[   36.987035][   T26] audit: type=1800 audit(1550672220.419:26): pid=7511 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0
[   37.019632][   T26] audit: type=1800 audit(1550672220.429:27): pid=7511 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0
[   37.043640][   T26] audit: type=1800 audit(1550672220.429:28): pid=7511 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.
[   37.811332][   T26] audit: type=1800 audit(1550672221.279:29): pid=7511 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.173' (ECDSA) to the list of known hosts.
2019/02/20 14:17:11 fuzzer started
2019/02/20 14:17:13 dialing manager at 10.128.0.26:33245
2019/02/20 14:17:14 syscalls: 1
2019/02/20 14:17:14 code coverage: enabled
2019/02/20 14:17:14 comparison tracing: enabled
2019/02/20 14:17:14 extra coverage: extra coverage is not supported by the kernel
2019/02/20 14:17:14 setuid sandbox: enabled
2019/02/20 14:17:14 namespace sandbox: enabled
2019/02/20 14:17:14 Android sandbox: /sys/fs/selinux/policy does not exist
2019/02/20 14:17:14 fault injection: enabled
2019/02/20 14:17:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/02/20 14:17:14 net packet injection: enabled
2019/02/20 14:17:14 net device setup: enabled
14:19:52 executing program 0:

syzkaller login: [  209.138468][ T7678] IPVS: ftp: loaded support on port[0] = 21
14:19:52 executing program 1:

[  209.243552][ T7678] chnl_net:caif_netlink_parms(): no params data found
[  209.333147][ T7678] bridge0: port 1(bridge_slave_0) entered blocking state
[  209.356495][ T7678] bridge0: port 1(bridge_slave_0) entered disabled state
[  209.364836][ T7678] device bridge_slave_0 entered promiscuous mode
[  209.390495][ T7678] bridge0: port 2(bridge_slave_1) entered blocking state
[  209.398309][ T7678] bridge0: port 2(bridge_slave_1) entered disabled state
[  209.406370][ T7678] device bridge_slave_1 entered promiscuous mode
[  209.430427][ T7678] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  209.433446][ T7681] IPVS: ftp: loaded support on port[0] = 21
[  209.444921][ T7678] bond0: Enslaving bond_slave_1 as an active interface with an up link
14:19:53 executing program 2:

[  209.485585][ T7678] team0: Port device team_slave_0 added
[  209.500811][ T7678] team0: Port device team_slave_1 added
[  209.590458][ T7678] device hsr_slave_0 entered promiscuous mode
14:19:53 executing program 3:

[  209.716753][ T7678] device hsr_slave_1 entered promiscuous mode
[  209.804880][ T7683] IPVS: ftp: loaded support on port[0] = 21
[  209.823961][ T7685] IPVS: ftp: loaded support on port[0] = 21
[  209.874208][ T7678] bridge0: port 2(bridge_slave_1) entered blocking state
[  209.881451][ T7678] bridge0: port 2(bridge_slave_1) entered forwarding state
[  209.889159][ T7678] bridge0: port 1(bridge_slave_0) entered blocking state
[  209.896232][ T7678] bridge0: port 1(bridge_slave_0) entered forwarding state
[  209.942646][ T7681] chnl_net:caif_netlink_parms(): no params data found
14:19:53 executing program 4:

[  210.089674][ T7681] bridge0: port 1(bridge_slave_0) entered blocking state
[  210.105877][ T7681] bridge0: port 1(bridge_slave_0) entered disabled state
[  210.118517][ T7681] device bridge_slave_0 entered promiscuous mode
[  210.206073][ T7681] bridge0: port 2(bridge_slave_1) entered blocking state
[  210.215493][ T7681] bridge0: port 2(bridge_slave_1) entered disabled state
[  210.224371][ T7681] device bridge_slave_1 entered promiscuous mode
[  210.260605][ T7683] chnl_net:caif_netlink_parms(): no params data found
[  210.279599][ T7685] chnl_net:caif_netlink_parms(): no params data found
[  210.295332][ T3481] bridge0: port 1(bridge_slave_0) entered disabled state
[  210.305557][ T3481] bridge0: port 2(bridge_slave_1) entered disabled state
[  210.324173][ T7681] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  210.363584][ T7681] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  210.379675][ T7691] IPVS: ftp: loaded support on port[0] = 21
14:19:53 executing program 5:

[  210.431255][ T7678] 8021q: adding VLAN 0 to HW filter on device bond0
[  210.447158][ T7683] bridge0: port 1(bridge_slave_0) entered blocking state
[  210.454216][ T7683] bridge0: port 1(bridge_slave_0) entered disabled state
[  210.463487][ T7683] device bridge_slave_0 entered promiscuous mode
[  210.473369][ T7683] bridge0: port 2(bridge_slave_1) entered blocking state
[  210.480753][ T7683] bridge0: port 2(bridge_slave_1) entered disabled state
[  210.488715][ T7683] device bridge_slave_1 entered promiscuous mode
[  210.524432][ T7685] bridge0: port 1(bridge_slave_0) entered blocking state
[  210.531640][ T7685] bridge0: port 1(bridge_slave_0) entered disabled state
[  210.540125][ T7685] device bridge_slave_0 entered promiscuous mode
[  210.549672][ T7683] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  210.560360][ T7681] team0: Port device team_slave_0 added
[  210.579684][ T7685] bridge0: port 2(bridge_slave_1) entered blocking state
[  210.588836][ T7685] bridge0: port 2(bridge_slave_1) entered disabled state
[  210.596518][ T7685] device bridge_slave_1 entered promiscuous mode
[  210.607330][ T7683] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  210.622234][ T7681] team0: Port device team_slave_1 added
[  210.639835][ T7678] 8021q: adding VLAN 0 to HW filter on device team0
[  210.655229][ T7683] team0: Port device team_slave_0 added
[  210.674916][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  210.683905][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  210.693304][ T7683] team0: Port device team_slave_1 added
[  210.711347][ T7685] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  210.742388][ T7694] IPVS: ftp: loaded support on port[0] = 21
[  210.778213][ T7681] device hsr_slave_0 entered promiscuous mode
[  210.816600][ T7681] device hsr_slave_1 entered promiscuous mode
[  210.867993][ T7685] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  210.879301][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  210.887937][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  210.896137][    T5] bridge0: port 1(bridge_slave_0) entered blocking state
[  210.903231][    T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[  210.948166][ T7683] device hsr_slave_0 entered promiscuous mode
[  211.016673][ T7683] device hsr_slave_1 entered promiscuous mode
[  211.088970][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  211.097845][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  211.106481][   T22] bridge0: port 2(bridge_slave_1) entered blocking state
[  211.113515][   T22] bridge0: port 2(bridge_slave_1) entered forwarding state
[  211.121260][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  211.129669][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  211.160586][ T7685] team0: Port device team_slave_0 added
[  211.183840][ T7685] team0: Port device team_slave_1 added
[  211.197433][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  211.206098][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  211.216593][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  211.224923][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  211.233853][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  211.293279][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  211.301511][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  211.313527][ T7678] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  211.325043][ T7678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  211.379297][ T7685] device hsr_slave_0 entered promiscuous mode
[  211.418460][ T7685] device hsr_slave_1 entered promiscuous mode
[  211.467804][ T7691] chnl_net:caif_netlink_parms(): no params data found
[  211.477787][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  211.486123][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  211.505662][ T7678] 8021q: adding VLAN 0 to HW filter on device batadv0
[  211.611817][ T7691] bridge0: port 1(bridge_slave_0) entered blocking state
[  211.619372][ T7691] bridge0: port 1(bridge_slave_0) entered disabled state
[  211.627692][ T7691] device bridge_slave_0 entered promiscuous mode
[  211.642494][ T7691] bridge0: port 2(bridge_slave_1) entered blocking state
[  211.655177][ T7691] bridge0: port 2(bridge_slave_1) entered disabled state
14:19:55 executing program 0:
r0 = creat(&(0x7f0000001200)='./bus\x00', 0x0)
r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180))
ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000040)={0x0, 0xffffffff})

[  211.671638][ T7691] device bridge_slave_1 entered promiscuous mode
[  211.697264][   T26] kauditd_printk_skb: 1 callbacks suppressed
[  211.697284][   T26] audit: type=1804 audit(1550672395.159:31): pid=7700 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir857157847/syzkaller.lRFv9s/1/bus" dev="sda1" ino=16519 res=1
[  211.703308][   T26] audit: type=1804 audit(1550672395.169:32): pid=7700 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir857157847/syzkaller.lRFv9s/1/bus" dev="sda1" ino=16519 res=1
[  211.772691][   T26] audit: type=1804 audit(1550672395.229:33): pid=7701 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir857157847/syzkaller.lRFv9s/1/bus" dev="sda1" ino=16519 res=1
14:19:55 executing program 0:
ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0)

[  211.853420][ T7681] 8021q: adding VLAN 0 to HW filter on device bond0
[  211.872444][ T7694] chnl_net:caif_netlink_parms(): no params data found
[  211.892355][ T7683] 8021q: adding VLAN 0 to HW filter on device bond0
[  211.912395][ T7691] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  211.957357][ T7691] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  211.974099][ T7681] 8021q: adding VLAN 0 to HW filter on device team0
14:19:55 executing program 0:
ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0)

[  212.008478][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  212.018450][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  212.026303][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  212.034177][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  212.061187][ T7683] 8021q: adding VLAN 0 to HW filter on device team0
[  212.076576][    C0] hrtimer: interrupt took 34673 ns
[  212.105878][ T7685] 8021q: adding VLAN 0 to HW filter on device bond0
[  212.121111][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  212.147664][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  212.155912][    T5] bridge0: port 1(bridge_slave_0) entered blocking state
[  212.162987][    T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[  212.170531][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  212.179920][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  212.188296][    T5] bridge0: port 2(bridge_slave_1) entered blocking state
[  212.195330][    T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[  212.203143][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  212.211633][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  212.220197][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  212.228478][    T5] bridge0: port 1(bridge_slave_0) entered blocking state
[  212.235497][    T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[  212.243068][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  212.251506][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  212.259876][    T5] bridge0: port 2(bridge_slave_1) entered blocking state
[  212.266959][    T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[  212.274380][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  212.283538][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  212.291438][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  212.300514][ T7691] team0: Port device team_slave_0 added
[  212.306292][ T7694] bridge0: port 1(bridge_slave_0) entered blocking state
[  212.314027][ T7694] bridge0: port 1(bridge_slave_0) entered disabled state
[  212.322855][ T7694] device bridge_slave_0 entered promiscuous mode
[  212.330949][ T7694] bridge0: port 2(bridge_slave_1) entered blocking state
[  212.338245][ T7694] bridge0: port 2(bridge_slave_1) entered disabled state
[  212.346137][ T7694] device bridge_slave_1 entered promiscuous mode
[  212.383353][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  212.394356][ T7691] team0: Port device team_slave_1 added
[  212.417450][ T7694] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  212.434851][ T7685] 8021q: adding VLAN 0 to HW filter on device team0
14:19:55 executing program 0:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0)
close(r0)
preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffdf5, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0))
semget(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0)
ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4)

14:19:56 executing program 0:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x200, 0x4})

[  212.540017][ T7691] device hsr_slave_0 entered promiscuous mode
[  212.597059][ T7691] device hsr_slave_1 entered promiscuous mode
[  212.658933][ T7694] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  212.668805][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  212.677288][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  212.684932][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  212.693988][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  212.702462][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  212.710975][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  212.719881][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  212.728249][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  212.736746][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  212.744942][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  212.753430][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  212.761889][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  212.770426][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  212.778701][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  212.787108][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  212.796269][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
14:19:56 executing program 0:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='[proc\x00'}, 0x10)

[  212.804151][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  212.818446][ T7683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  212.843062][ T7693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  212.857759][ T7693] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  212.865983][ T7693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  212.874646][ T7693] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  212.883790][ T7693] bridge0: port 1(bridge_slave_0) entered blocking state
[  212.890905][ T7693] bridge0: port 1(bridge_slave_0) entered forwarding state
14:19:56 executing program 0:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0)
mount(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x100000, 0x0)
mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x3080, 0x0)
mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0)
mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0)
mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0)
umount2(&(0x7f0000000100)='./file0\x00', 0x0)

