0x7, 0x0, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4)
socket$kcm(0x29, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007)
perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000001640)='/dev/net/tun\x00', 0x4800, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
sendmsg(0xffffffffffffffff, 0x0, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
close(r2)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x2ea, &(0x7f0000000080), 0x0, 0x0, 0x0, 0xa00}, 0x40000)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
gettid()

13:21:28 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e6400000000140002000800050002"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:28 executing program 4:
syz_emit_ethernet(0x0, 0x0, 0x0)

13:21:28 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
r2 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:28 executing program 4:
syz_emit_ethernet(0x0, 0x0, 0x0)

13:21:28 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e6400000000140002000800050002000000080001"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:28 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$kcm(0x2, 0x80001, 0x84)
perf_event_open(0x0, 0x0, 0x0, r0, 0x0)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$kcm(0xa, 0x5, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
socket$kcm(0x29, 0x2, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007)
perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001640)='/dev/net/tun\x00', 0x4800, 0x0)
ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000001680))
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
sendmsg(0xffffffffffffffff, 0x0, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
close(r3)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x2ea, &(0x7f0000000080), 0x0, 0x0, 0x0, 0xa00}, 0x40000)
gettid()

[  435.155289] audit: type=1800 audit(1572960088.450:286): pid=13416 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=43 res=0
13:21:28 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
r2 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:28 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:21:28 executing program 4:
syz_emit_ethernet(0x0, 0x0, 0x0)

13:21:28 executing program 1:
syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'')
r0 = inotify_init1(0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:21:28 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e6400000000140002000800050002000000080001"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:28 executing program 4:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x0, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:21:28 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
r2 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:28 executing program 4:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x0, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:21:28 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$kcm(0x2, 0x80001, 0x84)
perf_event_open(0x0, 0x0, 0x0, r0, 0x0)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$kcm(0xa, 0x5, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
socket$kcm(0x29, 0x2, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007)
perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001640)='/dev/net/tun\x00', 0x4800, 0x0)
ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000001680))
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
sendmsg(0xffffffffffffffff, 0x0, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
close(r3)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x2ea, &(0x7f0000000080), 0x0, 0x0, 0x0, 0xa00}, 0x40000)
gettid()

[  435.439960] audit: type=1800 audit(1572960088.730:287): pid=13448 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=44 res=0
13:21:28 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e6400000000140002000800050002000000080001"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:28 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
socket$inet6(0xa, 0x80003, 0x6b)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:28 executing program 4:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x0, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:21:29 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e6400000000140002000800050002000000080001000400"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

