb79f1649ff4bdfa3495f969a82323962824e1e823ddf942ad6fec6901af20daf636ebfa534b6017ffb582878129df57ee424da778963aa6aeb40b222b0cd726f9448c07d5f3503da638204b729ca60ac02b3e43bf47040610203b5ab56f24dfe86e38055e71eca52ee392be8f31cb56e91997c090b80b743310bcbe209d39501cf9ee2068b0a4c0dab01646aa68513e86e685dd30f2611ea4f2733ff1d0ff40a6c0484c4113cba4b7261895e68c51a006ee7137dd2fc9b91db9c3546c328b8da91e8a0f35d58739f1dd195fb44be734f1d60e037ad88974a5062a3568103b05e8fdefa08e8e374556d043645bbf5e3e4fc3ff766443413e7e882812fef5b63e2a983aa57a5a2c5703e85ddd2673200acce589aa727bad593d8d21df603baf9565a1b1358fdc61aa70e737767803c119528fce77bc9e8c204b54a171534e9bf8f5f7d0bb2b18316a104dc2f009d62dbf0a981fb173925a055f48e9c0f9aa93716556432c04e4b09ea86a42335dc07869aee8ed76129c93d30841a72763a3e55eb0280063ca8e4b1e8743e03c60a9c3e9f102886d2e59ea6ff7cab5a73050d12558a83d39efd9f7a41c98d4c67992c4b634100c872c72f7597563f970e3aed9bfb38d544134f24ae1961e38c3ddfac7c72958a72d8f7c9d9264bd6a88d539c62ce470f68c4b70aa193e6e9ce4ef533a8363624c2c8a7240d398df527795d15ad9d098407f818bd59328f9557e17055344c4a11146cf86accac1e1b4784b112436a2bc4c46ad30f84bb733bfd9f43f1686a2e0fc4e9e9921cff2a139698ce6f961c24bc55d0788fe6e7f01bff8c34dfcd6f955fa21b29b59299a26eef41e00eb2928fbfcbfa6319c8eab58a281e42d40bb96474e770a0e275dfe94c353d28e9b6ea09ae330b172a483989ac9285142fbc3910ddf78f9f524f9d282760b3947d0cd3e8d0a6e608e9780a818062833e66ba15096ebec70f3d017d447f39a259e62bd147c155b091928163d082288b2bf05b2c94b5df50940668df252cc5951174ad4c117791fde243d68428af414e126685d137a4e277ebc9f4f1bb19e8eb5dea3d153bbae9d304626f7f9b16548f3f78151b851c02d9f4b44e35cfc5db1a09292fc534eb0472c46c09ea7eb3168c43246161ca0bfb72f26a59d51d16927fa2f34ff7492918adcd5de789046058518db153925c1c239a048c76ce6a724aefe797c176f33fb648bdef26d01f7f405774e1bb80eb2967f2b539aca1bcd2812cd83b2a65d578cde436ba8a845360b4b579397fdfe6f029fcf4da2efe83a0c2c76fd3bf1cb61c8fa913b6f453795727fe156f6db555e3e8df0ca83e6c981d90fd2d757c0f7a3c2f0c131828872167b415aae081195f1f237f79cec3057e43f862c980dc5ead9af1873446efdc1d28f3cf325014be75974a769b894253308223465c25bc0f540a43e017650abe7f08808118a84e7f15032db0027af9c5be33258e7ddb734df1c93051fea3cdb0185b03bbc7869cc54fa6c3fc3c9d9354c126406928a5f3a87033d0b27d94fe3fbeec6488b24a2a861c0bf1c0d1da97747f2bdab6663a4f5c1763143b575ebf0664c153bb441be40c8808acafb28a9c44eb6604f169b84be644b0943a013af51fddba72c41d40a659759961b67653bab497e9f883241056a49b3cc1a28cdac21f19832df6a73c42557b5937b95ea54f97c16899070dc702fd7520dd4cf9d592f4f7c13bd2d1382ee18461accfef89f712d457a4dcff61ca8bc7932b3ba9c2074cb211c80c9285b9ec3ca52a90da83e317037edb874d3e23fc8e1b7e525f1493c3d3930661ad173ac57e13d2521e18e24e3eb8aada68437a96416bb4be4384deca47e7be517ed8080803d019c5586682f3ddddf0143075d2ad3ce0a4a63f1222bc04027453d0ad772a4d53abbb7b7286ba59a6d7c273f060654005def622405a338bd3bb192e7c56d578193d09efa6938ecb40dc5de574e118f78d7a701cbb741af802f24715ca1916f23f2386a55b0f13356f3914b86d38ef828d462f135edcbf14f03b863578a3b2c0bed6c52e02a92c916472148d69b3359531a1f5a884756e1602c00de8c848ee27dc139386a5774fc778ee140efb9e03595146e28a790d4b73880d1e167e41b07cf1901f15d8c08bed74d937df52a17008cc4e3d47ced75d6f2b7cf1f7baf379df77fb8bfb9e812ce1649033d72a27b502ae20e56a479f04b6f3cd55baea5dd9b564eb2d8c07895d0d404987d15b37b5a2f4574e0b4743a01cd1ad2265443347448757402f8265523f2749d1788cbdcc359133c221863105c2d928f06bc17076696db6e1711b061966b16238f4a2c9479fa96b3cacbd56abe9cffba4e3813931bfba89b60eaf103541396b1bed09738949c3f2a01ba49bcdff9af8ec5fe3f355fa744d180aabd35ceaeea6a1c085d4ba16d5fa2e24ee090deee520b63071763b3d41e1538044c961d51bf329c534af8c9ebb1614cd7bc45409393d0b55b455139dbb07bc35452da4346c0c322e6d23dcec3d931cfad7f8da0e1a6b807422a71dca4085ade2976598c6083289b8fab8689abdc4f4608d9278ee1d37616c050bab16ae7e0f6f6259745b5bd0cdb78475246ce19f94f094533c6ed54ddc0d8b47735bcd8532d2ef5f461ef858fa618840c263c3d9b654c34639e64589f6e8b3523cdf08e352db04d56fbd6db39133e558b1e11d2bfa654fe54e002402e111fdaacd18b86ec3a22eb03489dae42b1ab62e76116361c9c9316c1438b58c3bc96434c0ddf47f6e12a15ef474d75d6bdcbf49335ad96a705964de5e30a608d51d175a4dd453dee9d5b77cd54dcb42052a118a6dc9b8b1fd0ff45fc263c86309f4df4aa2ccc142bc70dc8efac4434df5788da3d7a1e3eb1a1a120442946ff241aad11fe39bc303c21fa404893f812ff8ea27573c4e6b362e3258057c9a86161b5200e8df44ad504a99d7dc59f1dc31455d0a0965fc5c9109897cadccfd6979e74bf835f116fd01b46db12041b1470d2c2eaffc503faa0acc00a94dcf719be950b554021f3a5e4ed455d6f0289e767960210f6854ebffee4e997b088b628bc26e7b90be0d15cc4bb801efacf38f4aacd43c49b24dc16f077a0be5cfcd0536fc496f4efd73fd69a3914c2f84ab3c818705c88731695211b7a0f443a620cd9cc7c82c4c35b2a111badb8b5f7d441092dffd77e75ff9f63f8f8aa72c6366a4496f258763424928536ec0ad1f2aa0fbcfe3501267699365bf625d600baa8e95bc2fadd86ce29d4ceffcf5c6ed6fef313b11b3c67e8c35b895f227b029b1f26e60375f6a6063957d30beb673fbbadb988eafdc4f018d869a5bc21dc65e2ce6922ee787fab31ea6210319c74eb721e238099ba7546ed5222ea919fb8c658c2e5c1cc8814ed6ccc691c557ed64664113d8a425a24a6dbd9cdcfe53af62e74fde45d5d8e5662cba7f036a0f5db1f3ef64e632597af3f1b52befb5613c4d552c1bc9dc26b96084bc0e1a47a1d9696a2ceec55e305ed2af106136d71ff85493696af0c5786fb91bc41072356393a4c9b3648d812dfaad84fe17d0cd0b202b71ae7e691373f0fa22b477b2650232b95860ed4089748adbb5da54ac8a1d38f119346256880badb546284688e42e74ffbeff1e65f2280c6c21a03d77b65f555aa44c9f9539102fca21cc6089967fc7df2cfeffbeb1666271f5ce2d4d2f2ecdaad2bd1da3fb98a4bb99a45a48dc1732fa5559f029e02360149d8bbf8a0c1e34d952fab6522b4a4579745270e5326b399f90efccaf8b15b2a9a6121b32c7f38a4569e3dc9aefc077a3334c02492d48ec863e4140ba771a36f06f92b6dc947399da5fbfeccd6019a47328e3cb28f06aceed6d96de62d60855685dd4fcb82514a282b63a9e89aeaee6b2d4cf4bbf85ab74ce45bb07e06a26997f2270af", 0x1000}, {&(0x7f0000003e40)="fd0fac5515f050f0a98b6b9213e41c860c0fd8643dc815e7af39ad6f76e7b9df0d18892566233dd2e4d8d928d7bd501b696775c470e4dd8dd434e6b07a57408422b8a6dfcdba2cba5559a2d4414e3192ebb4d7e95d31743787172a1ac3a0192126f44292a3482ed6edc6b43ef780bcefdbedd573b9ed874cab0b252d091aaa39783da4e3", 0x84}, {&(0x7f0000003f00)="8dfcccf73bd7af8602e42249422bf163de11c405a90b05d8591b6251835e2ce7eb80130d3c904bf07d6685ff447c6a4acb0f7930bae65d0b4b0e4bb224d36ea2fe15e90e16b3baf65bc151fb41f8f668076e13484b127542", 0x58}, {&(0x7f0000003f80)="799cf3fa2b58572b342365c210127809c4ca1243ae51f9536f70ac4913340e5c1d2300dcb9508cc639a173191fbe35f0fe113c48", 0x34}], 0x6, &(0x7f0000004040)=[{0x40, 0x0, 0x51, "19efcf4833f6bb8abd899349784477eac4549ba594e93a5faedd4870fcd1e0b5365d4d46eff8f723b0bbd429ec"}, {0xb8, 0x112, 0xfffffffb, "0f5a52bd5c63565270a56531a9cba1cc29a34bdb7f5430d22cbdb8b2a3a009eb819df5e1f42138c941f83402f1346bb6ed481f38363dc248e0d564fa1e6d35b28d0edb5c886ee8d7650193a932916633a1859f38486150410f92495c75e23a8ac079be2839431de87703ee87a91d8b02c3753e4563a4a34eb4920313b274cea1bfd82a35144bb1932441ae81e266b83044e07c8c8723454c7e10de02fe3e4f562db59a57"}, {0xb0, 0x113, 