[  212.904618][ T7681] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  212.916106][ T7681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  212.940257][ T7693] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  212.954415][ T7693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  212.963275][ T7693] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  213.012324][ T7694] team0: Port device team_slave_0 added
[  213.025524][ T7683] 8021q: adding VLAN 0 to HW filter on device batadv0
[  213.036034][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  213.051528][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  213.063807][   T22] bridge0: port 2(bridge_slave_1) entered blocking state
[  213.070918][   T22] bridge0: port 2(bridge_slave_1) entered forwarding state
[  213.083517][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  213.092004][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  213.100877][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  213.109344][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  213.117905][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  213.126199][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  213.136163][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  213.153562][ T7681] 8021q: adding VLAN 0 to HW filter on device batadv0
[  213.162405][ T7694] team0: Port device team_slave_1 added
[  213.193565][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  213.216994][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  213.230614][ T7685] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  213.248467][ T7685] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  213.273081][ T7691] 8021q: adding VLAN 0 to HW filter on device bond0
[  213.281870][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  213.290644][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
14:19:56 executing program 1:
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000001b40)=ANY=[@ANYBLOB="001000000000000002004e21e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000600000002004e240000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21ac1414bf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000790000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac14141c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e21e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000034dc2cf70e000000000000000000000000000000000100000000000000d9bb74962dfaa7d5e3189d09b66bc74c73a2d98780b5c4aa7a48fb80792ef186fe5816f076af739da364a4df2cd64c7113f956f6737c42ab22f2a9d7b8a59f66256f0deb6204cd11b23dfcd97f2392bc05eb03511b59603d77661150010c6084298fdb2729759fb165b390fa89060afb0100000001000000461e2f5e1700915a028e2eba53743361123d10411a69a4eed333d00e92070919e65231a876553d7022f0b14b28412e16eee2d7291202f32fb7ee8ecbb87a82f92a36bbae69cf470a3e10f918453b2c335c8c6ff9ec45eafa08304bd1d679fcbef7134efa9ebe3178333116f1eb12386db5023654000000"], 0x1)

14:19:56 executing program 0:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8003, 0x0)
mprotect(&(0x7f0000e69000/0x4000)=nil, 0x4000, 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0)
ioctl$PIO_UNIMAP(r1, 0x4b67, 0x0)
getsockopt$netlink(r1, 0x10e, 0xa, &(0x7f00000001c0)=""/38, &(0x7f0000000200)=0x26)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'eql\x00', 0x43732e5398416f1a})
ioctl$TUNSETSNDBUF(r3, 0x800454dd, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
r4 = add_key$keyring(0x0, &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8)
ppoll(&(0x7f0000000240)=[{r0, 0x6b}, {r2, 0x10}, {r1, 0x40}], 0x3, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0x5}, 0x8)
keyctl$instantiate(0xc, r4, 0x0, 0x0, r4)
gettid()
r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xd0, r5, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xdb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x142460}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffff896b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8818752}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x81}, 0x40000)
write$UHID_INPUT2(r1, &(0x7f0000000700)={0xc, 0xe6, "fd12c9f47054647f429146490b0551a6a5fada1eb899f9d569e6c205affadbe08823084f393dcbcc8f62f3d370e9cae82de052ae60222e22b88b7f38d7d252b16eb8c78d9efe3c8743bd012778afb4dc1863dfd96f20e952104befe7980b678e6b66320bc51242657bbe385b66a62b5ababe7a706731bd2006d5cf5b3357c53f1605a6379c3693a1e763082f0d61835e8d3a12f173c9fc5db877980b6488b6502454bf41fcd854359b2aedf22319ca29c184328d896cb47afd3cdfec9f25c5a0b0477318fd578589389817bbbaf8442e1f7a52b8cdcc5b5cf3e72e74394fff0716ea30a1ac19"}, 0xec)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/208, 0xd0, <r6=>0x0}}, 0x10)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r6, 0x4)

[  213.362801][ T7694] device hsr_slave_0 entered promiscuous mode
[  213.406950][ T7694] device hsr_slave_1 entered promiscuous mode
[  213.475305][ T7691] 8021q: adding VLAN 0 to HW filter on device team0
[  213.485183][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  213.493609][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  213.517333][ T7685] 8021q: adding VLAN 0 to HW filter on device batadv0
[  213.558140][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  213.611814][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  213.623203][    T5] bridge0: port 1(bridge_slave_0) entered blocking state
[  213.630306][    T5] bridge0: port 1(bridge_slave_0) entered forwarding state
[  213.638949][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  213.647803][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  213.648139][    T5] bridge0: port 2(bridge_slave_1) entered blocking state
[  213.648177][    T5] bridge0: port 2(bridge_slave_1) entered forwarding state
[  213.648548][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  213.649238][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  213.665156][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  213.681374][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  213.697370][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  213.712316][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
14:19:57 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x14, 0x32, 0x829, 0x0, 0x0, {0x2801, 0x1000000}}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x0)

[  213.790131][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  213.805078][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  213.823170][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  213.831761][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  213.840029][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  213.848262][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  213.860158][ T7691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  213.907089][ T7691] 8021q: adding VLAN 0 to HW filter on device batadv0
[  213.939276][ T7694] 8021q: adding VLAN 0 to HW filter on device bond0
[  213.990082][ T7694] 8021q: adding VLAN 0 to HW filter on device team0
[  214.006245][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  214.017649][   T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
14:19:57 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8003, 0x0)
mprotect(&(0x7f0000e69000/0x4000)=nil, 0x4000, 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0)
ioctl$PIO_UNIMAP(r1, 0x4b67, 0x0)
ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000000c0))
getsockopt$netlink(r1, 0x10e, 0xa, &(0x7f00000001c0)=""/38, &(0x7f0000000200)=0x26)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'eql\x00', 0x43732e5398416f1a})
ioctl$TUNSETSNDBUF(r3, 0x800454dd, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
r4 = add_key$keyring(0x0, &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8)
ppoll(&(0x7f0000000240)=[{r0, 0x6b}, {r2, 0x10}, {r1, 0x40}], 0x3, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0x5}, 0x8)
keyctl$instantiate(0xc, r4, 0x0, 0x0, r4)
gettid()
r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xd0, r5, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xdb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x142460}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffff896b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8818752}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x81}, 0x40000)
write$UHID_INPUT2(r1, &(0x7f0000000700)={0xc, 0xe6, "fd12c9f47054647f429146490b0551a6a5fada1eb899f9d569e6c205affadbe08823084f393dcbcc8f62f3d370e9cae82de052ae60222e22b88b7f38d7d252b16eb8c78d9efe3c8743bd012778afb4dc1863dfd96f20e952104befe7980b678e6b66320bc51242657bbe385b66a62b5ababe7a706731bd2006d5cf5b3357c53f1605a6379c3693a1e763082f0d61835e8d3a12f173c9fc5db877980b6488b6502454bf41fcd854359b2aedf22319ca29c184328d896cb47afd3cdfec9f25c5a0b0477318fd578589389817bbbaf8442e1f7a52b8cdcc5b5cf3e72e74394fff0716ea30a1ac19"}, 0xec)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/208, 0xd0, <r6=>0x0}}, 0x10)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r6, 0x4)

[  214.083118][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  214.092258][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  214.117853][ T2987] bridge0: port 1(bridge_slave_0) entered blocking state
[  214.124944][ T2987] bridge0: port 1(bridge_slave_0) entered forwarding state
[  214.136787][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  214.145348][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  214.154013][ T2987] bridge0: port 2(bridge_slave_1) entered blocking state
[  214.161112][ T2987] bridge0: port 2(bridge_slave_1) entered forwarding state
[  214.169635][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  214.178752][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  214.188216][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  214.188897][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  214.206812][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  214.214646][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  214.238002][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  214.247525][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  214.269899][ T7694] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  214.281816][ T7694] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  214.294982][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  214.303908][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  214.312877][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  214.313425][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  214.313948][ T2987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  214.352879][ T7694] 8021q: adding VLAN 0 to HW filter on device batadv0
14:19:58 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup3(r1, r1, 0x80000)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x208)
r3 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f00000007c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$setperm(0x5, r3, 0x0)
rmdir(&(0x7f0000000040)='./bus\x00')
ioctl(0xffffffffffffffff, 0x8912, &(0x7f00000002c0)="5c01000000000000060000")
creat(&(0x7f0000000600)='./bus\x00', 0x200000000020004)
rmdir(&(0x7f0000000000)='./bus\x00')
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8034, 0xffffffffffffffff, 0x0)
r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7')
keyctl$search(0xa, r3, &(0x7f0000000200)='trusted\x00', &(0x7f0000000300)={'syz', 0x0}, r3)
splice(r0, &(0x7f0000000100), r1, &(0x7f0000000280), 0x0, 0x8)
sendfile(r4, r4, &(0x7f00000000c0)=0x202, 0xdd)
socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, &(0x7f0000000080))

14:19:58 executing program 2:
r0 = socket$inet(0x10, 0x3, 0x0)
ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0)
sendmsg(0xffffffffffffffff, 0x0, 0x0)
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0)
sendto$inet(r0, 0x0, 0x2b7, 0x0, 0x0, 0x0)

14:19:58 executing program 1:
keyctl$unlink(0x9, 0x0, 0x0)
syz_extract_tcp_res(&(0x7f0000000080), 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80)
r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0)
ftruncate(r0, 0x2)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x802, 0x0)
sendfile(r1, r0, 0x0, 0x40800fff)
readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc)
ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000180))
perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x4, 0x0, 0xacc, 0x0, 0x6df, 0x48501, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x10004}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0)
write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0)
ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, &(0x7f0000000300)={0x0, @broadcast})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xa}, 0xc, 0x0}, 0x44000)

14:19:58 executing program 0:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8003, 0x0)
mprotect(&(0x7f0000e69000/0x4000)=nil, 0x4000, 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0)
ioctl$PIO_UNIMAP(r1, 0x4b67, 0x0)
getsockopt$netlink(r1, 0x10e, 0xa, &(0x7f00000001c0)=""/38, &(0x7f0000000200)=0x26)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'eql\x00', 0x43732e5398416f1a})
ioctl$TUNSETSNDBUF(r3, 0x800454dd, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
r4 = add_key$keyring(0x0, &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8)
ppoll(&(0x7f0000000240)=[{r0, 0x6b}, {r2, 0x10}, {r1, 0x40}], 0x3, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0x5}, 0x8)
keyctl$instantiate(0xc, r4, 0x0, 0x0, r4)
gettid()
r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xd0, r5, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xdb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x142460}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffff896b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8818752}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x81}, 0x40000)
write$UHID_INPUT2(r1, &(0x7f0000000700)={0xc, 0xe6, "fd12c9f47054647f429146490b0551a6a5fada1eb899f9d569e6c205affadbe08823084f393dcbcc8f62f3d370e9cae82de052ae60222e22b88b7f38d7d252b16eb8c78d9efe3c8743bd012778afb4dc1863dfd96f20e952104befe7980b678e6b66320bc51242657bbe385b66a62b5ababe7a706731bd2006d5cf5b3357c53f1605a6379c3693a1e763082f0d61835e8d3a12f173c9fc5db877980b6488b6502454bf41fcd854359b2aedf22319ca29c184328d896cb47afd3cdfec9f25c5a0b0477318fd578589389817bbbaf8442e1f7a52b8cdcc5b5cf3e72e74394fff0716ea30a1ac19"}, 0xec)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/208, 0xd0, <r6=>0x0}}, 0x10)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r6, 0x4)

14:19:58 executing program 3:
r0 = gettid()
setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0)
r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
ioctl$sock_SIOCOUTQNSD(r1, 0x894b, 0x0)
ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0)
pipe(0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0)
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write$P9_RFLUSH(0xffffffffffffffff, 0x0, 0x38d)
openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0)
tkill(r0, 0x15)

14:19:58 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0)
r1 = dup2(r0, r0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
syz_execute_func(&(0x7f0000000280)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f")
setsockopt$inet_mreq(r1, 0x0, 0x23, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0)

14:19:58 executing program 3:
r0 = socket$unix(0x1, 0x1, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0)
r1 = dup(r0)
fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
r2 = gettid()
getresgid(0x0, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0)
write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0)
fstat(0xffffffffffffffff, 0x0)
setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0)
symlink(0x0, 0x0)
timer_create(0x0, &(0x7f0000000100)={0x0, 0x10000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
mount$9p_xen(0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0)
getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0)
request_key(0x0, 0x0, 0x0, 0xffffffffffffffff)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, 0x0)
keyctl$setperm(0x5, 0x0, 0x0)
syz_open_procfs$namespace(0x0, 0x0)
tkill(r2, 0x1000000000016)

14:19:58 executing program 4:
r0 = gettid()
setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0)
pipe(0x0)
write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0)
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0)
timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0)
semget$private(0x0, 0x0, 0x0)
semctl$GETALL(0x0, 0x0, 0xd, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(0x0, 0x0)
write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0)
openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0)
tkill(r0, 0x15)

14:19:58 executing program 2:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getpriority(0x2, 0x0)

14:19:58 executing program 1:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x1, 0x200000000002, 0x20000000000001, 0x1, 0x0}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000010c0)={r0, &(0x7f0000000000), 0x0}, 0x20)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0x10)

14:19:58 executing program 0:
socket$nl_xfrm(0x10, 0x3, 0x6)
r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff)
write$P9_RLERROR(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="122e8773664f83aefdc6cd63ae0c1eb87130fb0d810266dc9df8706a0e315b2998b40b8fb65821"], 0x27)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2000000000000029, &(0x7f0000000040), 0x1c8d28f06197b0a4)
pipe(&(0x7f0000000140)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
write(r3, &(0x7f00000001c0), 0xfffffef3)
read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3)
getpeername$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x2c9)
inotify_init1(0x807ff)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net\x00', 0x200002, 0x0)
r5 = openat$cgroup_ro(r4, &(0x7f0000000580)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0)
write$binfmt_script(r5, &(0x7f00000001c0)=ANY=[], 0xfffffffffffffea5)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r5, 0x0, 0x0}, 0x10)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0)
r6 = creat(0x0, 0x0)
mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r5, 0x0)
r7 = getpid()
ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0)
ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000100))
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06055c8, 0x0)
bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={0x0, 0x0, 0xb}, 0x10)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0)
write$P9_RFLUSH(r5, &(0x7f0000000680)={0x7}, 0x7)
execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0/file0\x00', &(0x7f0000000640), 0x0, 0x0)
sched_getscheduler(r7)
socket$inet6_tcp(0xa, 0x1, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="b6b4152b9feb01001800000000000000540000006c00000001000000872c3c6bede4e081bdca30cef7fa3f0f41bedad40c9ada83e43689f39c853318801af05b94034d38db97fe87bea7a65765ef0bc251c1b9d2e8da03055721eebb7746a41ec3e0d4e3cf05dbd5b2d36783f515f700005be384e688bbe705b0d1d4a53bf833c1307a9ad77fda3ce925d03be248891860effa121dccb8cae90bec357dae89a284c0e848d7e9ebf4aebfef90892a24f48770401409898080fc95f582fd45679a0859f62f83f645d099228d006fafe68030be539ae252e146f690c5d284c533b4"], 0x0, 0xe0}, 0x20)

14:19:58 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
lsetxattr(&(0x7f0000fc0000)='./file1\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="757365722eb6"], 0x0, 0x0, 0x0)

14:19:58 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c)
sendto$inet6(r0, &(0x7f0000000300)="f80fbd5da1b3c0f09d3d94815745711bc76fe5db01b2fc2212e65d8952d0e6c6a78d9f733c0b2e6e682851541ccb5deb7457e151cc1b5b5f36b48923af79e3e31d74d21dc9276ec6f239daf8840b23b84d41ef4054d550e46cfccfc13cb3a98b0115acdeb9a444078b26402b41c98ab137b29323385056b60a526b3761a836df03793a0d70bc210cdffb72830619e25a176e9093cd2f7638c729ff1729c356aa239337240d338a81f3518edc86ef1b5c6cd42d1cb29af9759c30b7c23ffae4fecf251357f1393e3a0323f95bd74bbf0ef60ffaf5f145b6f799b8b78adeefd3fdd5e5c640aeef43a440e9ff23509a446d6fa8496d4d073d1b98352d9ad48c32cc08b80ddf39dd47ed07b16dc93e526db098de8a840c9c65cbdbae98c40da0ef48e76429d4a74a2b228bfba5ed2eaf754154621255f65595ffaa2d79c49efd77849986e5dc12189002f11145da3d56c1ce8cac370b43b3cee8e8071c44f54f94f17368586f53dbaf3be6e5aba47cccac708235c3d6f75e18d397fd167aee63522153e59d14fc28996fae0c2ee0a6c582146530547829808681f6f631ece598d63118a08a4550534ac8ad228c05182eb2fee2a304b6d27db943307578e78c68b2b3889abf3158ec7fd4603aa7a6b601769724e669c4a3dc74afaeba1ed37b00ec985b1553e3452de574312e12114412bbefa695ac9d613fe505421f835f8c3a17aa04f20be028c321f176205f7da29dd81393125e99b68832a2", 0x218, 0x8000, 0x0, 0x0)
close(r0)

14:19:58 executing program 1:
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x5e, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00')
preadv(r0, &(0x7f0000000700), 0x31f, 0x0)

14:19:58 executing program 3:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f00000004c0))

14:19:58 executing program 2:
r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0)
ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {}]})
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040))
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7)
ioctl(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000080)='./file0\x00', 0x0)
ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000100))
mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0)
r1 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x1, 0x0)
ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, 0x0)
arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xa6)
umount2(&(0x7f00000001c0)='./file0\x00', 0x0)
ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$PPPIOCDISCONN(r1, 0x7439)
openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
socketpair$unix(0x1, 0x4, 0x0, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
connect$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x200003}, 0x10)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
ioctl$VHOST_GET_FEATURES(0xffffffffffffffff, 0xc0044dff, 0x0)

14:19:58 executing program 4:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_pid(r0, &(0x7f0000000040), 0xfcc9)
ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0)

14:19:58 executing program 1:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
socket$inet_tcp(0x2, 0x1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00)
write$cgroup_int(r3, &(0x7f0000000200), 0x44000)

14:19:58 executing program 5:
r0 = socket$unix(0x1, 0x5, 0x0)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000200))

14:19:58 executing program 3:
r0 = socket$inet6(0xa, 0x40000080806, 0x0)
bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c)
listen(r0, 0x20002)
r1 = socket$inet6(0xa, 0x6, 0x0)
connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r2 = accept4(r0, 0x0, 0x0, 0x0)
setsockopt$inet6_opts(r2, 0x29, 0x37, 0x0, 0x0)
connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80)

14:19:58 executing program 4:
perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000040), 0x8)
listen(r0, 0x0)

14:19:58 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000001200)='./bus\x00', 0x1)
ftruncate(r0, 0x8003f1)
r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180))
ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000040)={0x0, 0xffffffff})

[  215.513491][   T26] audit: type=1804 audit(1550672398.979:34): pid=7851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir158067245/syzkaller.DlrGFY/4/bus" dev="sda1" ino=16539 res=1
14:19:59 executing program 0:
r0 = socket$packet(0x11, 0x2, 0x300)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a})
socket$nl_route(0x10, 0x3, 0x0)
dup2(r0, r1)

14:19:59 executing program 2:
r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = dup2(r0, r0)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, "c1ddbaa0c5a7b1756b03ff9b0616c5f658b83a0d37108f86367d899c7f6393c6392a16ff88db0fe16025c6634c0d962c65b84be303ae44635577d21b9b496289", "850f4b7485b227f19b525ac58bbe82b228da6894369f3283114ed1f2a468d8f62038913ef32c3adcfe4acf3336569e860cdcf93e2ada9f4210e51c10dcbf9382", "264069693dccc3021798334e46c2656dcbbb0800"})

14:19:59 executing program 3:
r0 = socket$unix(0x1, 0x1, 0x0)
write$P9_RLINK(0xffffffffffffffff, 0x0, 0x279)
socket$unix(0x1, 0x0, 0x0)
pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0)
listen(0xffffffffffffffff, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, 0x0)
getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, 0x0, 0x0)
munlockall()
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0)
write$nbd(r0, 0x0, 0x0)

14:19:59 executing program 4:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000000))
r1 = gettid()
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000))
tkill(r1, 0x800040000000015)
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0)
tkill(r1, 0x1000000000016)

14:19:59 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet(0x2, 0x4000000000000001, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
close(r0)
r1 = socket$rxrpc(0x21, 0x2, 0xa)
bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x24)
io_setup(0x8, &(0x7f0000000100)=<r2=>0x0)
io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x2000000, 0x0, 0x0, 0x8, 0x0, r0, 0x0}])

14:19:59 executing program 2:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
clock_settime(0x0, 0x0)

[  215.880568][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  215.887420][    C0] protocol 88fb is buggy, dev hsr_slave_1
14:19:59 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/if_inet6\x00')
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070")
preadv(r0, &(0x7f00000014c0)=[{&(0x7f0000000280)=""/197, 0xc5}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x2, 0x0)

14:19:59 executing program 1:
r0 = socket$inet(0x10, 0x2, 0x0)
sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="23000000240007041dfffd946f610500070000001f000000004c0000f1ffffff0400ff", 0x23}], 0x1}, 0x0)

14:19:59 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070")
r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0)
write$tun(r1, &(0x7f0000000400)=ANY=[@ANYRES16], 0x1)
perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

14:19:59 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet(0x2, 0x4000000000000001, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
close(r0)
r1 = socket$rxrpc(0x21, 0x2, 0xa)
bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x24)
io_setup(0x8, &(0x7f0000000100)=<r2=>0x0)
io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x2000000, 0x0, 0x0, 0x8, 0x0, r0, 0x0}])

14:19:59 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet(0x2, 0x4000000000000001, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
close(r0)
r1 = socket$rxrpc(0x21, 0x2, 0xa)
bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x24)
io_setup(0x8, &(0x7f0000000100)=<r2=>0x0)
io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x2000000, 0x0, 0x0, 0x8, 0x0, r0, 0x0}])

[  216.225457][   T26] audit: type=1804 audit(1550672399.689:35): pid=7856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir158067245/syzkaller.DlrGFY/4/bus" dev="sda1" ino=16539 res=1
14:19:59 executing program 5:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0)

14:19:59 executing program 2:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00\x87\xec\x80\xa4\xb5.\x17\'\x8c\x97\xcd]K\xd01@\xea\x82\xb4x\xe9\xceNC\xe4\xd6\xf1\x89\x8bIY\xbbE\xaf\xb9\x8a\x12e\x1c\xc7;\x00\xb2\xfc\xff\x03\xfb\x19\xb7\xf3\xf1\xf333\xed\x05#4\x98\xfc>_\x98\x7f\x86%\xf7\x8e\x8a\x13@\xd7\xd3#\x98\xec>\xae\x1e];\x10\xea\x93\xff\xb0\xfe\xd1\xcfU\xce\x17\xbb\xc7\x92h\x1cb\r}r\x03\f\xbe\x10Nzj\x15l\xe3\x17\xab\x8b\x8fnX\xb1DT\xa9\xf7\xfd\x17{R2P\xa55\x94R\x92;y\x8e\xe8', 0x200002, 0x0)
fchdir(r1)
mkdir(&(0x7f00000000c0)='./control\x00', 0x0)
r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./control\x00', 0x0, 0x0)
mkdirat(r2, &(0x7f0000000300)='./file0\x00', 0x0)
r3 = open(&(0x7f00000001c0)='./control\x00', 0x0, 0x0)
unlinkat(r3, &(0x7f0000000180)='./file0\x00', 0x200)

14:19:59 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0)
r1 = dup(r0)
r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0)
read(r1, &(0x7f0000000900)=""/4096, 0x1000)
ftruncate(r2, 0x80080)
sendfile(r1, r2, 0x0, 0x2008000bfbffffd)

14:19:59 executing program 2:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
r2 = socket$packet(0x11, 0x800000000002, 0x300)
connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10)
setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
sendto$inet(r1, &(0x7f0000762fff), 0x0, 0x0, 0x0, 0x0)

[  216.512561][ T7908] EXT4-fs (sda1): re-mounted. Opts: 
14:20:00 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0)
r1 = dup(r0)
r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0)
read(r1, &(0x7f0000000900)=""/4096, 0x1000)
ftruncate(r2, 0x80080)
sendfile(r1, r2, 0x0, 0x2008000bfbffffd)

14:20:00 executing program 1:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)

14:20:00 executing program 3:
pipe(0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0)
r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@timestamp, @sack_perm], 0x2)
ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000180))
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0)
syz_open_dev$sndpcmp(0x0, 0x3, 0x40)
pipe(&(0x7f0000000100)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
ioctl$KDGKBSENT(r3, 0x4b48, 0x0)
syz_open_pts(r1, 0x0)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080))
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, &(0x7f0000000280))
getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, &(0x7f00000003c0))
write(r1, &(0x7f0000c34fff), 0xffffff0b)
mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0)
ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0x80044dff, &(0x7f0000000380)={{&(0x7f0000ffb000/0x1000)=nil, 0x1000}})

14:20:00 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0)
r1 = dup(r0)
r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0)
read(r1, &(0x7f0000000900)=""/4096, 0x1000)
ftruncate(r2, 0x80080)
sendfile(r1, r2, 0x0, 0x2008000bfbffffd)

14:20:00 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0)
r1 = dup(r0)
r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0)
read(r1, &(0x7f0000000900)=""/4096, 0x1000)
ftruncate(r2, 0x80080)
sendfile(r1, r2, 0x0, 0x2008000bfbffffd)

14:20:00 executing program 5:
openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000001c0), 0x2)
getpgid(0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000200)=[@window], 0x1)
prctl$PR_SET_ENDIAN(0x14, 0x0)
bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0)
accept$unix(r1, 0x0, 0x0)

[  216.718981][ T7928] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details.
14:20:00 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc"}, 0x60)
sendmsg$nfc_llcp(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "fb498276c053b0d89b1ecb6e0a92091395bc26686d5c829800ba7a34af33b4e50c8f2b48a79d6a141bcbccd0cc3512197674212247d7939c0c8b04293b3e17"}, 0x60, 0x0, 0x0, &(0x7f00000002c0)={0x60, 0x11f, 0x8000, "f18468430484409348931cf1a51dad174553a05618aa843b7f5f3d625de8c39b19f62864274f7bb2335c280f82a2fcee109cec4232921a7d1510e2dd3e1382ce9d9b9fbe89cd5a3db5c29a74c8e5ed"}, 0x60, 0x1}, 0x0)

14:20:00 executing program 5:
openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f00000001c0), 0x2)
getpgid(0x0)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000200)=[@window], 0x1)
prctl$PR_SET_ENDIAN(0x14, 0x0)
bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0)
accept$unix(r1, 0x0, 0x0)

14:20:00 executing program 5:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000040), 0x8)
listen(r0, 0x0)