0x7, "71bad992ffba4c9d5ede77f7ef40fc58f07e088cb89894afebde9c62ee3d0c7d0cbf7233154541f81a5604224538a508f374afd22c16ffb3e30099733a4d796334fae45a5216b5b8d8c11f5cf7cc6860a8078334b8e3d54281fbbc3f91b2d36d6b9ec195676195c1a01f6858559edf1942898608b16364a5ba5310ffa1908bcb77c73b9c075d57b9911da7cfcc68e9a2afc3f6726bd7de160b7c759b2abe9d"}, {0xa0, 0x6, 0x1ff000, "aad34d54064cc3ac937bdb04996fe5801011b4d9ba46b055acfeacfd0a6fc4aefaacd627a5adfced7ce9479250a6428fd00bee4b7d27c2bd4c7f5676a3f7025272878c71be089dfcdedd0a8172336a90f10f3bcf9b47aa1c205626690caecd13a025e786cfc624a14a6d7171cd81760cd94f120cab74644e0994d6a8e147a4d10285579081025f2949"}, {0x48, 0x111, 0x401, "dbc9c626afeb6c8ebdea0f7e0d1968af34d9b8b57a70e8be060ad4c126426aa8e2e77eca4487232cf36aef34e41968c99e89eeba0e"}, {0x1010, 0x5, 0x5, "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"}, {0x48, 0x111, 0xffffffff, "c8f1fcf9a59e36cba350bfe73572b82bfa9535d15febcc802f0cf93627fa1b3d7192a128699cf37ed0607028c2b3ec11eb63046de8e8f6"}, {0x50, 0x103, 0x8, "1366faf16cea9f4bf7b325e33214ffd4d6d44e579851850f1afee953a6287c310d03fdca17361eea8d7fa8732885a016d505ebd3319e58a7c1c0adcc88"}], 0x1338}}, {{&(0x7f0000005380)=@ethernet={0x306}, 0x80, &(0x7f0000005780)=[{&(0x7f0000005400)="2c895687fa30634f4444e8480c7831f2559eb05b6b12f01460c07a89c5af4dc2080ed8fea64c115b2c6360dd89a58410c92d18e57f1b82f582c52f6b7dcd97023d06f839311ca769a4bcc52b497a99df2030dbd27b56244b04ac1f96af7520a7b487b15381005cb5fb30d873b471063b6bb37b3c3a267144ae4e85be471294bd50026ecdfdb6fa30d910e564a6da3ea6a4fc71d3da0c60448a8ac2d2395acf73d81dc0fbc1b1e547b27dc15894cc05734d2ca7f97b46a5e0", 0xb8}, {&(0x7f0000006f00)="4ea5531b3adc7b9b08c72b31533885a9cb72283366361569c47bee0a003f947402c3e214d68f44797fc851b76ffda737579e6a89dac202400ad2e332120db185b1542b2969af6016771757a235a9b7dec0a6be1fde21e69219401b07b41abd1fbee10288c98af825ba83147ee1d3bf3b8e9724f1d6425b14571ebe2c5e95d52f4f7745fa8041677d7261501a127bb02d3e92d93937e16a9c6e82143dbb9a74b6d3db7535534027b590efce46c23b204ed4243cfe9a69ca5f9777d8f18111068cf506cacc3de069b2804c6503e86de9f51f6ac8fbde6db0", 0xd7}, {&(0x7f00000055c0)="8289294ae4c03f10405d66bede5254969ee6c9768e7ccecff7f68345f677c4d65cd406639471518fade75e40e40f6a90cfdd563df7d78fb8168c35d761b363f9c425d6f16e504d1b310f69d8ee416459b1c069eb0b14a30fbc193cd0aa81ea116979210cf02507b80ff87a8bd47f01bbdb12850e3868d7904ec613dfcd1e548b7d5294a293562ab75ae4021135e567f0146a5f4d6b432ed8dfebdb6fb27457c8871148f90ade251b17cd64fec8fb2b2c23a9ff8f332dd71037f2c7094836759de0106fce4d657243199166c038f1979ee664820083bcc34b0d688af1f08220a3e0e2a682b6aa148371fe07a941c8", 0xee}, {&(0x7f00000056c0)="331ee471e4169b8adb956bf94e329ccf5a85ae9c5573ec02cb39e565e9541095ec2ee6101009baa91f7d9799b0ceaabaeaea7695242b43f09eaa0af74af9c43212d0363b0825c296e95212bc214a9101148ca4c2b61fa14cd3dd38462eb019f4f5fee7d6d2f7285ad8b36649c11b70b9f54bf4aedd4efddf2ff25991a5439cf7b12c9ecd49b9d3bd82", 0x89}], 0x4, &(0x7f00000057c0)=[{0xc0, 0xf2ff74bbb2b01e0c, 0x5, "89a28f7bd5e67fbcd08a194c5fc852ebc01a177afa6155fa14a9f3c16e0611ecb57a1fe9323ca880f60fef30617c90a4f18f673fd2ce0e5f36b7b115e582033aa0a12720bf4dcd4016ba27ac0e0c3062f7b24c535232b3a59a7e3f1f419ec5d3d6f28317ab053421c1b566be44413974474162be98e7c30fe7c9f314c15c5b960b1cfde96bb083b6e2d636dcdae74c2639ada381d46c684d5186a29de3ec7feffd5fa44d29a09cf17d260a"}], 0xc0}}, {{&(0x7f0000005880)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f00000069c0)=[{&(0x7f0000005900)="8d5a3a1c33a31d40e3a716e33885c19691b89e58ba56836cd9707cad45f36275e8d1557c9f70fd14c0101fd966bb1cc32ab69d5eca25b7f824fc753e24b7e16003", 0x41}, {&(0x7f0000005980)="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", 0x1000}, {&(0x7f0000006980)="2a49dea157b32784c235acc7bac369c9a38a641696fa8b00cfaade08fef6a27a80bd19b79b", 0x25}], 0x3, &(0x7f0000006a00)}}, {{&(0x7f0000006a40)=@rc={0x1f, {0x7d, 0x0, 0x1, 0x6, 0x1}, 0x1}, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006ac0)="d144d66a33aede4bcd1bb0eb5cb6fdcd6e1a2ae9b939d4d62e57e7d1a10d598e5a3b7a69a946a4e0c07f37426e9cb72e7fffe445ac1c7ebe0429a5200914d32af94d61f59478b9163c254630c6b3a9a82e91d6a69a732aa660fb86f28d5320fc01d3c0ec0b111b104c3fa302563af2", 0x6f}], 0x1, &(0x7f0000006b80)=[{0x28, 0x66, 0x80000000, "6f0f270577a14ae004eafccc2e142ae68f5b50b879be22cb"}, {0xc0, 0x21e, 0x3, "9d488336f096c668d8ebb367282553bc4c20bdbc8ee72a9dc0ccea638122bff973385c9ea6574003ff02b1a17e3011bf94506148fa14ed95298e843c459a56df2d5510110adf825a8ff37d3a33a663d830d3126ac7485ad63909e042a960a2215aeea3044d23f04b331c13ffe9272f5ad0026108f0665e2ce2f4022d2a3cd86977015cf46135a828bd072ed9ecdce375d898d3792529ea9cf4e1c450890f5c9a4ce327f4d4ffd4a1acb0e66b30"}, {0xb8, 0x29, 0x0, "c0214d63674e5660f38125bf67c68b78faf35eb5f4952ed1c71895b32b66dea105a91b2077d2fdc71e23012c6cce5c75897b4bb7e9aa5b5813b04f86ec06d203cebc49fbc78dcb4c65a2fcec2f691a02401362b6df6f99337857968042d260f3ff502fb335c5f86948636fcfa9fd04ec0d7fe1eb6019bf4f26cd11e9bc44f034bda10e6daa9144a9c5a13591912ac9e95f394700fa82ced5d67de495cc99893abf30f19bc2"}], 0x1a0}}], 0x7, 0x24000000) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetl\x04\x00\x00\x00\x10\x00\x00\x00age_ir_Z\xa2tes\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000000), 0xffffff6a) unshare(0x40000000) write$cgroup_int(r8, 0x0, 0xfffffffffffffd98) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 471.082779] 9pnet: p9_fd_create_tcp (12920): problem connecting socket to 127.0.0.1 04:01:59 executing program 2: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) ioctl$int_in(r0, 0x80006080045006, &(0x7f0000000140)) 04:01:59 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000000)) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x553980, 0x0) write$P9_RLERROR(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000702fa0f00766574000000000000000000bd6800"], 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r4, 0x800454d2, 0x70f000) 04:01:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:59 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000001c0)={0x0, 0x0}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000000100)=0x20) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) r7 = syz_open_dev$admmidi(&(0x7f0000000540)='/dev/admmidi#\x00', 0x8, 0x2000) setsockopt$inet_buf(r7, 0x0, 0x2ba7130d629d2975, &(0x7f0000000580)="d352bf4d7624865f9cc024f2d9f96f228a66fdc6c994ecbf1cdee62962002fa9d893df4d1cec33685baf74da6f2e24c0ded45379c00e5a6c34b942aa641743a1342b74d84c20f49c14cb373990b255fa156747435ec79a8a7432336ee9577d59d75322c1", 0x64) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700000000000000000000000033144771e7753119dfeabdfe2a78144d10898305d30958e860af34389afec28dd5359b73c664a4f197fcc5ee7198e0b47cb1fc2bcad565b73a54bb2629eb5270ce761b23b23bca3e95b1a0b2821d64f1ae54e3e7c4b76f87c290b58947d895cc7b80538ae053291776b8d8f8d2a6a3df229d91df39ec7289b4f24f005789330c029675993111afdc37e4f1428a83ee95a61cf0ed13fa2f3a8bb7c48ae759012d350618e6d31042665f588b3579fae24b09bb479c0d7591ee03ed034b32e969d02709bf16784c716f4c8b4604480ac7e7cdb180a331", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400070500"/20, @ANYRES32=r8, @ANYBLOB="00000000f1ffffff0000730644d471c3410702000008000100686866000c0002"], 