14:20:00 executing program 2:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@allocspi={0xf8, 0x16, 0x311, 0x0, 0x0, {{{@in, @in=@broadcast}, {@in6=@local, 0x0, 0x6c}, @in6}}}, 0xf8}, 0x8}, 0x0)

14:20:00 executing program 4:
r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0)
close(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600))
sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0)

14:20:00 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0)
r1 = dup(r0)
r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0)
read(r1, &(0x7f0000000900)=""/4096, 0x1000)
ftruncate(r2, 0x80080)
sendfile(r1, r2, 0x0, 0x2008000bfbffffd)

14:20:00 executing program 1:
r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = dup2(r0, r0)
ioctl$LOOP_SET_STATUS64(r2, 0x4c02, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c1ddbaa0c5a7b1756b03ff9b0616c5f658b83a0d37108f86367d899c7f6393c6392a16ff88db0fe16025c6634c0d962c65b84be303ae44635577d21b9b496289", "850f4b7485b227f19b525ac58bbe82b228da6894369f3283114ed1f2a468d8f62038913ef32c3adcfe4acf3336569e860cdcf93e2ada9f4210e51c10dcbf9382", "264069693dccc3021798334e46c2656dcbbb0800"})

14:20:00 executing program 5:
recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}, {0x0}], 0x2}}], 0x1, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='status\x00')
preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0)

14:20:01 executing program 3:
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x8a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000000200)={0x20, {{0xa, 0x4e22, 0x3, @empty}}, {{0xa, 0x4e22, 0x0, @mcast1, 0xdb2c}}}, 0x108)
bind$inet6(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='memory.stat\x00', 0x0, 0x0)
ioctl$KDSKBLED(r0, 0x4b65, 0x0)
perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x80)
setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c)
r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x200000, 0x0)
write(r2, &(0x7f0000000380), 0xfffffffe)
recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c)
ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x0, 0x0, 0x10000})
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'lo\x00'})
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x3, 0x10}, 0xc)
accept4(r1, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000180)={'hsr0\x00', {0x2, 0x4e23, @loopback}})

14:20:01 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8003, 0x0)
mprotect(&(0x7f0000e69000/0x4000)=nil, 0x4000, 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0)
ioctl$PIO_UNIMAP(r1, 0x4b67, 0x0)
ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000000c0))
getsockopt$netlink(r1, 0x10e, 0xa, &(0x7f00000001c0)=""/38, &(0x7f0000000200)=0x26)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'eql\x00', 0x43732e5398416f1a})
ioctl$TUNSETSNDBUF(r3, 0x800454dd, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
r4 = add_key$keyring(0x0, &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8)
ppoll(&(0x7f0000000240)=[{r0, 0x6b}, {r2, 0x10}, {r1, 0x40}], 0x3, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0x5}, 0x8)
keyctl$instantiate(0xc, r4, 0x0, 0x0, r4)
gettid()
r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xd0, r5, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xdb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x142460}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffff896b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8818752}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x81}, 0x40000)
write$UHID_INPUT2(r1, &(0x7f0000000700)={0xc, 0xe6, "fd12c9f47054647f429146490b0551a6a5fada1eb899f9d569e6c205affadbe08823084f393dcbcc8f62f3d370e9cae82de052ae60222e22b88b7f38d7d252b16eb8c78d9efe3c8743bd012778afb4dc1863dfd96f20e952104befe7980b678e6b66320bc51242657bbe385b66a62b5ababe7a706731bd2006d5cf5b3357c53f1605a6379c3693a1e763082f0d61835e8d3a12f173c9fc5db877980b6488b6502454bf41fcd854359b2aedf22319ca29c184328d896cb47afd3cdfec9f25c5a0b0477318fd578589389817bbbaf8442e1f7a52b8cdcc5b5cf3e72e74394fff0716ea30a1ac19"}, 0xec)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/208, 0xd0}}, 0x10)

14:20:01 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070")
socketpair(0xa, 0x3, 0xff, 0x0)

14:20:01 executing program 1:
r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5)
write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x100000289)
r1 = gettid()
syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0)
r2 = socket$nl_crypto(0x10, 0x3, 0x15)
r3 = fcntl$dupfd(r0, 0x0, r2)
timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340))
clock_gettime(0x0, &(0x7f0000000500))
timer_settime(0x0, 0x0, 0x0, 0x0)
syz_execute_func(&(0x7f0000000280)="64ff0941c3c4e2c9975842c48249aeabdd000000c4c27d794e0066420fe2e33e0f1110d3196f")
tkill(r1, 0x401004000000016)
ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000180)={0x0, 0x7a7, 0x5, 0x97, 0x8, 0x8})

14:20:01 executing program 5:
clone(0x400000200, 0x0, 0x0, 0x0, 0x0)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0)
read(r0, &(0x7f0000000540)=""/11, 0x485)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200))
r1 = creat(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109)
dup2(r0, r1)
execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0)
open$dir(0x0, 0x0, 0x0)
clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000300)='./file1/file0\x00', 0x0, 0x0)
ioctl$EVIOCGID(r1, 0x80084502, 0x0)

14:20:01 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0)
r1 = dup(r0)
r2 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0)
read(r1, &(0x7f0000000900)=""/4096, 0x1000)
ftruncate(r2, 0x80080)
sendfile(r1, r2, 0x0, 0x2008000bfbffffd)

14:20:01 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0af51f023c123f3188a070")
bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="7a0af8ff75257009bfa100000000000007010000f8ffffffb702000005000000bf130000000000008500000006000000b700000000000000950000ff00000000"], 0x0}, 0x48)

14:20:01 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ptmx\x00', 0x0, 0x0)
pipe(&(0x7f00000004c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
write(r2, &(0x7f0000000340), 0x41395527)
syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000340))
pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
dup3(0xffffffffffffffff, r0, 0x80000)

14:20:01 executing program 0:
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x10, 0x3, 0x9)
sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="240000000a0607031dfffd946fa28300", 0x10}], 0x1}, 0x0)

14:20:01 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8003, 0x0)
mprotect(&(0x7f0000e69000/0x4000)=nil, 0x4000, 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0)
ioctl$PIO_UNIMAP(r1, 0x4b67, 0x0)
ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000000c0))
getsockopt$netlink(r1, 0x10e, 0xa, &(0x7f00000001c0)=""/38, &(0x7f0000000200)=0x26)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'eql\x00', 0x43732e5398416f1a})
ioctl$TUNSETSNDBUF(r3, 0x800454dd, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
r4 = add_key$keyring(0x0, &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8)
ppoll(&(0x7f0000000240)=[{r0, 0x6b}, {r2, 0x10}, {r1, 0x40}], 0x3, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0x5}, 0x8)
keyctl$instantiate(0xc, r4, 0x0, 0x0, r4)
gettid()
r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xd0, r5, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xdb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x142460}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffff896b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8818752}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x81}, 0x40000)
write$UHID_INPUT2(r1, &(0x7f0000000700)={0xc, 0xe6, "fd12c9f47054647f429146490b0551a6a5fada1eb899f9d569e6c205affadbe08823084f393dcbcc8f62f3d370e9cae82de052ae60222e22b88b7f38d7d252b16eb8c78d9efe3c8743bd012778afb4dc1863dfd96f20e952104befe7980b678e6b66320bc51242657bbe385b66a62b5ababe7a706731bd2006d5cf5b3357c53f1605a6379c3693a1e763082f0d61835e8d3a12f173c9fc5db877980b6488b6502454bf41fcd854359b2aedf22319ca29c184328d896cb47afd3cdfec9f25c5a0b0477318fd578589389817bbbaf8442e1f7a52b8cdcc5b5cf3e72e74394fff0716ea30a1ac19"}, 0xec)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/208, 0xd0}}, 0x10)

14:20:01 executing program 0:
syz_execute_func(&(0x7f00000001c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f")
clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
socket(0x0, 0x0, 0x0)
io_setup(0x4, &(0x7f0000000040)=<r1=>0x0)
io_submit(r1, 0x1, &(0x7f0000001200)=[&(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000001c0)='h', 0x1}])

14:20:01 executing program 0:
r0 = add_key(&(0x7f0000000040)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000000)="96", 0x1, 0xfffffffffffffffb)
keyctl$unlink(0x9, r0, r0)
syz_extract_tcp_res(&(0x7f0000000080), 0x0, 0x0)
getuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80)
r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0)
ftruncate(r1, 0x2)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x802, 0x0)
sendfile(r2, r1, 0x0, 0x40800fff)
readv(r2, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc)
ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000180)=0x7fffffff)
perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x7fffffff, 0x0, 0x0, 0xacc, 0x0, 0x6df, 0x48501, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='net/fib_trie\x00')
ioctl$EVIOCSABS0(r1, 0x401845c0, 0x0)
write$P9_ROPEN(r1, &(0x7f0000000380)={0x18, 0x71, 0x0, {{0x2, 0x0, 0x5}, 0xb0f1}}, 0x18)
ioctl$sock_bt_bnep_BNEPCONNDEL(0xffffffffffffffff, 0x400442c9, &(0x7f0000000300)={0x0, @broadcast})
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00')
sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xa}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)={0x6c, r3, 0x0, 0x70bd27, 0x0, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x6c}}, 0x0)

14:20:02 executing program 3:
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x8a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000000200)={0x20, {{0xa, 0x4e22, 0x3, @empty}}, {{0xa, 0x4e22, 0x0, @mcast1, 0xdb2c}}}, 0x108)
bind$inet6(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='memory.stat\x00', 0x0, 0x0)
ioctl$KDSKBLED(r0, 0x4b65, 0x0)
perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x80)
setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c)
r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x200000, 0x0)
write(r2, &(0x7f0000000380), 0xfffffffe)
recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c)
ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x0, 0x0, 0x10000})
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'lo\x00'})
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x3, 0x10}, 0xc)
accept4(r1, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000180)={'hsr0\x00', {0x2, 0x4e23, @loopback}})

14:20:02 executing program 4:
r0 = socket$inet6(0xa, 0x3, 0x7)
recvmmsg(r0, &(0x7f0000005280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f0000000180)=0x2, 0x4)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c)
sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0)

14:20:02 executing program 2:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8003, 0x0)
mprotect(&(0x7f0000e69000/0x4000)=nil, 0x4000, 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0)
ioctl$PIO_UNIMAP(r1, 0x4b67, 0x0)
ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000000c0))
getsockopt$netlink(r1, 0x10e, 0xa, &(0x7f00000001c0)=""/38, &(0x7f0000000200)=0x26)
ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0)
r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'eql\x00', 0x43732e5398416f1a})
ioctl$TUNSETSNDBUF(r3, 0x800454dd, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
r4 = add_key$keyring(0x0, &(0x7f00000006c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8)
ppoll(&(0x7f0000000240)=[{r0, 0x6b}, {r2, 0x10}, {r1, 0x40}], 0x3, &(0x7f0000000280)={0x77359400}, &(0x7f00000002c0)={0x5}, 0x8)
keyctl$instantiate(0xc, r4, 0x0, 0x0, r4)
gettid()
r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xd0, r5, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xdb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x142460}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffff896b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8818752}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x81}, 0x40000)
write$UHID_INPUT2(r1, &(0x7f0000000700)={0xc, 0xe6, "fd12c9f47054647f429146490b0551a6a5fada1eb899f9d569e6c205affadbe08823084f393dcbcc8f62f3d370e9cae82de052ae60222e22b88b7f38d7d252b16eb8c78d9efe3c8743bd012778afb4dc1863dfd96f20e952104befe7980b678e6b66320bc51242657bbe385b66a62b5ababe7a706731bd2006d5cf5b3357c53f1605a6379c3693a1e763082f0d61835e8d3a12f173c9fc5db877980b6488b6502454bf41fcd854359b2aedf22319ca29c184328d896cb47afd3cdfec9f25c5a0b0477318fd578589389817bbbaf8442e1f7a52b8cdcc5b5cf3e72e74394fff0716ea30a1ac19"}, 0xec)
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000300)=""/208, 0xd0}}, 0x10)

14:20:04 executing program 1:
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x3, 0x2)
getsockopt$inet_opts(r0, 0x0, 0x9, 0x0, &(0x7f0000000140))

14:20:04 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
r1 = socket$packet(0x11, 0x3, 0x300)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
r3 = socket$nl_route(0x10, 0x3, 0x0)
pread64(r2, &(0x7f0000000200)=""/39, 0x24c, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)
dup2(r1, r2)

14:20:04 executing program 5:
r0 = socket$pppoe(0x18, 0x1, 0x0)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ptmx\x00', 0x0, 0x0)
pipe(&(0x7f00000004c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
write(r2, &(0x7f0000000340), 0x41395527)
syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000340))
pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
dup3(0xffffffffffffffff, r0, 0x80000)

14:20:04 executing program 2:
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, 0x0)
sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4}, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x8a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000000200)={0x20, {{0xa, 0x4e22, 0x3, @empty}}, {{0xa, 0x4e22, 0x0, @mcast1, 0xdb2c}}}, 0x108)
bind$inet6(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='memory.stat\x00', 0x0, 0x0)
ioctl$KDSKBLED(r0, 0x4b65, 0x0)
perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c)
listen(r1, 0x80)
setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c)
r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x200000, 0x0)
write(r2, &(0x7f0000000380), 0xfffffffe)
recvfrom$inet6(r2, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c)
ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x0, 0x0, 0x10000})
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'lo\x00'})
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0x0, 0x3, 0x10}, 0xc)
accept4(r1, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000180)={'hsr0\x00', {0x2, 0x4e23, @loopback}})