0x38}}, 0x0) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, r9, 0x0, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4fa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x24044111) sendmsg$nl_route(r3, 0x0, 0x88005) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e24, 0x6, @mcast2}, {0xa, 0x0, 0x7f, @empty}, 0x7, [0x1, 0x7, 0x3, 0xfffff9e5, 0x0, 0x5, 0x3, 0x12]}, 0x5c) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f00000000c0)={0x3, @null}) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080), 0x0, 0x1c0}]) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000140)={0x9, 0x3, 0x1, 0x1, '\x00', 0x7}) 04:01:59 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:01:59 executing program 2: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x121) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="c507376cc92557ac6cb30f28a7048996", 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@posixacl='posixacl'}]}}) [ 471.522930] IPVS: ftp: loaded support on port[0] = 21 04:01:59 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(0xffffffffffffffff, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 471.572147] 9pnet: p9_fd_create_tcp (12956): problem connecting socket to 127.0.0.1 04:01:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:01:59 executing program 0: dup(0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 471.795305] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 471.834989] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 04:01:59 executing program 0: dup(0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 472.018480] dccp_close: ABORT with 4783 bytes unread [ 472.041212] Dev loop4: unable to read RDB block 1 [ 472.051229] loop4: unable to read partition table [ 472.077775] loop4: partition table beyond EOD, truncated [ 472.108399] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 472.187302] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 472.206194] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 472.291944] Dev loop4: unable to read RDB block 1 [ 472.297012] loop4: unable to read partition table [ 472.318416] loop4: partition table beyond EOD, truncated [ 472.333144] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 04:02:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x2b0) r3 = dup(r0) write$P9_RRENAMEAT(r3, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="000f05"], 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:02:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:02:00 executing program 0: dup(0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:02:00 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f00000000c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r2, 0x800454d2, 0x70f000) 04:02:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0xf) r2 = msgget(0x0, 0x102) msgrcv(r2, &(0x7f0000000000)={0x0, ""/96}, 0x68, 0x3, 0x3000) 04:02:00 executing program 3: syslog(0x3, &(0x7f00000002c0)=""/137, 0x89) 04:02:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000000040)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000140)="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", 0xffffffffffffff74}], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r2, r1) 04:02:00 executing program 0: ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:02:00 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) write$capi20(r0, &(0x7f0000000000)={0x10, 0x5, 0x87, 0x80, 0x16, 0x180000}, 0x10) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000040)) creat(&(0x7f0000000100)='./file0\x00', 0x80) lsetxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x80000001, 0x80) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000240)=0x1) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x60000850}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r2, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x840) r3 = syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x3, 0x2) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000400)={0x5, 0x2, 0x3, 0x5}, 0x8) recvmsg(r3, &(0x7f0000000a00)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/143, 0x8f}, {&(0x7f0000000580)=""/63, 0x3f}, {&(0x7f00000005c0)=""/101, 0x65}, {&(0x7f0000000640)=""/70, 0x46}, {&(0x7f00000006c0)=""/201, 0xc9}, {&(0x7f00000007c0)=""/1, 0x1}, {&(0x7f0000000800)=""/188, 0xbc}, {&(0x7f00000008c0)=""/191, 0xbf}], 0x8}, 0x40000000) sendto$ax25(r4, &(0x7f0000000a40)="6cda224962dee21686147b31ad2da71271fe93e843fd267441936aab92c731cebc26a5639d565715aedd6ab1e52057ad52cf2907bd8f3f838f8e104c39c2", 0x3e, 0x1, &(0x7f0000000a80)={{0x3, @null, 0x1}, [@null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r5 = syz_open_dev$admmidi(&(0x7f0000000b00)='/dev/admmidi#\x00', 0x101, 0x230880) getsockopt$inet_buf(r5, 0x0, 0x23, &(0x7f0000000b40)=""/12, &(0x7f0000000b80)=0xc) r6 = socket$vsock_stream(0x28, 0x1, 0x0) fsetxattr$security_capability(r6, &(0x7f0000000bc0)='security.capability\x00', &(0x7f0000000c00)=@v2={0x2000000, [{0xf0fa, 0x47}, {0x51, 0x1f}]}, 0x14, 0x2) r7 = syz_open_dev$radio(&(0x7f0000000c40)='/dev/radio#\x00', 0x0, 0x2) write$P9_RRENAMEAT(r7, &(0x7f0000000c80)={0x7, 0x4b, 0x2}, 0x7) r8 = syz_open_dev$swradio(&(0x7f0000000cc0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_CONTROL(r8, 0x40086414, &(0x7f0000000d00)={0x3, 0x4}) r9 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000d80)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000e40)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x30, r9, 0x80, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004091}, 0x80) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000e80)) r10 = syz_open_dev$swradio(&(0x7f00000010c0)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000001100)={0x7, 0x4, 0x204, 0x8000, 0x6, 0x28d0e545, 0x11a, 0x3, 0x0}, &(0x7f0000001140)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000001180)={0x0}, &(0x7f00000011c0)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(r10, 0x84, 0xe, &(0x7f0000001200)={r11, 0x3, 0xe6, 0x7, 0x9, 0x9, 0x3, 0xfffffe01, {r12, @in6={{0xa, 0x4e21, 0x8, @remote, 0x3f}}, 0xfffffffb, 0xd05d, 0x200, 0x6, 0x7}}, &(0x7f00000012c0)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000001300)={0x0, 0x401, 0x10}, &(0x7f0000001340)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000001380)={r13, @in={{0x2, 0x4e21, @multicast1}}, 0x0, 0xfff}, 0x90) 04:02:00 executing program 0: ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) [ 472.882216] device bridge_slave_1 left promiscuous mode [ 472.887826] bridge0: port 2(bridge_slave_1) entered disabled state 04:02:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ftruncate(0xffffffffffffffff, 0x6) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x0, 0x757984af}) pipe(0x0) r1 = creat(0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) lstat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="8b721d0c6ca164caba45d94e72e88bb75a5ba8bf09cb89b2573e2eb03c37bc3334a56cececc9abb8b5ccf4aaadc25160f0224881", 0x34}, {0x0, 0x0, 0xfdc4}], 0x8010, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) fallocate(r1, 0x0, 0x0, 0x369e5d84) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) 04:02:00 executing program 3: chdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000580)={0x2, &(0x7f0000000540)=[{}, {}]}) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000640), 0x0, 0x4}}, 0x20) chdir(&(0x7f0000000180)='./file0\x00') r1 = syz_open_dev$vcsa(0x0, 0x0, 0x72bdf1e6a0acecc1) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000100)) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) pivot_root(0x0, &(0x7f0000000440)='./file1/file0\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000008880)=[{{&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000380)=[{&(0x7f0000000d80)=""/4096, 0xfffffffffffffea0}], 0x10000000000002d1, &(0x7f00000003c0)=""/115, 0x73}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=""/71, 0x47}}, {{&(0x7f00000007c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000840)=""/217, 0xd9}, {&(0x7f0000000a40)=""/148, 0x94}], 0x1000000000000256}, 0x10001}, {{0x0, 0xffffffffffffff34, &(0x7f0000002d80), 0x4, &(0x7f0000002e00)=""/178, 0xb2}, 0x3}, {{0x0, 0x0, &(0x7f00000043c0)=[{0x0}, {0x0}, {&(0x7f0000003040)=""/30, 0x1e}, {0x0}, {&(0x7f0000003200)=""/4096, 0x1000}, {0x0}], 0x6, &(0x7f0000004440)=""/2, 0x2}}, {{&(0x7f0000004480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000006800)=[{0x0}, {&(0x7f0000005500)=""/238, 0xee}, {0x0}, {0x0}, {&(0x7f0000005740)=""/192, 0xc0}], 0x5}, 0x2}, {{&(0x7f0000006940)=@alg, 0x80, 0x0}, 0xfffffffffffffffd}, {{0x0, 0x0, 0x0}}], 0x8, 0x1, &(0x7f0000008b40)) r2 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x0, 0x40) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, 0x0) r3 = msgget$private(0x0, 0x1) msgctl$IPC_RMID(r3, 0x0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000200)) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 473.001107] device bridge_slave_0 left promiscuous mode [ 473.013227] bridge0: port 1(bridge_slave_0) entered disabled state 04:02:00 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000400)={0x200, 0x2, 0xe5, 0x4, 0x7}, 0xc) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1c8, r3, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x15}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xed}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa3e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd7af}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x42}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000001}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}]}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x400c0}, 0x77) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) syz_open_dev$dmmidi(0x0, 0x2a, 0xa6000) read$eventfd(0xffffffffffffffff, 0x0, 0x0) [ 473.286432] device hsr_slave_1 left promiscuous mode [ 473.345868] device hsr_slave_0 left promiscuous mode [ 473.426941] team0 (unregistering): Port device team_slave_1 removed [ 473.479379] team0 (unregistering): Port device team_slave_0 removed [ 473.517311] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 473.588975] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 473.739465] bond0 (unregistering): Released all slaves [ 475.620849] IPVS: ftp: loaded support on port[0] = 21 [ 476.511664] chnl_net:caif_netlink_parms(): no params data found [ 476.547704] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.554231] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.561548] device bridge_slave_0 entered promiscuous mode [ 476.568210] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.574900] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.581818] device bridge_slave_1 entered promiscuous mode [ 476.600972] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 476.609523] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 476.629394] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 476.636510] team0: Port device team_slave_0 added [ 476.642365] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 476.649326] team0: Port device team_slave_1 added [ 476.654588] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 476.661819] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 476.712520] device hsr_slave_0 entered promiscuous mode [ 476.750431] device hsr_slave_1 entered promiscuous mode [ 476.810542] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 476.818863] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 476.832391] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.838725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 476.845350] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.851696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 476.880615] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 476.886722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 476.896460] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 476.904486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 476.912055] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.928891] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.939627] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 476.945886] 8021q: adding VLAN 0 to HW filter on device team0 [ 476.953856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 476.961535] bridge0: port 1(bridge_slave_0) entered blocking state [ 476.967858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 476.978003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 476.986388] bridge0: port 2(bridge_slave_1) entered blocking state [ 476.992774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.011509] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 477.019133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 477.026784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 477.034075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 477.046424] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 477.052871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 477.059618] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 477.072718] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 477.083320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 