14:20:04 executing program 4:
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}], 0x1}}], 0x1, 0x0, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x10009)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='status\x00')
preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0)
getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, &(0x7f0000000000))
sched_setaffinity(0x0, 0x10000004e, 0x0)
write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0)
ioctl$DRM_IOCTL_AGP_INFO(0xffffffffffffffff, 0x80386433, &(0x7f0000000140)=""/214)

14:20:04 executing program 3:
r0 = gettid()
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$int_in(r1, 0x5452, &(0x7f0000fc3000)=0x1)
fcntl$setsig(r1, 0xa, 0x12)
poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xfffffffffffffff8)
pipe(&(0x7f0000eb0ff8)={<r3=>0xffffffffffffffff})
r4 = gettid()
socketpair$unix(0x1, 0x5, 0x0, &(0x7f000087fff8)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
ioctl$int_in(r5, 0x5452, &(0x7f0000008ff8)=0x3f)
fcntl$setsig(r5, 0xa, 0x12)
fcntl$setownex(r5, 0xf, &(0x7f0000704000)={0x0, r4})
recvmsg(r6, &(0x7f000095cfc8)={0x0, 0x0, 0x0}, 0x0)
dup2(r3, r6)
r7 = gettid()
tkill(r7, 0x16)
r8 = dup2(r1, r2)
fcntl$setown(r8, 0x8, r0)
tkill(r4, 0x16)

[  220.917039][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  220.923428][    C0] protocol 88fb is buggy, dev hsr_slave_1
14:20:04 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
r1 = dup2(r0, r0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet_mreq(r1, 0x0, 0x23, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0)

[  220.969248][ T8086] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  220.977993][ T8086] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
14:20:04 executing program 4:
socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup3(r1, r0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
r3 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$sock_int(r3, 0x1, 0x4000000000000002, &(0x7f00000002c0)=0x29e8, 0x4)
bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
sendto$inet6(r3, 0x0, 0x0, 0xfffffefffffffffa, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)

[  221.072226][ T8086] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check.
[  221.170278][ T8109] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
14:20:04 executing program 1:
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(&(0x7f0000000080)=@md0='/dev/md0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='gfs2meta\x00', 0x0, 0x0)

14:20:04 executing program 4:
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x20000, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = getpgrp(0xffffffffffffffff)
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}, {0x0}, {0x0}], 0x3}}, {{&(0x7f0000001040)=@isdn, 0x80, 0x0}}], 0x2, 0x0, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x10009)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='status\x00')
preadv(r2, &(0x7f0000000480), 0x1000000000000237, 0x0)
getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000380)=""/134, &(0x7f0000000000)=0x86)
sched_setaffinity(r1, 0x10000004e, 0x0)
ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x1)
pipe2(0x0, 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001500)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x7ff, 0x0, 0x2, 0x400, 0x3, 0x3e, 0x45f, 0x22d, 0x38, 0x143, 0x0, 0x7, 0x20, 0x1, 0x8, 0x3f, 0x9}, [{0x70000007, 0x98e9, 0xec, 0x6, 0x6, 0x3aa4ca8b, 0x7fffffff, 0x8d}, {0x6474e557, 0x9fe, 0x80, 0x0, 0x1, 0x7, 0x8, 0x20}], "8ce0d1db71eb02a1d60c9eb8ee1d315cacb0dddd7b6cee71f32d886f4b5f7749ecb219eafe5dc3b792d54d74f701e0d531dd57bb36dd7be68666beb26ee4d70470e74644494672b28543efa678e8891b6905b40c244a8a9a20f1a3ea07e66ee95574d57dec01a823ab9dcc7553461d0ffb000bdcf8badfa6d52bba008da37b52915c1220a0796fe5a2998dc2e4348531160127c4b17fd55f8dee71a778c68f12be397d9c2dd1e7", [[], [], [], [], [], []]}, 0x71f)
ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000140)=""/214)
sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{&(0x7f0000000040)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)="c3727626e788492426dbe8a9a75669bfc9b4b196e0732766ef0527a03432523bc6f0e2213c7ed4335851a1b67d127014fede886f28f19703273f746a4f5519fbd07d2cdc0a8fce0e67563bffc0813860d87b998ca0911c424cf2a3880dad9c7e6dcb7cd6b1a02c44ca360eda0a7b8864ecf9f17896618e962d57deab967c115076ca20035e2565028ab7122318b8508d0fc107fbf393567dd739b1df20be91b9f20956c8633eacb8e8b6", 0xaa}], 0x1}, 0x9}], 0x1, 0x0)

[  221.556940][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  221.563188][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  221.582846][ T8115] gfs2: gfs2 mount does not exist
[  221.612692][ T8092] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  221.620899][ T8117] gfs2: gfs2 mount does not exist
[  221.636480][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  221.642275][    C0] protocol 88fb is buggy, dev hsr_slave_1
14:20:05 executing program 1:
r0 = socket$inet6(0xa, 0x40000080806, 0x0)
bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c)
listen(r0, 0x20002)
r1 = socket$inet6(0xa, 0x6, 0x0)
connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r2 = accept4(r0, 0x0, 0x0, 0x0)
setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000002e02c3bb6e0faf3238385cf5b0015200000000282db8351a56d7070dd6dccb21a3ef52743ff2f5e9eb8b59e20ba6f04006492914b29bdb03112c06762df132f8fc18019c05b83ead12e8e4675353d73cc13f23c4b26ff3c4ffbf43dc7596fd33cf3931fced046777153889776dafeed7ba3a28d16d9fb4d41d794aad08875c226a278c69a149a6fe81102245df71e67ba3717336c652a5af8192e388"], 0x1)
connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80)
dup3(r2, r1, 0x0)

14:20:05 executing program 5:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
r1 = dup2(r0, r0)
setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, 0x0, 0x0)

[  221.697163][ T8092] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check.
14:20:05 executing program 2:
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fstat(0xffffffffffffffff, 0x0)
shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x586d}, 0x0, 0x3, 0x7fff})

14:20:05 executing program 0:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0)
ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0)
close(r0)
preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffdf5, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0))
ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0)
setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @dev}}, 0x5c)

14:20:05 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = dup2(r0, r0)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "c1ddbaa0c5a7b1756b03ff9b0616c5f658b83a0d37108f86367d899c7f6393c6392a16ff88db0fe16025c6634c0d962c65b84be303ae44635577d21b9b496289", "850f4b7485b227f19b525ac58bbe82b228da6894369f3283114ed1f2a468d8f62038913ef32c3adcfe4acf3336569e860cdcf93e2ada9f4210e51c10dcbf9382", "264069693dccc3021798334e46c2656dcbbb0800"})

14:20:05 executing program 1:
request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz'}, 0x0, 0xffffffffffffffff)

14:20:05 executing program 4:
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x20000, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = getpgrp(0xffffffffffffffff)
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}, {0x0}, {0x0}], 0x3}}, {{&(0x7f0000001040)=@isdn, 0x80, 0x0}}], 0x2, 0x0, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x10009)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='status\x00')
preadv(r2, &(0x7f0000000480), 0x1000000000000237, 0x0)
getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000380)=""/134, &(0x7f0000000000)=0x86)
sched_setaffinity(r1, 0x10000004e, 0x0)
ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x1)
pipe2(0x0, 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001500)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x7ff, 0x0, 0x2, 0x400, 0x3, 0x3e, 0x45f, 0x22d, 0x38, 0x143, 0x0, 0x7, 0x20, 0x1, 0x8, 0x3f, 0x9}, [{0x70000007, 0x98e9, 0xec, 0x6, 0x6, 0x3aa4ca8b, 0x7fffffff, 0x8d}, {0x6474e557, 0x9fe, 0x80, 0x0, 0x1, 0x7, 0x8, 0x20}], "8ce0d1db71eb02a1d60c9eb8ee1d315cacb0dddd7b6cee71f32d886f4b5f7749ecb219eafe5dc3b792d54d74f701e0d531dd57bb36dd7be68666beb26ee4d70470e74644494672b28543efa678e8891b6905b40c244a8a9a20f1a3ea07e66ee95574d57dec01a823ab9dcc7553461d0ffb000bdcf8badfa6d52bba008da37b52915c1220a0796fe5a2998dc2e4348531160127c4b17fd55f8dee71a778c68f12be397d9c2dd1e7", [[], [], [], [], [], []]}, 0x71f)
ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000140)=""/214)
sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{&(0x7f0000000040)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)="c3727626e788492426dbe8a9a75669bfc9b4b196e0732766ef0527a03432523bc6f0e2213c7ed4335851a1b67d127014fede886f28f19703273f746a4f5519fbd07d2cdc0a8fce0e67563bffc0813860d87b998ca0911c424cf2a3880dad9c7e6dcb7cd6b1a02c44ca360eda0a7b8864ecf9f17896618e962d57deab967c115076ca20035e2565028ab7122318b8508d0fc107fbf393567dd739b1df20be91b9f20956c8633eacb8e8b6", 0xaa}], 0x1}, 0x9}], 0x1, 0x0)

14:20:07 executing program 3:

14:20:07 executing program 2:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0)
read(r0, &(0x7f0000000300)=""/11, 0xb)
getpgid(0xffffffffffffffff)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200))
unlink(&(0x7f00000002c0)='./file0\x00')
pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff})
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0)
r3 = dup3(r2, r1, 0x0)
r4 = fcntl$dupfd(r0, 0x0, r0)
r5 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151)
connect$inet6(r5, &(0x7f0000000440), 0x1c)
r6 = dup2(r5, r3)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000440), 0x131f64)
clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, 0xfffffffffffffffe, 0x0)
ioctl$TUNSETVNETLE(r4, 0x400454dc, 0x0)

14:20:07 executing program 1:

14:20:07 executing program 0:

14:20:07 executing program 5:
r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = dup2(r0, r0)
ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "c1ddbaa0c5a7b1756b03ff9b0616c5f658b83a0d37108f86367d899c7f6393c6392a16ff88db0fe16025c6634c0d962c65b84be303ae44635577d21b9b496289", "850f4b7485b227f19b525ac58bbe82b228da6894369f3283114ed1f2a468d8f62038913ef32c3adcfe4acf3336569e860cdcf93e2ada9f4210e51c10dcbf9382", "264069693dccc3021798334e46c2656dcbbb0800"})

14:20:07 executing program 4:

14:20:07 executing program 4:

14:20:07 executing program 0:

14:20:07 executing program 5:

14:20:07 executing program 1:

14:20:07 executing program 3:

14:20:07 executing program 0:

14:20:07 executing program 4:

14:20:07 executing program 1:

14:20:07 executing program 5:

14:20:07 executing program 3:

14:20:07 executing program 0:

14:20:07 executing program 2:

14:20:07 executing program 4:

14:20:07 executing program 4:

14:20:07 executing program 0:

14:20:07 executing program 3:

14:20:07 executing program 1:

14:20:07 executing program 5:

14:20:07 executing program 2:

14:20:07 executing program 4:

14:20:07 executing program 5:

14:20:07 executing program 0:

14:20:07 executing program 3:

14:20:07 executing program 1:

14:20:08 executing program 5:

14:20:08 executing program 2:

14:20:08 executing program 3:

14:20:08 executing program 4:

14:20:08 executing program 0:

14:20:08 executing program 1:

14:20:08 executing program 5:

14:20:08 executing program 2:

14:20:08 executing program 0:

14:20:08 executing program 3:

14:20:08 executing program 4:

14:20:08 executing program 1:

14:20:08 executing program 0:

14:20:08 executing program 3:

14:20:08 executing program 5:

14:20:08 executing program 4:

14:20:08 executing program 2:

14:20:08 executing program 5:

14:20:08 executing program 3:

14:20:08 executing program 1:

14:20:08 executing program 0:

14:20:08 executing program 4:

14:20:08 executing program 2:

14:20:08 executing program 5:

14:20:08 executing program 3:

14:20:08 executing program 1:

14:20:08 executing program 4:

14:20:08 executing program 0:

14:20:08 executing program 5:

14:20:08 executing program 1:

14:20:08 executing program 3:

14:20:08 executing program 2:

14:20:09 executing program 4:

14:20:09 executing program 5:

14:20:09 executing program 0:

14:20:09 executing program 1:

14:20:09 executing program 2:

14:20:09 executing program 3:

14:20:09 executing program 5:

14:20:09 executing program 4:

14:20:09 executing program 0:

14:20:09 executing program 1:

14:20:09 executing program 3:

14:20:09 executing program 2:

14:20:09 executing program 4:

14:20:09 executing program 5:

14:20:09 executing program 0:

14:20:09 executing program 1:

14:20:09 executing program 3:

14:20:09 executing program 2:

14:20:09 executing program 5:

14:20:09 executing program 4:

14:20:09 executing program 0:

14:20:09 executing program 2:

14:20:09 executing program 3:

14:20:09 executing program 5:

14:20:09 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup3(r0, r0, 0x80000)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x208)
r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7')
sendfile(r2, r2, &(0x7f00000000c0)=0x202, 0xdd)

14:20:09 executing program 4:

14:20:09 executing program 0:

14:20:09 executing program 2:

14:20:09 executing program 5:

14:20:09 executing program 3:

14:20:09 executing program 1:
r0 = eventfd(0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/rt6_stats\x00')
sendfile(r0, r1, 0x0, 0xffffffff)
sendfile(r0, r1, 0x0, 0x4)

14:20:09 executing program 4:
r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000140)='oom_score\x00')
sendfile(r0, r1, 0x0, 0x4)

14:20:09 executing program 0:
r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0)
r2 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2)
r3 = dup2(r2, r1)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'})
openat$cgroup_subtree(r0, &(0x7f0000000480)='cgroup.subtree_control\x00', 0x2, 0x0)
msgget(0x1, 0x240)
stat(&(0x7f0000000180)='./bus\x00', &(0x7f0000000380))
getresgid(&(0x7f0000000540), &(0x7f0000000580), 0x0)
lstat(0x0, &(0x7f0000000640))
ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"})
write$sndseq(r1, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {0x6}, {}, @addr}], 0xffffffbd)
r4 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00\x9c\xcd\xbf:\xa4\xe1\x99+\xfa\xbam\x9f+\x88\x06\xb9\x03\x03\xfff\x15cZ\x9ak\x06`\x01\x18{\xa9FqK\ro\xd0\x92\xd7\xe8\xbf\r\x99\x94Z7??\x01\xa5\xc9J\x90\xa7\xa7\x04\xe9\xde\xb9\xb4(\x9e\x81\x81\x02\xbb\xf22\xc3\xd3\xfe\xdf\x8a\x1e\xa2g\xc5\"Z\xd6\v\xd0\x8ef\x15\xc1\x89\xe56r\xec\xf3\x9e%\xf5\x8d\xb3\xe7\x97a\xb6Uk\xa5\x97\xf3\x06\x01\x97B\xfe\xfe\x81s\xbdY')
creat(&(0x7f0000000140)='./bus\x00', 0x20000)
keyctl$clear(0x7, 0x0)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000200)={<r5=>0x0, 0x4}, &(0x7f00000002c0)=0x8)
io_setup(0x1, 0x0)
setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8)
add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000017c0)={r5, 0x5}, &(0x7f0000001800)=0x8)
ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000))
r6 = socket$inet(0x2, 0x806, 0x0)
setsockopt$inet_opts(r6, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5)
ioctl$EVIOCGNAME(r4, 0x80404506, &(0x7f0000000400)=""/50)
connect$inet(r6, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10)

14:20:09 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc1f023c123f3188a070")
munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000)

14:20:09 executing program 3:
add_key(0x0, 0x0, &(0x7f0000000000), 0x0, 0xfffffffffffffffb)
getuid()
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80)
r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0)
ftruncate(r0, 0x2)
r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x802, 0x0)
sendfile(r1, r0, 0x0, 0x40800fff)
readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc)
ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0)
perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x7fffffff, 0x0, 0x0, 0xacc, 0x0, 0x0, 0x48501, 0x0, 0x0, 0x8, 0x0, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_ROPEN(r0, &(0x7f0000000380)={0x18, 0x71, 0x2, {{0x2}, 0xb0f1}}, 0x18)
socket$inet_tcp(0x2, 0x1, 0x0)

14:20:10 executing program 2:
perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c61, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x8000, 0x0, 0x0, 0x0, 0x0)
shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x7000)

14:20:10 executing program 5:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(0x0, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getpgid(0xffffffffffffffff)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
restart_syscall()
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:10 executing program 1:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:10 executing program 4:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x10, 0x3, 0x0)
sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0)
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0))
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1c6}, 0x1, 0x0, 0x0, 0x84}, 0x0)

14:20:10 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={<r0=>0xffffffffffffffff})
close(r0)
openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0)
close(r0)

14:20:10 executing program 4:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0))
r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7')
sendfile(r0, r0, &(0x7f00000000c0)=0x202, 0xdd)

14:20:10 executing program 2:
r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x4, 0x0, &(0x7f0000000700)="2ba063fb"})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0x0, 0x0, 0x0})

14:20:10 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xe, 0x4, 0x4, 0x7fff}, 0x2c)
bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000c88000)={r1, &(0x7f0000000180), 0x0}, 0x18)

[  227.146428][ T8396] binder: 8394:8396 ioctl c018620b 0 returned -14
14:20:10 executing program 3:
open(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = eventfd(0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00')
sendfile(r0, r1, 0x0, 0xffffffff)

[  227.192949][ T8398] binder: 8394:8398 transaction failed 29189/-22, size 24-8 line 2994
[  227.243587][ T8396] binder: 8394:8396 BC_INCREFS_DONE u0000000000000000 no match
[  227.301260][ T8398] binder: 8394:8398 ioctl c018620b 0 returned -14
[  227.354184][ T8410] binder: 8394:8410 BC_INCREFS_DONE u0000000000000000 no match
[  227.375903][ T8409] binder: 8394:8409 transaction failed 29189/-22, size 24-8 line 2994
14:20:11 executing program 0:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]})
add_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb)

14:20:11 executing program 4:
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000961fe4), 0x0)
getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f000095dffc))
getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0)
ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000004c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x14, 0x0, 0x0, 0x1ac, 0x0, 0x2, 0x0, 0x5]}})
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10)
openat$dsp(0xffffffffffffff9c, 0x0, 0x20200, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000640)=ANY=[@ANYBLOB="400000003200000427bd7000fcdbdf250008ff010c000200000000000000000014000100100009543bd0e6637613e100000000000c0002000000000001000000f2d71abbf1cc"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x0)
sendto$inet(r1, &(0x7f0000000080), 0x0, 0x20000801, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10)
sendto$inet(r1, &(0x7f0000000000), 0x0, 0xc0, 0x0, 0x0)
getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @dev}, &(0x7f0000000380)=0xc)
recvfrom(0xffffffffffffffff, &(0x7f0000000180)=""/255, 0xff, 0x20, &(0x7f0000000280)=@nl=@kern={0x10, 0x0, 0x0, 0x200200}, 0x80)

14:20:11 executing program 1:
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x20000, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = getpgrp(0xffffffffffffffff)
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}, {0x0}, {0x0}], 0x3}}, {{&(0x7f0000001040)=@isdn, 0x80, 0x0}}], 0x2, 0x0, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x10009)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='status\x00')
preadv(r2, &(0x7f0000000480), 0x1000000000000237, 0x0)
sched_setaffinity(r1, 0x10000004e, 0x0)
ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x1)
pipe2(0x0, 0x0)
write$P9_RSTATFS(0xffffffffffffffff, 0x0, 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001500)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x7ff, 0x401, 0x2, 0x400, 0x0, 0x3e, 0x45f, 0x22d, 0x38, 0x143, 0x0, 0x7, 0x20, 0x1, 0x8, 0x3f, 0x9}, [{0x70000007, 0x98e9, 0xec, 0x6, 0x6, 0x3aa4ca8b, 0x7fffffff, 0x8d}], "8ce0d1db71eb02a1d60c9eb8ee1d315cacb0dddd7b6cee71f32d886f4b5f7749ecb219eafe5dc3b792d54d74f701e0d531dd57bb36dd7be68666beb26ee4d70470e74644494672b28543efa678e8891b6905b40c244a8a9a20f1a3ea07e66ee95574d57dec01a823ab9dcc7553461d0ffb000bdcf8badfa6d52bba008da37b52915c1220a0796fe5a2998dc2e4348531160127c4b17fd55f8dee71a778c68f12be39", [[], [], [], [], [], []]}, 0x6fa)
ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000140)=""/214)
sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{&(0x7f0000000040)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)="c3727626e788492426dbe8a9a75669bfc9b4b196e0732766ef0527a03432523bc6f0e2213c7ed4335851a1b67d127014fede886f28f19703273f746a4f5519fbd07d2cdc0a8fce0e67563bffc0813860d87b998ca0911c424cf2a3880dad9c7e6dcb7cd6b1a02c44ca360eda0a7b8864ecf9f17896618e962d57deab967c115076ca20035e2565028ab7122318b8508d0fc107fbf393567dd739b1df20be91b9f20956c8633eacb8e8b6", 0xaa}], 0x1}, 0x9}], 0x1, 0x0)

14:20:11 executing program 2:
seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]})
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)

14:20:11 executing program 5:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(0x0, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getpgid(0xffffffffffffffff)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
restart_syscall()
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:11 executing program 4:
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0)
ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, 0x0)
close(r0)
preadv(0xffffffffffffffff, 0x0, 0xfffffffffffffdf5, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0))
setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0)
ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0)
setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e21, 0x7e96, @remote, 0x10000000}, {0xa, 0x4e22, 0x1, @ipv4={[], [], @multicast2}, 0x81}, 0x9a3, [0x0, 0x2008000000000000, 0x3f, 0x10000, 0x8, 0x28c569fe, 0x7f, 0xe]}, 0x5c)

14:20:11 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = open(&(0x7f0000000480)='./bus\x00', 0x141042, 0x0)
write$FUSE_DIRENT(r1, &(0x7f0000000000)={0x10}, 0x10)

[  227.741024][ T8427] BUG: assuming atomic context at kernel/seccomp.c:271
[  227.750054][   T26] audit: type=1326 audit(1550672411.219:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8425 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000
[  227.773498][ T8427] in_atomic(): 0, irqs_disabled(): 0, pid: 8427, name: syz-executor.0
[  227.819645][ T8427] no locks held by syz-executor.0/8427.
[  227.843031][ T8427] CPU: 1 PID: 8427 Comm: syz-executor.0 Not tainted 5.0.0-rc7-next-20190220 #39
[  227.852060][ T8427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  227.862117][ T8427] Call Trace:
[  227.865418][ T8427]  dump_stack+0x172/0x1f0
[  227.869762][ T8427]  __cant_sleep.cold+0xa3/0xbb
[  227.874538][ T8427]  __seccomp_filter+0x12b/0x12b0
[  227.879491][ T8427]  ? seccomp_notify_release+0x280/0x280
[  227.885046][ T8427]  ? kasan_check_write+0x14/0x20
[  227.889993][ T8427]  ? _raw_spin_unlock_irq+0x28/0x90
[  227.895186][ T8427]  ? do_seccomp+0xa5a/0x2250
[  227.899775][ T8427]  ? _raw_spin_unlock_irq+0x28/0x90
[  227.904973][ T8427]  ? lockdep_hardirqs_on+0x418/0x5d0
[  227.910263][ T8427]  ? trace_hardirqs_on+0x67/0x230
[  227.915282][ T8427]  ? kasan_check_read+0x11/0x20
[  227.920133][ T8427]  ? _raw_spin_unlock_irq+0x5e/0x90
[  227.925327][ T8427]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  227.931563][ T8427]  ? do_seccomp+0x389/0x2250
[  227.936152][ T8427]  __secure_computing+0x101/0x360
[  227.941204][ T8427]  syscall_trace_enter+0x5bf/0xe10
[  227.946323][ T8427]  ? trace_event_raw_event_sys_exit+0x290/0x290
[  227.952566][ T8427]  ? lockdep_hardirqs_on+0x418/0x5d0
[  227.957851][ T8427]  ? trace_hardirqs_on+0x67/0x230
[  227.962877][ T8427]  do_syscall_64+0x479/0x610
[  227.967468][ T8427]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  227.973351][ T8427] RIP: 0033:0x45ac8a
[  227.977245][ T8427] Code: 25 18 00 00 00 00 74 01 f0 48 0f b1 3d df ba 5f 00 48 39 c2 75 da f3 c3 0f 1f 84 00 00 00 00 00 48 63 ff b8 e4 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 f3 c3 0f 1f 40 00 48 c7 c2 d4 ff ff ff f7
[  227.996842][ T8427] RSP: 002b:00007f948b92ec58 EFLAGS: 00000246 ORIG_RAX: 00000000000000e4
[  228.005254][ T8427] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045ac8a
[  228.013221][ T8427] RDX: 000000000003ffff RSI: 00007f948b92ec60 RDI: 0000000000000001
[  228.021189][ T8427] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  228.029149][ T8427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  228.037118][ T8427] R13: 00000000004c4cd5 R14: 00000000004d8890 R15: 00000000ffffffff
14:20:11 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

[  228.057438][   T26] audit: type=1326 audit(1550672411.529:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8422 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000
14:20:11 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:11 executing program 3:
creat(&(0x7f0000000400)='./file0\x00', 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='./file1\x00')

14:20:11 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x1, &(0x7f0000007dc0))
setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000040)=0x1, 0x4)
sendmmsg(r0, &(0x7f0000002580)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000400)=@sco, 0x359, &(0x7f0000000a80), 0x26c, &(0x7f0000000c40)}}], 0x4000000000002f0, 0x0)

14:20:11 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

[  228.374694][   T26] audit: type=1326 audit(1550672411.839:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8422 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000
14:20:11 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r2, 0x0, 0x400000000000906)
sendfile(r0, r2, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