477.500596] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 04:02:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:02:06 executing program 0: ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:02:06 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6(0xa, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_vs\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000180)={0x7f, 'syz1\x00'}) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x10000000006) r3 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x4, 0x0, 0xfe, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r2, &(0x7f00000002c0)={0x8, "b13e1c20d1764d052a4289a71186ca1abfa7f39eb694f4602948f6585c3542ac42cb2f94b098e98f2bcd6128dab4a71d544e96e01e3a9a3548ee5f554c06d963346edb9d133e86fdd31c21e9aaffeb52f7cd63297b1fd0db1845e12bda3ce00f0cca0e6ac9c42a61e687c24c0553b408359c86c7bfd7a30944ac327f982b011258e85ee00f050c38e73199d07b72b225a96ab0fb5a9ea944a233e46cd4c25aaa0fe04bd9b3203f61a06c8f094563ffa0078e50248ce1acebc03c75069eb1cb20ebbe30ec063f9ebc45290dc4f8b56ebb08d32e4df04785fd385029f766a0b96db6a1b6615de63393fe97082c076a7170d2b1c06ce0627d6acae850c2b95f38b079a352f27bf6f5460078b8e597c1d3bdb5cf9e73f42eec5aea224ab44b94e18e812864faeaf770ba7471f99b07d41d573d1d4c3833fb4410ea36d710bfa66ccdb14a1927a678f873b023e82c341a43704adb37242a67b2a46d02ab7aee23cf3030a2f3dd58eece667b6e9393ee8d36649e37e83b1c73c0ef65b4df6173c1c25324fbb9afa1361dc4275f152deb03d7138a688eb9dc66e7845ce1be5647bf740b0e1dd038120ef1e3e1cf420cf8b723bef771376e433935e4f9096a10c4a969aceaac4791c41f365b274dab49bddf51b22a24c05ceaedcbf45febc927e98f410d38247d7679cee7b0d3041eaebd7821924ad31e7c5137bf87ce1ec537a981779f0a4c57bbbb5c641cfd02e1e3904f48b0be96fc9851b6bc8c4260168eea9d9d111e2777f78a9021d5eb0166e39410bf279656770263ca2fb7ac0e30d5e168f8cf4bc5665d057da939b770568e41d0fcec5d6aac0bf4ae66fb099b786cdce7f6a9bc00b83d8ed72440a9724d4ef8af71c7efbc31397930cdcb99d30502ecbcc7ddb9161ade16a1badbd7ea3c6c65b387b46234c4660c816506a2f76264bba07ecb685532116bd971464b58e3ea0a29c2fa1d49d9c6308806db01326e9a1b6bbb556f6479b29f48718e211d75f08d0fb477ad8dae5aeaad7e176b2c5ae331ef78212e9dd7e506549dc74ffd940dc91d74aee2fa7f28855919c163f443804e2a072ad8add2be84df87e414afcab0f8e6f67d3ebb1778a6798d50233da09d29b95c0da97304b7a025e50a7c89e614c63bc69477bfe0e5ae2c468332d134f9e22b19eb2f01c8e8d5148b9b980f8b9aa0cab9ba89aafe16d6a8cf9cb5ae659d8fba88e2841f3d6ac0c44dd9f03787d357fe31a4f551e247bfb73b1f2aa1e208c36aa90dcfc4da8877967c05fe951716ec2293d79c6083e79061bbe18150e2af1d889bb4e87c7735b0e7b88a3109a906d1bd4bf9b98c2462420ecc4e9f3a274a6678bc56e9aa7f3d64677141f874f35d00d04a1dc83126ccd69a0221305a3a5418ec24e163b165c1e4533c38f3d213de4012aece68ed11e2f42325d6da5eef78ee985f81a7991e3d1ff69188059c292779579418ef81177fa94b43cdd0fbf92d31f0fb592a864ddc98ddd5b49ece865e7c7a6c873169d0eea46c1a44f645b1cfa40849ffb9f5355ab396dc1a875180f17103be63be4e7d1920949c59ba5d47341c176ac307e165b9733ac5cd9e9691f5ecd76b467881b78f217d50903a06c57270f4104fd26d496dd7e08c27209185761882923f6447c73d53a74e28132e6bf97ee4f2df9d03be88653a9a7251d8df247f1a75f91f95886ce317e3c125aa7686eec86708fa72c9b33a664e76c0ed891ff9d840ac121ae3f96d32330a14fd76df19c7ae0434e2103d6e9175da0b6cc7a007a0a18615271771434959de305636cf7fbfdd16239bff7dbc656a702ebd48f9a2b1937cca80604ec525d292bb7337459235ad047c6933b6c81bd966ea60ec863de568a9e6d8e0378916f441e0f8b2b74df49b9b24094fd643413469428a537aed19b72bf9381ebab4cd57400ecad1cf1b792e9610910d02f9a779b009840e3f1a1395a87f1e590c33018be80a3f34bbaf49e415ba7d3858b40788cd19211b8cad3789870fb252f8991d64bff9558a67a2316ec2402c2f9c52de42e6389fc90bc4379f7b899b1a943035d64f20b7766edf08fdfa185d00493031f0d3f9ad7dce841f725c5adcba896a76857918a2f54c8aa2e50f71eda35b8fea3732a02c146201ad9f4b65b7caa09e2a73f72aee1ce428a35489038d5cc859fbd48be8da5d088ccab897a248fe418b89b409ab5507af725f077d264abec5b53667ca06aed03815dd537535a3360a50ca3d09c025b5057362c7cb5a4b99c58ac64fe813f4d7f2cafbc3048835ec43fa68170ec7310342134c9b5ec417763db145555cdd37f24b27b0911d172710b74d3c754aac02b24030166cbf2eccfaf1e909b629b7919db1351cd0167e8b6bddc5ce4b7e13cbf0c095f636427d440d058e7637eb117947fc6a60942d10bd455030ee38fc447fd3e6232efba65def558dcff60274e6b2ad62464b4f767bcfec22c681c12bdabf1fedc3946f45c9a34a9169f79ea60a9d190dcf1ce14957382af602dd134b610b269247f38c3d4e233f2fda399dc4cf09139cff9e9c731f8bf940df3cbdf9355f604bd0f3d3b20a6cfc39a7d9ff74f734750187b30c1a970a432bf7e9417cc87d8dea00c4e1885845e1a59bc6a5487687c5bca514e9dcf372bcdc0fe4a47f3e4ac456b1a812e69f88b2a8a964d946cc102ba6f3a7c965df24653c6384d810cf157c8581d4b40e874aded8d227a25fab9889f02698bf52980f048408de4a96226949eba5d1b7f41fce61ae1ff9388e096646ddda4c222f7b9bffc1d3e5b645b6e248637698f6a5be1dc03ff7aa9f418153beeef9b9d67ac5b6fc888e5adf0db41a6d5cac2b600af3b428a1294f4fdb4cf64ccc254c1c7ef71b9be3afceb797fc9504bc3f3dde217687d47cd445c44bea2b16eacae76f16d868b77065b189bd7c4678f3a5fc99b4d020d42972d010b7a6b22de46b434f2d8ec4f567af2d531817ec81ffa36cc27d073a66d2152f1be2a8dce08e98a00f473f22e680cf0ebdcf37936cee60f99eec69503a15d8e36f8d599b535021693fb52f9dc93e315d6e849bd4bf9d05fb25f0b09de91b73ca4edfbfa04d9262d449eab2be542ea30f316384609efc52ed641a9e32d48e4a57c65e8bfa5c13e769d5402a0b125c17360800bf0da8592a75abe647f1d9b1072942947da82e701308b60ecdcfd40d7b6cf44b443493ef0466790547c0a8e5914484969e52cba3787c41df965f91ed7074cd62a63db7e1c35b8f9ac30521295ae7b9c81143926f1dd36aefdfbcd7056b0d4209cabe113a18c58ecc062df687666725707029a8be3ef5721484bd429bab33fceb76c6a0f079da8819d0d9565f5e4ed45eb531f9501b85b619b5323169b0297b7cedcf6f288225dd5e6a7f52c1b96cd38dd94b2f6b8cfc6dbd7862901a5295dca5ecbae72344f41c4a222bd6711831d265b910d547501116bcfbf3c9e104b446175c4c8a4e56445ca22f9363f0f54858a8eb4a1c43103bca578c5b0ee372efd705a950510dbbfa4f74c8ddb4bbc1f07dd410ebb39c01f4da8a0bad2d3d35df3a12a9fa2daf44c8163d59aba8a7351ecc9fe4cd25b987dba700e73d7174307161adf70db0e7a802d7c9ec1b912ee58b0a35c2c6f40f112d70ab5aa708071379280c9ffbceaf0a4ec45c89ac0bf3ef40538302b685e24574da8bde8654e99eff66c9ad5e6beafa0e48e1c293c53d955980346cbc052d15e5d1f3baed388dfaa72ca089af06ae757466a704b93a0ff13cb5c722f0b872432a4fd4513ed56825b13ddd4d8c02eb624c8358199f52679421ab0e1792869f6b4aea523a1079b3138f1ef761c6df102096eff43ddb23ee668b9cc5161433feb318903b58387c3dae2833a8c770e7c6e27c31a1fca07377fbb07f11911be6192f7518a8d089b89826e48b28f5c8a00784bef9b2f68c90838eb2c9fcaeda4bb76782510082c977a7ecdd5743e9da8f088a3b67a25cfb25db4a709b6cbf5425e7efa8c2e472464606d9ccd2fc0f73cd1d51a5aa19d9caba10be2147f8e1ad763ba45693f9f078b0716cf588142be847ca67dc132c5782fed12b7d95c55a9bcfdfb85cb48698a45621cc2f1c85559617ece7def71486290b0cf8e987e8788e1a13f17e3f24b93ed2009ebe42e3bea9571f98b39b787c107dcada3a36fa1fe93736e74ec34af80a182cf0adf2846577f1d474c9ff1b4b8a2cfe6a2d445029ca77088b9c84be63655d48cbc5f61b18d7cda0d141f2db6bc3c479aa6ca19638e2c37da38768eb8820e5679345d2abe8033318eb952e297e17dacaaee3df7ef1d6cd554e9b1b453c44e3d4e030e25c5f9ed094100f6d9b1dc5dab371436ab252cc4d7fdf8fe4b7f36ab71f2bbe3878217b151664c3b9ae970e473ae164d77f294ca8ad58634ea446880e8327fc7af2a088e39508443a601eaa00742a7d0ad459dcac24a60edcfa6ac9f72f428c2b8dd30b8278e28f25a1a129d23cacd765de4c4aa52819578951bb8e311e8621f627e3463e2562b6dbc8d1c431c240f1424599438b9c94723f79ffd1fa1bc94104e4598bd43244302f86ddbe47ad8671e25f406aa507ba45bdba09841827a697cece002f79ec7cf14488789d754f84818d180bd04a11cb2115441a402bea2be749ef233bcd26ca27df828ada877a893e54ea3e6ea29e62d6e7693af7cbee59ccdb4045d0e6eeec3d8f59205f324a5f7cf5f871929c83ada04bc5d3990288dca5eb312339933ffb1031e05866e1b2d0aad0ca940795458b7d6c8a3750a76e1e6c8ccd48ca542d6c51164431d70c9d35f0f828cdec404a175a44bc2a9651ec5281c0f3aee9e4375f0eb139f58fa4419fddf9ebe2f8f37121a57397e7e830ac097ed375521a68f7cdc471621b769fef40cd19d8d55a82e27bf5b0cc4182359db7c9066e2ee10df279a89e96fcfea225995f065f7f286b8c8ef9b6c82a34df14dda2f737f557578ce5b15944e3149110102d80465c1b436b6bbb16fdc64a9d130ec7644bc162f0e2c5669a9254970a062561e269d85b72b4748d71d88ca20778287bc3b9613043166862f133f366f6361b9e1d040bbcd9728a70fcf3be7ea8fe0f55980ed03f336ec49f7cb6899813acf47d3b2413e7b637b764fcb9003ece75f8a255b9cdc71f80dbbaa7eaa2111b5551feeb7ea31620a2c88897538915abedcd184d57c79d81505985f561820449c330bc3412bffb68c4c743c5a5a3acafcf00d7561a66f70e5835da530ba62f221211e1fefdc1fbc8c05b1b68b7eb2afac6ebbbc0b961b8ef8b27b555ce7641f6601ac19d5f4adb06b40155a2085ff32de5b2c5edd96a01a14d1bb49b58f1fd718bec428043819b8070e46f0215d2153318320754638d9b40a5214784e7c1f80dde05500cfe8e4dff855504e099634fb3d44829453cf4ac8db7e5a4144f96d4508de90ada04240637fd5b261cfbb80c8d9ccdea6c1d3485a85663cff9749133002c7f9c6ea4de1b50fe90dae397f6b5833e943e6c5f60e10d805e97e6869488b857b44d8c94276f668257c223e2e26dff75222d3f304f8a040ce058e1b7b3bc5f0b69c310beea64212ef0a54bc9fb858c25681cee574c532b64d4f8241e0b855f7f79d0a1ea22fc3d9ad5a1658b5c4d9d417e9eae47c81628341172609a8ef8c72fb6e4e48da6a10207e56b727f65c82d49e2dbb44b492e1265c2b28f98980334ccc3abb0cfd15d73c2f38f4c824022aa7a0ac0b7d35eea934d3455d21e8c710474e54bdf29be107ebc00", 0xa943708f26830065}, 0x1006) dup3(r3, r2, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0xa, &(0x7f00000000c0)=0x2000000000000074, 0x4) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000140), 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) 04:02:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ftruncate(0xffffffffffffffff, 0x6) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x0, 0x757984af}) pipe(0x0) r1 = creat(0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) lstat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="8b721d0c6ca164caba45d94e72e88bb75a5ba8bf09cb89b2573e2eb03c37bc3334a56cececc9abb8b5ccf4aaadc25160f0224881", 0x34}, {0x0, 0x0, 0xfdc4}], 0x8010, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) fallocate(r1, 0x0, 0x0, 0x369e5d84) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) 04:02:06 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3fd) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'ve\x91\x00\x00\x00\x00\x00b\xccY\t\x00 \x00\x06', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r1, 0x800454d2, 0x70f000) 04:02:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ftruncate(0xffffffffffffffff, 0x6) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x0, 0x757984af}) pipe(0x0) r1 = creat(0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) lstat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000140)="8b721d0c6ca164caba45d94e72e88bb75a5ba8bf09cb89b2573e2eb03c37bc3334a56cececc9abb8b5ccf4aaadc25160f0224881", 0x34}, {0x0, 0x0, 0xfdc4}], 0x8010, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) fallocate(r1, 0x0, 0x0, 0x369e5d84) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000380)) [ 478.392967] 9pnet: p9_fd_create_tcp (13076): problem connecting socket to 127.0.0.1 04:02:06 executing program 0: dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:02:06 executing program 0: dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:02:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:02:06 executing program 4: clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000440)={{0x0, 0x1c9c380}, {r0, r1+10000000}}, &(0x7f0000000480)) mbind(&(0x7f0000e82000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000004c0)=0x10000000000000, 0x8001, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='attr\x00') ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffff) ptrace$getregset(0x4204, 0x0, 0xb, &(0x7f00000002c0)={&(0x7f0000000240)=""/112, 0x70}) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x818004, 0x0) setsockopt$bt_BT_SNDMTU(r4, 0x112, 0xc, &(0x7f0000000040)=0x7f, 0x100000141) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000500)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x944c833520a2d15f, @perf_config_ext={0x0, 0x80}, 0x8000000200000000, 0x800007f, 0x0, 0x3}, r5, 0x0, 0xffffffffffffffff, 0x0) r6 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r6, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) sendmsg$nl_netfilter(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x98, 0x1, 0xb, 0x800, 0x70bd2b, 0x25dfdbfc, {0xa, 0x0, 0x1}, [@typed={0x14, 0xd, @ipv6=@empty}, @typed={0x8, 0x6d, @ipv4=@multicast1}, @typed={0x68, 0xd, @binary="afc7bfee44ce7cb67816a8fb00c72dad0bd12abf6b5d0216defec28c5a2b375d3c2e5f417cf420a697b889392aa22f88089424804a3a5619ca8719925fd3a119be706ac2407ab5fad79788782dd59df2b6e40fa408242df758961c111f51b412ae"}]}, 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @loopback}, &(0x7f0000000640)=0xc) bind$can_raw(r7, &(0x7f0000000680)={0x1d, r8}, 0x10) fstat(r3, &(0x7f0000000ec0)) 04:02:06 executing program 0: dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f00000009c0)=@add_del={0x2, &(0x7f0000000000)='veth1\x00'}) r0 = socket$inet(0x2, 0x3, 0x2) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r0, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r2 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000007c0)={r4, 0x20}, 0x8) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000900)={{r6, r7/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r8, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r9 = dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_RES_CTX(r9, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000580)={r11, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000000300)={r10, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r5, 0x7) ioctl$BLKPG(r1, 0x932, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:02:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getresgid(&(0x7f0000000380), &(0x7f0000000400), &(0x7f0000000440)) socket$inet6(0xa, 0x0, 0x10000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200200, 