14:20:11 executing program 0:
r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x20000, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getpgrp(0xffffffffffffffff)
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)
recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000240)=""/62, 0x3e}, {0x0}, {0x0}], 0x3}}, {{&(0x7f0000001040)=@isdn, 0x80, 0x0}}], 0x2, 0x0, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x10009)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='status\x00')
preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0)
getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000380)=""/134, &(0x7f0000000000)=0x86)
ioctl$int_in(r1, 0x5452, &(0x7f0000000300)=0x1)
write$P9_RSTATFS(r1, 0x0, 0x0)
write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001500)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x7ff, 0x401, 0x2, 0x400, 0x0, 0x3e, 0x45f, 0x22d, 0x38, 0x143, 0x0, 0x7, 0x20, 0x1, 0x0, 0x3f, 0x9}, [{0x70000007, 0x98e9, 0xec, 0x6, 0x6, 0x3aa4ca8b, 0x7fffffff, 0x8d}], "8ce0d1db71eb02a1d60c9eb8ee1d315cacb0dddd7b6cee71f32d886f4b5f7749ecb219eafe5dc3b792d54d74f701e0d531dd57bb36dd7be68666beb26ee4d70470e74644494672b28543efa678e8891b6905b40c244a8a9a20f1a3ea07e66ee95574d57dec01a823ab9dcc7553461d0ffb000bdcf8badfa6d52bba008da37b52915c1220a0796fe5a2998dc2e4348531160127c4b17fd55f8dee71a778c68f12be397d9c2dd1e7", [[], [], [], [], []]}, 0x5ff)
ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000140)=""/214)
sendmmsg(0xffffffffffffffff, &(0x7f00000014c0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="c3727626e788492426dbe8a9a75669bfc9b4b196e0732766ef0527a03432523bc6f0e2213c7ed4335851a1b67d127014fede886f28f19703273f746a4f5519fbd07d2cdc0a8fce0e67563bffc0813860d87b998ca0911c424cf2a3880dad9c7e6dcb7cd6b1a02c44ca360eda0a7b8864ecf9f17896618e962d57deab967c115076ca20035e2565028ab7122318b8508d0fc107fbf393567dd739b1df20be91b9f20956c8633eacb8e8b6", 0xaa}], 0x1}}], 0x1, 0x0)

14:20:11 executing program 5:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(0x0, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getpgid(0xffffffffffffffff)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
restart_syscall()
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  228.453432][   T26] audit: type=1326 audit(1550672411.919:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8425 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000
14:20:12 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:12 executing program 2:
r0 = socket$inet6(0xa, 0x8000000000000802, 0x88)
sendmsg$inet_sctp(r0, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x3, 0x0, @mcast2}, 0x1c, 0x0}, 0x8000)
sendto$inet6(r0, &(0x7f0000b0cf6e), 0x0, 0x0, 0x0, 0x0)

14:20:12 executing program 3:
mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p2000\"L'}]}})

[  228.539363][   T26] audit: type=1804 audit(1550672412.009:40): pid=8470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/35/bus" dev="sda1" ino=16619 res=1
14:20:12 executing program 3:
r0 = socket$inet6(0xa, 0x3, 0x4)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c)
setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0xff}, 0x0, @in=@initdev}}, 0xe8)
sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0)

[  228.585756][ T8479] 9pnet: Unknown protocol version 9p2000"L
14:20:12 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

[  228.687684][   T26] audit: type=1804 audit(1550672412.159:41): pid=8488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/35/bus" dev="sda1" ino=16619 res=1
14:20:12 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:12 executing program 2:
r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00043418bf00000000000000004000000000000000000000008b0000000004010011003800020000821123cc000300000000000054b80000000000e1ffffff0000000000000000000000008004f800000000000000"], 0x68)
write$P9_RGETATTR(r0, &(0x7f0000000380)={0xa0}, 0xff98)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:20:12 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070")
r1 = socket$nl_generic(0x10, 0x3, 0x10)
recvmmsg(r1, &(0x7f0000000380)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffddb}}], 0x1, 0x0, 0x0)
r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00')
sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001700)={0x14, r2, 0x51d, 0x0, 0x0, {0x15}}, 0x14}}, 0x0)

14:20:12 executing program 2:
syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070")
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0)
r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0)
ioctl$sock_netrom_SIOCADDRT(r1, 0x5421, &(0x7f0000000380)={0x0, @bcast, @rose={'rose'}, 0x0, 'syz0\x00', @null, 0x0, 0x0, [@null, @netrom, @default, @default, @netrom, @null, @remote, @bcast]})

[  229.307115][   T26] audit: type=1804 audit(1550672412.779:42): pid=8470 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/35/bus" dev="sda1" ino=16619 res=1
[  229.332730][   T26] audit: type=1804 audit(1550672412.799:43): pid=8484 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/35/bus" dev="sda1" ino=16619 res=1
14:20:12 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r2, 0x0, 0x400000000000906)
sendfile(r0, r2, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

14:20:12 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:12 executing program 5:
r0 = eventfd(0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000140)='wchan\x00')
sendfile(r0, r1, 0x0, 0xffffffff)

14:20:12 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070")
syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001b00)={[{@type={'type', 0x3d, "cda72ca1"}}]})

14:20:12 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = dup2(r0, r0)
r2 = epoll_create1(0x0)
r3 = epoll_create1(0x0)
epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000000c0)={0x20000001})
epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000400))
pipe(&(0x7f0000000640))
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0)

14:20:12 executing program 3:
setitimer(0x0, &(0x7f00000000c0)={{}, {0x10000000000000}}, 0x0)

[  229.381070][   T26] audit: type=1804 audit(1550672412.849:44): pid=8488 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/35/bus" dev="sda1" ino=16619 res=1
14:20:12 executing program 4:
bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{}], 0x1, 0x0)

[  229.470593][ T8526] hfs: type requires a 4 character value
[  229.503067][ T8526] hfs: unable to parse mount options
14:20:13 executing program 5:
io_setup(0x5, &(0x7f0000000100)=<r0=>0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x142, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'netdevsim0\x00', 0xfffffffffffffdfe})
r2 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)
io_submit(r0, 0x118, &(0x7f0000000600)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, 0x0, 0x675}])

14:20:13 executing program 4:
bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{}], 0x1, 0x0)

14:20:13 executing program 3:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
r2 = dup(r0)
setsockopt$inet6_tcp_int(r2, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4)
setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0x208, 0xa5)
setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x4, @mcast1, 0x101}}, 0x0, 0x8, 0x0, "9fc72b543b28dd4728c3988b7adea76fa59f716c731782304d2a8b2baf8c1724fb01b86d7c1d88f3c7322926d8f0fcdb51b5df3ba8b696320eb85ae1bd8e6af048c54f27e0dad819d7cb50aaa2bc300f"}, 0xd8)
setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0)
setns(0xffffffffffffffff, 0x0)
setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0)
clock_nanosleep(0x0, 0x0, 0x0, 0x0)
ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x7)
bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0)
setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0)
sendto$inet6(r0, 0x0, 0xffffff91, 0x20000008, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x6e)
ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0)
r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000280))
ftruncate(r3, 0x7fff)
sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000ffffbffe)

14:20:13 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/stat\x00')
mkdirat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x1ff)

[  229.519616][   T26] audit: type=1804 audit(1550672412.989:45): pid=8530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/36/bus" dev="sda1" ino=16659 res=1
[  229.602608][ T8540] hfs: type requires a 4 character value
[  229.626617][ T8540] hfs: unable to parse mount options
14:20:13 executing program 4:
bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{}], 0x1, 0x0)

[  229.682903][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  229.731162][ T8555] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
[  229.747450][ T8547] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  229.793015][ T8547] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check.
[  229.853239][ T8564] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
[  229.896475][ T8564] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check.
14:20:13 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r2, 0x0, 0x400000000000906)
sendfile(r0, r2, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

14:20:13 executing program 0:
perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0x80003, 0x2000000084)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @remote}, {0x0, @local}, 0xe, {0x2, 0x0, @remote}, 'bond0\x00'})

14:20:13 executing program 2:
syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)

14:20:13 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:13 executing program 5:
socketpair$unix(0x1, 0x2000000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$inet(0x10, 0x4000000003, 0x0)
sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="24000000220007031dfffd946f610500020000000000fd21fe1c4095421ba3a20400ff7e280000001100ffffba16a0aa1ce208b3ef090000000000008e3141eff24d823800000000e05606d6", 0x4c}], 0x1}, 0x0)

14:20:13 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

[  230.328171][ T8570] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'.
14:20:13 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="71e67a15cdf0319fa22748f9a91c66b3", 0x10)
r1 = accept4$alg(r0, 0x0, 0x0, 0x0)
sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)="104a2d9e3da15b605e2e56c00c59cac3663635b2b23f9cac53bf264849a86e69d2", 0x21}], 0x1}], 0x1, 0x0)
recvmmsg(r1, &(0x7f0000004e40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/12, 0xc}, {&(0x7f0000000580)=""/80, 0x50}], 0x2}}], 0x2, 0x0, 0x0)

14:20:13 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:13 executing program 5:
clone(0x4000003102041ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x38)
write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="052fc73c9f2f36e6b5b00040ef3d6ba7d455f9ff8e97ec5d770009e52f44c4820d791bfea6840719850074ee6cb6fe61bd49eb152e58ee9975"], 0x39)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  230.458276][ T8573] XFS (loop2): Invalid superblock magic number
14:20:14 executing program 3:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff)
r1 = dup2(r0, r0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
write$P9_RCREATE(r1, 0x0, 0x0)

14:20:14 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:14 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0)
r2 = dup2(r0, r1)
clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket$inet(0x2, 0x0, 0x0)
sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)

14:20:14 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r2, 0x0, 0x400000000000906)
sendfile(r0, r2, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

14:20:14 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:14 executing program 5:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
pipe2(&(0x7f0000000080), 0x0)
sendmsg$nl_netfilter(r1, &(0x7f0000498000)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x20, 0x0, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0)

14:20:14 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:14 executing program 3:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0xc0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0)
sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getpgid(0xffffffffffffffff)
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
openat(0xffffffffffffff9c, 0x0, 0x0, 0xe3)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
accept(r0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f00000000c0)=0x6002)
restart_syscall()
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:14 executing program 0:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8e2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\x00', 0x2761, 0x0)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000))

[  231.249855][ T8646] kvm [8643]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0
[  231.260085][ T8644] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'.
14:20:14 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

[  231.291189][ T8652] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'.
14:20:14 executing program 0:
mlockall(0x0)
ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0)
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x7e, 0x0)
getsockopt$inet_mreqn(r0, 0x0, 0x23, 0x0, &(0x7f0000000840))
socket$inet6(0xa, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0)
ioctl$void(0xffffffffffffffff, 0x0)
ioctl$sock_inet_SIOCSARP(r0, 0x8953, 0x0)
mkdir(&(0x7f0000000100)='./control\x00', 0x0)
setxattr$system_posix_acl(0x0, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB], 0x1, 0x0)
getxattr(&(0x7f0000000040)='./control\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f0000000200)=""/202, 0xca)
arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040))
clone(0x13102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0)
syz_genetlink_get_family_id$tipc2(0x0)
madvise(&(0x7f0000bdc000/0x1000)=nil, 0x1000, 0x3)
sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x40)

14:20:14 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, 0x0, 0x0)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:14 executing program 5:
r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x5, 0x0, &(0x7f0000000700)="2ba063fb30"})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000280)=[@increfs_done], 0x0, 0x0, 0x0})

14:20:14 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

[  231.504765][ T8668] binder: 8667:8668 ioctl c018620b 0 returned -14
14:20:15 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r2, 0x0, 0x400000000000906)
sendfile(r0, r2, 0x0, 0xa5cc54d)

[  231.571531][ T8676] binder: 8667:8676 transaction failed 29189/-22, size 24-8 line 2994
[  231.613400][ T8676] binder: 8667:8676 BC_INCREFS_DONE u0000000000000000 no match
14:20:15 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, 0x0, 0x0)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:15 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:15 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, 0x0, 0x0)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:15 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00\x00\x00\x00\x00\xdb\x88yt\xa9\xd4\xb8\x04\x9e f\x06\xa8\b\xfc\xfe=\xd3\x12\x91\xf7\x86\xce\xe9*.\xd9\xcc\x0e\xeb\x0fn\x1b!p\x05W\xd7\xd3!\xc6\x16\xf2\xa6\x9f\x97^]X\ah1\x03\xcfHQo\xd9`c`1\x93\xe1\xcc1\t\xac\x8e\xeb4\x89\xd6\xa5\xd8n\xeao\xc6j\xdcl\x927\x8dI', 0x200002, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
getdents64(r1, &(0x7f0000000140)=""/82, 0x4a)

14:20:15 executing program 3:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0xc0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0)
sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getpgid(0xffffffffffffffff)
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
openat(0xffffffffffffff9c, 0x0, 0x0, 0xe3)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
accept(r0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f00000000c0)=0x6002)
restart_syscall()
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:15 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r1, 0x2f)
write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="3900556c3640cadb0000efff35ffff0e1838305e2905ab7a9747a9af0600000000000000000066e1e52e7b5ee200000000000000000000e9ff"], 0x39)
ptrace$cont(0x18, r1, 0x0, 0x0)
ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0))
ptrace$cont(0x1f, r1, 0x0, 0x0)