0x0) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0), 0x2) getgid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = accept$netrom(r0, &(0x7f0000000980)={{}, [@netrom, @default, @remote, @null, @netrom, @bcast, @rose, @bcast]}, &(0x7f0000000b40)=0x59) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000a40)={'ip6erspan0\x00', {0x2, 0x4e24, @multicast2}}) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x8, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@fscache='fscache'}, {@cachetag={'cachetag', 0x3d, '/dev/dlm-control\x00'}}, {@access_client='access=client'}, {@debug={'debug', 0x3d, 0x1}}, {@posixacl='posixacl'}, {@afid={'afid', 0x3d, 0x9}}, {@msize={'msize', 0x3d, 0xe7d}}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x38, 0x38, 0x37, 0x63, 0x37, 0x32, 0x38], 0x2d, [0xd, 0x31, 0x37, 0x36], 0x2d, [0x63, 0x63, 0x31, 0x4], 0x2d, [0x30, 0x31, 0x30, 0x61], 0x2d, [0x37, 0x64, 0x65, 0x64, 0x37, 0x61, 0x62, 0x65]}}}, {@fsname={'fsname', 0x3d, '/dev/dlm-control\x00'}}, {@dont_measure='dont_measure'}]}}) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) setregid(0x0, 0x0) acct(&(0x7f0000000940)='./file0\x00') ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f00000000c0)={'HL\x00'}, &(0x7f0000000100)=0x1e) 04:02:06 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:02:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x7, 0x4, 0x9, 0x3f, 0x1c}, &(0x7f00000001c0)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000200)={0x2, 0x800, 0xa, 0xfffffffe, 0x0, 0x9, 0x1000, 0x8, r5}, 0x20) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000080)="66b829018ec0b9800000c00f3235002000000f3066baf80cb8c8f61a8eef66bafc0ced0f787e0036400fc75a00c4e1f9e601c4018575504f0f87d485a71b64440f01c43e662666470f38804185", 0x4d}], 0x1, 0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/load\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) r7 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r7, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) getsockname(r7, &(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000300)=0x80) setxattr$security_evm(0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYRES16], 0x1, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 04:02:07 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r0, 0x8941, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000240)='/dev/md0\x00', 0x0, 0x0) ioctl$void(r1, 0x5451) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) mkdir(&(0x7f00000005c0)='./file0\x00', 0x100000000020) r3 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x9d7b, 0xbd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x7) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x591800, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x7fff, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000007c0)={r5, 0x20}, 0x8) ioctl$BLKROTATIONAL(r4, 0x127e, &(0x7f0000000180)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)=0x0) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="53502b6bf1d72a98f66653b26992edc60f0ec285a0cf890738a89b93c47aec22b7b2b82f874e7d65c6fb06b50e2ba766592608e227b83658af319b60ac9c26a528e3d570e9d4574252f2047800862c15246733cd6f950f5b97cc0d9cf030f94a44a8c6c906f29ee8da3e2db712b257d6b73b3850fd59582901fde75d3ea71fd4df8e8e294a87992ea6eb85d9ce1b7356c9a5f71f2c154cc0f8431f02f7528124f0b5e67e0c9e8f32f9dd52b236cf1738cc7a76cb93ee61e3fae9889f7ee22330d73fe908fbc10782017ae683941c9acce85b14dae33b6b18292c8ccbe27fc67d97a0f360") clock_gettime(0x0, &(0x7f00000008c0)={0x0, 0x0}) write$input_event(r4, &(0x7f0000000900)={{r7, r8/1000+30000}, 0x16, 0x40, 0x2ee3a49b}, 0x18) r9 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r9, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r10 = dup2(0xffffffffffffffff, r2) ioctl$DRM_IOCTL_RES_CTX(r10, 0xc0106426, &(0x7f0000000b40)={0x1be283d4b1bf06c1, &(0x7f00000002c0)=[{0x0}, {}, {}, {}, {}, {}, {}]}) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000000600)=""/225, &(0x7f0000000700)=0xe1) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000500)={0x0, 0x6, 0x140a09e5, 0x1, 0x9, 0x3}, &(0x7f0000000540)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000580)={r12, 0x100}, 0xffffffffffffffe9) ioctl$DRM_IOCTL_GET_SAREA_CTX(r4, 0xc010641d, &(0x7f0000000300)={r11, &(0x7f0000000480)=""/112}) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000840)={0x2, &(0x7f0000000800)=[{}, {}]}) ioprio_set$pid(0x4, r6, 0x7) ioctl$BLKPG(r2, 0x932, 0x0) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f0000000880)={0x3, 0x10001, 0xe25d, 0x9, 0x1, 0x81}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000940)=0x10001, 0xe2f09ea3eaa78338) modify_ldt$read(0x0, &(0x7f0000000a80)=""/107, 0xffffff5d) 04:02:07 executing program 4: creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) 04:02:07 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x1c, r3, 0x233, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffb}]}, 0x1c}}, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/validatetrans\x00', 0x1, 0x0) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x60004c00}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000084}, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r6 = dup2(r5, r5) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x250}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x18, 0x12, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, {0x8, 0x1, r6}}}}]}, 0x38}}, 0x0) 04:02:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r3, 0x800454d2, 0x70f000) [ 479.364503] device bridge_slave_1 left promiscuous mode [ 479.372087] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.464304] device bridge_slave_0 left promiscuous mode [ 479.469929] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.492441] block nbd4: Attempted send on invalid socket [ 479.498192] print_req_error: 12 callbacks suppressed [ 479.498199] print_req_error: I/O error, dev nbd4, sector 64 [ 479.512896] block nbd4: Attempted send on invalid socket [ 479.518391] print_req_error: I/O error, dev nbd4, sector 256 [ 479.524607] UDF-fs: error (device nbd4): udf_read_tagged: read failed, block=256, location=256 [ 479.572098] block nbd4: Attempted send on invalid socket [ 479.577638] print_req_error: I/O error, dev nbd4, sector 512 [ 479.585892] UDF-fs: error (device nbd4): udf_read_tagged: read failed, block=512, location=512 [ 479.608625] ================================================================== [ 479.616246] BUG: KASAN: null-ptr-deref in kvm_write_guest_virt_system+0x64/0x90 [ 479.623700] Write of size 24 at addr (null) by task syz-executor.3/13147 [ 479.631400] [ 479.633028] CPU: 0 PID: 13147 Comm: syz-executor.3 Not tainted 4.14.146 #0 [ 479.634559] UDF-fs: warning (device nbd4): udf_load_vrs: No anchor found [ 479.640031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.640038] Call Trace: [ 479.640058] dump_stack+0x138/0x197 [ 479.640070] ? vprintk_func+0x65/0x159 [ 479.640088] ? kvm_write_guest_virt_system+0x64/0x90 [ 479.640103] kasan_report.cold+0x127/0x2af [ 479.662824] UDF-fs: Scanning with blocksize 512 failed [ 479.666329] check_memory_region+0x123/0x190 [ 479.666340] memset+0x24/0x40 [ 479.666355] kvm_write_guest_virt_system+0x64/0x90 [ 479.693440] handle_vmread+0x548/0x730 [ 479.697341] ? vmx_deliver_posted_interrupt+0x340/0x340 [ 479.702700] ? __lock_is_held+0xb6/0x140 [ 479.706747] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 479.712179] ? vmx_deliver_posted_interrupt+0x340/0x340 [ 479.717526] vmx_handle_exit+0x20d/0x1330 [ 479.721658] ? vcpu_enter_guest+0xd2d/0x5210 [ 479.726055] vcpu_enter_guest+0xf28/0x5210 [ 479.730278] ? emulator_read_emulated+0x50/0x50 [ 479.734927] ? lock_acquire+0x16f/0x430 [ 479.738885] ? kvm_check_async_pf_completion+0x2a9/0x410 [ 479.744320] kvm_arch_vcpu_ioctl_run+0x318/0x1000 [ 479.749143] ? kvm_arch_vcpu_ioctl_run+0x318/0x1000 [ 479.754148] kvm_vcpu_ioctl+0x401/0xd10 [ 479.758106] ? kvm_vcpu_block+0xbb0/0xbb0 [ 479.762237] ? trace_hardirqs_on+0x10/0x10 [ 479.766455] ? __might_fault+0x110/0x1d0 [ 479.770497] ? save_trace+0x290/0x290 [ 479.774277] ? __might_fault+0x110/0x1d0 [ 479.778320] ? __fget+0x210/0x370 [ 479.781757] ? find_held_lock+0x35/0x130 [ 479.785798] ? __fget+0x210/0x370 [ 479.789242] ? kvm_vcpu_block+0xbb0/0xbb0 [ 479.793373] do_vfs_ioctl+0x7ae/0x1060 [ 479.797261] ? selinux_file_mprotect+0x5d0/0x5d0 [ 479.801998] ? lock_downgrade+0x6e0/0x6e0 [ 479.806129] ? ioctl_preallocate+0x1c0/0x1c0 [ 479.810522] ? __fget+0x237/0x370 [ 479.813963] ? security_file_ioctl+0x89/0xb0 [ 479.818356] SyS_ioctl+0x8f/0xc0 [ 479.821702] ? do_vfs_ioctl+0x1060/0x1060 [ 479.825835] do_syscall_64+0x1e8/0x640 [ 479.829886] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 479.834723] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 479.839895] RIP: 0033:0x459a29 [ 479.843066] RSP: 002b:00007f4929580c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 479.850758] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 479.858014] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000007 [ 479.865263] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 479.872520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49295816d4 [ 479.879781] R13: 00000000004c2ddb R14: 00000000004d68f8 R15: 00000000ffffffff [ 479.887038] ================================================================== [ 479.894373] Disabling lock debugging due to kernel taint [ 479.973783] device hsr_slave_1 left promiscuous mode [ 480.012153] device hsr_slave_0 left promiscuous mode [ 480.052365] team0 (unregistering): Port device team_slave_1 removed [ 480.077159] team0 (unregistering): Port device team_slave_0 removed [ 480.116069] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 480.172349] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 480.239963] Kernel panic - not syncing: panic_on_warn set ... [ 480.239963] [ 480.240619] kobject: 'batman_adv' (ffff8880a90e4180): kobject_uevent_env [ 480.247367] CPU: 0 PID: 13147 Comm: syz-executor.3 Tainted: G B 4.14.146 #0 [ 480.262414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.271764] Call Trace: [ 480.274349] dump_stack+0x138/0x197 [ 480.277976] ? kvm_write_guest_virt_system+0x64/0x90 [ 480.283077] panic+0x1f2/0x426 [ 480.286259] ? add_taint.cold+0x16/0x16 [ 480.289968] kobject: 'batman_adv' (ffff8880a90e4180): kobject_uevent_env: filter function caused the event to drop! [ 480.290224] ? ___preempt_schedule+0x16/0x18 [ 480.290236] kasan_end_report+0x47/0x4f [ 480.290243] kasan_report.cold+0x130/0x2af [ 480.290252] check_memory_region+0x123/0x190 [ 480.290259] memset+0x24/0x40 [ 480.290270] kvm_write_guest_virt_system+0x64/0x90 [ 480.290280] handle_vmread+0x548/0x730 [ 480.290291] ? vmx_deliver_posted_interrupt+0x340/0x340 [ 480.335024] ? __lock_is_held+0xb6/0x140 [ 480.338025] kobject: 'batman_adv' (ffff8880a90e4180): kobject_cleanup, parent (null) [ 480.339079] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 480.339088] ? vmx_deliver_posted_interrupt+0x340/0x340 [ 480.339098] vmx_handle_exit+0x20d/0x1330 [ 480.362758] ? vcpu_enter_guest+0xd2d/0x5210 [ 480.367186] vcpu_enter_guest+0xf28/0x5210 [ 480.371424] ? emulator_read_emulated+0x50/0x50 [ 480.374639] kobject: 'batman_adv' (ffff8880a90e4180): calling ktype release [ 480.376085] ? lock_acquire+0x16f/0x430 [ 480.376095] ? kvm_check_async_pf_completion+0x2a9/0x410 [ 480.376110] kvm_arch_vcpu_ioctl_run+0x318/0x1000 [ 480.385979] kobject: (ffff8880a90e4180): dynamic_kobj_release [ 480.387165] ? kvm_arch_vcpu_ioctl_run+0x318/0x1000 [ 480.387180] kvm_vcpu_ioctl+0x401/0xd10 [ 480.393011] kobject: 'batman_adv': free name [ 480.397454] ? kvm_vcpu_block+0xbb0/0xbb0 [ 480.397465] ? trace_hardirqs_on+0x10/0x10 [ 480.397477] ? __might_fault+0x110/0x1d0 [ 480.405061] kobject: 'rx-0' (ffff88805c1e1f10): kobject_cleanup, parent ffff8880851d4948 [ 480.408356] ? save_trace+0x290/0x290 [ 480.408367] ? __might_fault+0x110/0x1d0 [ 480.408376] ? __fget+0x210/0x370 [ 480.412678] kobject: 'rx-0' (ffff88805c1e1f10): auto cleanup 'remove' event [ 480.416716] ? find_held_lock+0x35/0x130 [ 480.416725] ? __fget+0x210/0x370 [ 480.416737] ? kvm_vcpu_block+0xbb0/0xbb0 [ 480.422469] kobject: 'rx-0' (ffff88805c1e1f10): kobject_uevent_env [ 480.425092] do_vfs_ioctl+0x7ae/0x1060 [ 480.425102] ? selinux_file_mprotect+0x5d0/0x5d0 [ 480.425111] ? lock_downgrade+0x6e0/0x6e0 [ 480.429185] kobject: 'rx-0' (ffff88805c1e1f10): kobject_uevent_env: uevent_suppress caused the event to drop! [ 480.437358] ? ioctl_preallocate+0x1c0/0x1c0 [ 480.437367] ? __fget+0x237/0x370 [ 480.437380] ? security_file_ioctl+0x89/0xb0 [ 480.437388] SyS_ioctl+0x8f/0xc0 [ 480.437395] ? do_vfs_ioctl+0x1060/0x1060 [ 480.437404] do_syscall_64+0x1e8/0x640 [ 480.437413] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 480.443267] kobject: 'rx-0' (ffff88805c1e1f10): auto cleanup kobject_del [ 480.445236] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 480.445244] RIP: 0033:0x459a29 [ 480.448735] kobject: 'rx-0' (ffff88805c1e1f10): calling ktype release [ 480.455755] RSP: 002b:00007f4929580c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 480.455766] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 480.455770] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000007 [ 480.455774] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 480.455778] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f49295816d4 [ 480.455782] R13: 00000000004c2ddb R14: 00000000004d68f8 R15: 00000000ffffffff [ 480.457165] Kernel Offset: disabled [ 480.595494] Rebooting in 86400 seconds..