14:20:15 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:15 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc"}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:15 executing program 0:
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, &(0x7f0000000100)=ANY=[@ANYBLOB='usrjquota=-'])

[  232.167896][ T8710] kvm [8708]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0
[  232.249092][ T8718] EXT4-fs (sda1): journaled quota format not specified
[  232.297916][ T8676] binder: 8667:8676 ioctl c018620b 0 returned -14
[  232.316028][ T8722] binder: 8667:8722 BC_INCREFS_DONE u0000000000000000 no match
[  232.316052][ T8676] binder: 8667:8676 transaction failed 29189/-22, size 24-8 line 2994
[  232.375552][ T8723] EXT4-fs (sda1): journaled quota format not specified
14:20:15 executing program 5:
creat(&(0x7f0000000400)='./file0\x00', 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='./file1\x00')

14:20:15 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:16 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getpgid(0xffffffffffffffff)
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
restart_syscall()
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:16 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc"}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:16 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='sessionid\x00')
preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0)

14:20:16 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc"}, 0x60)
poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x0)

14:20:16 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:16 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:16 executing program 3:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0xc0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0)
sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getpgid(0xffffffffffffffff)
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
openat(0xffffffffffffff9c, 0x0, 0x0, 0xe3)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
accept(r0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f00000000c0)=0x6002)
restart_syscall()
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:16 executing program 5:
recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0xffffffffffffff82, &(0x7f0000002b80)=[{&(0x7f0000000680)=""/190, 0xb3}], 0x1}}], 0x1, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_mr_cache\x00')
preadv(r0, &(0x7f00000017c0), 0x1d0, 0x67)

14:20:16 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r2, 0x0, 0x400000000000906)
sendfile(r0, r2, 0x0, 0xa5cc54d)

14:20:16 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(0x0, 0x0, 0x0)

[  232.928891][   T26] kauditd_printk_skb: 6 callbacks suppressed
[  232.928905][   T26] audit: type=1804 audit(1550672416.399:52): pid=8762 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/40/bus" dev="sda1" ino=16678 res=1
14:20:16 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r1, &(0x7f0000000100), 0x1c)
r2 = dup2(r1, r1)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet6_int(r1, 0x29, 0x3e, 0x0, 0x0)
setsockopt$inet6_int(r2, 0x29, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)

14:20:16 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:16 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(0x0, 0x0, 0x0)

14:20:16 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(0x0, 0x0, 0x0)

14:20:16 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:17 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getpgid(0xffffffffffffffff)
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
restart_syscall()
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:17 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0), 0x0, 0x0)

14:20:17 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:17 executing program 3:
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000000)='./file0\x00', 0xc0)
ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0)
sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getpgid(0xffffffffffffffff)
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
openat(0xffffffffffffff9c, 0x0, 0x0, 0xe3)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
accept(r0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f00000000c0)=0x6002)
restart_syscall()
getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:17 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0), 0x0, 0x0)

14:20:17 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getpgid(0xffffffffffffffff)
openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
restart_syscall()
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:17 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
getpgid(0xffffffffffffffff)
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:17 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:17 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r2, 0x0, 0x400000000000906)
sendfile(r0, r2, 0x0, 0xa5cc54d)

14:20:17 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0), 0x0, 0x0)

14:20:17 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

[  234.078212][   T26] audit: type=1804 audit(1550672417.549:53): pid=8815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/41/bus" dev="sda1" ino=16689 res=1
14:20:17 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:17 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{}], 0x1, 0x0)

14:20:17 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300))
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:17 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{}], 0x1, 0x0)

14:20:17 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0xed5e0000})
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x100000002072, 0xffffffffffffffff, 0x0)
r1 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(serpent)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0)
write$binfmt_script(0xffffffffffffffff, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0'}, 0xb)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0)
mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x300000a, 0x8013, r0, 0x0)
ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611)
r2 = socket$xdp(0x2c, 0x3, 0x0)
setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/21, 0x3c000, 0x800}, 0x18)

14:20:18 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vlan0\x00', 0x6811})
ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'vlan0\x00\x00\xf6\xff\xff\xff\xff\xff\xff\xff\x00', {0x2, 0x0, @loopback}})
dup3(r0, r1, 0x0)

[  234.551168][ T8836] kvm [8835]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0
14:20:18 executing program 4:
r0 = syz_init_net_socket$nfc_llcp(0x27, 0x8000100000002, 0x1)
bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "00f40c442848cb166b002ee8dc4da7ae20d7c965d4fab6ad71c03cb2aa506b39b663e1c4c87d263fc05a6a042b6feba7da240eb2ca83e630e3b925b24361dc", 0x1}, 0x60)
poll(&(0x7f00000001c0)=[{}], 0x1, 0x0)

14:20:18 executing program 5:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$ashmem(0xffffffffffffff9c, 0x0, 0x2000, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00')

14:20:18 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(r1)
r2 = socket$rxrpc(0x21, 0x2, 0xa)
bind$rxrpc(r2, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x24)
io_setup(0x8, &(0x7f0000000100)=<r3=>0x0)
syz_genetlink_get_family_id$ipvs(0x0)
io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x2000000, 0x0, 0x0, 0x8, 0x0, r1, 0x0}])

14:20:18 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300))
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:18 executing program 4:
syz_execute_func(&(0x7f00000001c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f")
clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
io_setup(0x10000, &(0x7f0000000100))
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
io_setup(0x4, &(0x7f0000000040)=<r1=>0x0)
io_submit(r1, 0x1, &(0x7f0000001200)=[&(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000001c0)='h', 0x1}])

14:20:18 executing program 3:
r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
fallocate(r0, 0x0, 0x0, 0x5)

14:20:18 executing program 5:
r0 = eventfd(0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000140)='oom_score\x00')
sendfile(r0, r1, 0x0, 0xffffffff)

14:20:18 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r2, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

[  235.003955][ T8875] kvm [8873]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0
14:20:18 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0)
write(r2, &(0x7f0000002000)='/', 0x1)
sendfile(r2, r2, &(0x7f0000001000), 0xfec)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0)
ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d8, &(0x7f00000000c0))

[  235.073804][   T26] audit: type=1804 audit(1550672418.539:54): pid=8887 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/42/bus" dev="sda1" ino=16696 res=1
14:20:18 executing program 0:
chdir(0x0)
r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0)
write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='./file1\x00')
rmdir(&(0x7f0000000100)='./file1\x00')

14:20:18 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300))
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:18 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r2, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

[  235.188164][   T26] audit: type=1804 audit(1550672418.589:55): pid=8889 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/42/bus" dev="sda1" ino=16696 res=1
14:20:18 executing program 3:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$pppoe(0x18, 0x1, 0x0)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0)
pipe(&(0x7f00000004c0)={<r0=>0xffffffffffffffff})
syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000340)={0x0, <r1=>0x0})
pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x400000000000000}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0)
vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

14:20:18 executing program 4:
syz_execute_func(&(0x7f00000001c0)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f")
clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
io_setup(0x10000, &(0x7f0000000100))
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
io_setup(0x4, &(0x7f0000000040)=<r1=>0x0)
io_submit(r1, 0x1, &(0x7f0000001200)=[&(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000001c0)='h', 0x1}])

[  235.349447][ T8906] kvm [8901]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0
14:20:18 executing program 2:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

[  235.381345][   T26] audit: type=1804 audit(1550672418.849:56): pid=8916 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/43/bus" dev="sda1" ino=16691 res=1
[  235.458192][   T26] audit: type=1804 audit(1550672418.919:57): pid=8920 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/43/bus" dev="sda1" ino=16691 res=1
14:20:19 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r2, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

14:20:19 executing program 4:
mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0)
mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p200,.L'}]}})

[  235.565433][ T8922] kvm [8921]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0
[  235.643849][   T26] audit: type=1804 audit(1550672419.109:58): pid=8926 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/44/bus" dev="sda1" ino=16701 res=1
14:20:19 executing program 2:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:19 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
sendfile(r0, r2, 0x0, 0x400000000000906)
sendfile(r0, r2, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

[  235.709973][ T8928] 9pnet: Unknown protocol version 9p200
[  235.731750][   T26] audit: type=1804 audit(1550672419.169:59): pid=8929 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/44/bus" dev="sda1" ino=16701 res=1
14:20:19 executing program 4:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000080)={0x23, 0x0, 0x9})
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r1 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r1, 0x0, 0x400000000000906)
sendfile(r0, r1, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

[  235.855184][ T8931] kvm [8930]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0
[  235.877339][   T26] audit: type=1804 audit(1550672419.349:60): pid=8936 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/45/bus" dev="sda1" ino=16701 res=1
[  235.958728][   T26] audit: type=1804 audit(1550672419.379:61): pid=8936 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir635155980/syzkaller.zSPYmH/45/bus" dev="sda1" ino=16701 res=1
14:20:19 executing program 5:

14:20:19 executing program 0:
r0 = socket$inet6(0xa, 0x1000000000002, 0x0)
setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14)

14:20:19 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
sendfile(r0, r2, 0x0, 0x400000000000906)
sendfile(r0, r2, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

14:20:19 executing program 2:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:19 executing program 3:
socketpair$unix(0x1, 0x200000000000002, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
socket$inet_udp(0x2, 0x2, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082)
fcntl$setsig(r0, 0xa, 0x1f)
r2 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x0)
pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806)
pwritev(r1, 0x0, 0x53, 0x0)
r3 = pkey_alloc(0x0, 0x2ac5d6c2d40f00dc)
pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, r3)
r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
io_setup(0xfffffffffffffffd, &(0x7f0000000440))
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r4)
r5 = socket$unix(0x1, 0x1, 0x0)
r6 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r6, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc)
listen(r6, 0x0)
connect$unix(r5, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc)
setsockopt$sock_int(r6, 0x1, 0x22, 0x0, 0x0)
accept4$unix(r6, 0x0, 0x0, 0x0)
symlinkat(0x0, 0xffffffffffffffff, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000102000007)
mknod(&(0x7f0000000000)='./file0\x00', 0x400000040, 0xfffffda5)
ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0)
add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0xffffffffffffff97, 0xfffffffffffffffb)
openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0)
ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, 0x0)

14:20:19 executing program 5:
r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2)
write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24)
r1 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0)
write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000d2000000000000000003003e00043418bf00000000000000004000000000000000000000008b0000000004010011003800020000821123cc000300000000000054b80000000000e1ffffff0000000000000000000000008004f800000000000000"], 0x68)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$P9_RGETATTR(r1, &(0x7f0000000380)={0xa0}, 0xff98)
execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

14:20:19 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
sendfile(r0, r2, 0x0, 0x400000000000906)
sendfile(r0, r2, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

[  236.225075][ T8956] kvm [8955]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0
14:20:19 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

14:20:19 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:19 executing program 1:
r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
fcntl$setstatus(r0, 0x4, 0x6100)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
ptrace$setsig(0x4203, 0x0, 0x0, 0x0)
truncate(&(0x7f0000000240)='./bus\x00', 0x800)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x0, 0x0)
lseek(r0, 0x0, 0x2)
sendfile(r0, r2, 0x0, 0x400000000000906)
sendfile(r0, r2, 0x0, 0xa5cc54d)
creat(&(0x7f0000000580)='./bus\x00', 0x0)

[  236.424284][ T8974] kvm [8972]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0
14:20:20 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

[  236.665020][ T8988] kvm [8987]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0
14:20:20 executing program 4:
inotify_init()
ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0)
clone(0x2000, &(0x7f0000000080), 0x0, 0x0, 0x0)

14:20:20 executing program 3:
socketpair$unix(0x1, 0x200000000000002, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
socket$inet_udp(0x2, 0x2, 0x0)
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082)
fcntl$setsig(r0, 0xa, 0x1f)
r2 = memfd_create(&(0x7f0000000c80)='[trusted$\x00', 0x0)
pwritev(r2, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806)
pwritev(r1, 0x0, 0x53, 0x0)
r3 = pkey_alloc(0x0, 0x2ac5d6c2d40f00dc)
pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, r3)
r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
io_setup(0xfffffffffffffffd, &(0x7f0000000440))
ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r4)
r5 = socket$unix(0x1, 0x1, 0x0)
r6 = socket$unix(0x1, 0x1, 0x0)
bind$unix(r6, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc)
listen(r6, 0x0)
connect$unix(r5, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc)
setsockopt$sock_int(r6, 0x1, 0x22, 0x0, 0x0)
accept4$unix(r6, 0x0, 0x0, 0x0)
symlinkat(0x0, 0xffffffffffffffff, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000102000007)
mknod(&(0x7f0000000000)='./file0\x00', 0x400000040, 0xfffffda5)
ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0)
add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0xffffffffffffff97, 0xfffffffffffffffb)
openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x0)
ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, 0x0)

14:20:20 executing program 2:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

[  236.895466][ T8994] kvm [8992]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0
14:20:20 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x0, 0x9e], [0xc2]})

14:20:20 executing program 3:

14:20:20 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  237.152718][ T9003] kvm [9002]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0