[  435.624668] audit: type=1804 audit(1572960088.790:288): pid=13456 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/255/file0/file0" dev="loop2" ino=44 res=1
[  435.728332] FAT-fs (loop2): error, invalid access to FAT (entry 0x000064ff)
[  435.754783] FAT-fs (loop2): Filesystem has been set read-only
[  435.774937] FAT-fs (loop2): error, invalid access to FAT (entry 0x000064ff)
13:21:29 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:29 executing program 4:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x0, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  435.851746] device bridge_slave_1 left promiscuous mode
[  435.857298] bridge0: port 2(bridge_slave_1) entered disabled state
[  435.921695] device bridge_slave_0 left promiscuous mode
[  435.927286] bridge0: port 1(bridge_slave_0) entered disabled state
[  436.052228] device hsr_slave_1 left promiscuous mode
[  436.092550] device hsr_slave_0 left promiscuous mode
[  436.132803] team0 (unregistering): Port device team_slave_1 removed
[  436.144129] team0 (unregistering): Port device team_slave_0 removed
[  436.153645] bond0 (unregistering): Releasing backup interface bond_slave_1
[  436.223443] bond0 (unregistering): Releasing backup interface bond_slave_0
[  436.283895] bond0 (unregistering): Released all slaves
[  438.061379] IPVS: ftp: loaded support on port[0] = 21
[  438.918455] chnl_net:caif_netlink_parms(): no params data found
[  438.954564] bridge0: port 1(bridge_slave_0) entered blocking state
[  438.961616] bridge0: port 1(bridge_slave_0) entered disabled state
[  438.968582] device bridge_slave_0 entered promiscuous mode
[  438.975478] bridge0: port 2(bridge_slave_1) entered blocking state
[  438.981971] bridge0: port 2(bridge_slave_1) entered disabled state
[  438.988852] device bridge_slave_1 entered promiscuous mode
[  439.007047] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  439.016018] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  439.032487] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  439.039567] team0: Port device team_slave_0 added
[  439.045116] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  439.052231] team0: Port device team_slave_1 added
[  439.057355] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  439.064667] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  439.132352] device hsr_slave_0 entered promiscuous mode
[  439.180508] device hsr_slave_1 entered promiscuous mode
[  439.250572] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  439.257490] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  439.271958] bridge0: port 2(bridge_slave_1) entered blocking state
[  439.278315] bridge0: port 2(bridge_slave_1) entered forwarding state
[  439.284959] bridge0: port 1(bridge_slave_0) entered blocking state
[  439.291367] bridge0: port 1(bridge_slave_0) entered forwarding state
[  439.318155] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  439.324535] 8021q: adding VLAN 0 to HW filter on device bond0
[  439.332761] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  439.342280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  439.349247] bridge0: port 1(bridge_slave_0) entered disabled state
[  439.356051] bridge0: port 2(bridge_slave_1) entered disabled state
[  439.365279] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  439.371498] 8021q: adding VLAN 0 to HW filter on device team0
[  439.379619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  439.387359] bridge0: port 1(bridge_slave_0) entered blocking state
[  439.393769] bridge0: port 1(bridge_slave_0) entered forwarding state
[  439.403140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  439.410890] bridge0: port 2(bridge_slave_1) entered blocking state
[  439.417334] bridge0: port 2(bridge_slave_1) entered forwarding state
[  439.432865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  439.440636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  439.448588] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  439.462676] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  439.472570] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  439.483434] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  439.489787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  439.497400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  439.505027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  439.518225] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  439.525822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  439.532634] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  439.544779] 8021q: adding VLAN 0 to HW filter on device batadv0
[  439.910620] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:21:34 executing program 1:
syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'')
r0 = inotify_init1(0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:21:34 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:34 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$kcm(0x2, 0x80001, 0x84)
perf_event_open(0x0, 0x0, 0x0, r0, 0x0)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$kcm(0xa, 0x5, 0x0)
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
socket$kcm(0x29, 0x2, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007)
perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001640)='/dev/net/tun\x00', 0x4800, 0x0)
ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000001680))
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
sendmsg(0xffffffffffffffff, 0x0, 0x0)
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
close(r3)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x2ea, &(0x7f0000000080), 0x0, 0x0, 0x0, 0xa00}, 0x40000)
gettid()

13:21:34 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:21:34 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e6400000000140002000800050002000000080001000400"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:34 executing program 4:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x0, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:21:34 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e6400000000140002000800050002000000080001000400"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

[  440.940809] audit: type=1800 audit(1572960094.240:289): pid=13506 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=45 res=0
13:21:34 executing program 4:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x0, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:21:34 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e640000000014000200080005000200000008000100040000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:34 executing program 3:
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$kcm(0x2, 0x80001, 0x84)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x5, 0x0)
ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8983, &(0x7f0000000000)={r0})

[  441.060388] audit: type=1804 audit(1572960094.240:290): pid=13506 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/256/file0/file0" dev="loop2" ino=45 res=1
13:21:34 executing program 3:

13:21:34 executing program 4:
syz_emit_ethernet(0x96, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x60, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}]}}}}}}}, 0x0)

[  441.167651] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  441.199324] FAT-fs (loop2): Filesystem has been set read-only
[  441.212438] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
[  441.660496] device bridge_slave_1 left promiscuous mode
[  441.666046] bridge0: port 2(bridge_slave_1) entered disabled state
[  441.710961] device bridge_slave_0 left promiscuous mode
[  441.716588] bridge0: port 1(bridge_slave_0) entered disabled state
[  441.842729] device hsr_slave_1 left promiscuous mode
[  441.893435] device hsr_slave_0 left promiscuous mode
[  441.952885] team0 (unregistering): Port device team_slave_1 removed
[  441.962938] team0 (unregistering): Port device team_slave_0 removed
[  441.972292] bond0 (unregistering): Releasing backup interface bond_slave_1
[  442.013839] bond0 (unregistering): Releasing backup interface bond_slave_0
[  442.094689] bond0 (unregistering): Released all slaves
[  443.901366] IPVS: ftp: loaded support on port[0] = 21
[  444.877211] chnl_net:caif_netlink_parms(): no params data found
[  444.907812] bridge0: port 1(bridge_slave_0) entered blocking state
[  444.914297] bridge0: port 1(bridge_slave_0) entered disabled state
[  444.921555] device bridge_slave_0 entered promiscuous mode
[  444.928075] bridge0: port 2(bridge_slave_1) entered blocking state
[  444.934566] bridge0: port 2(bridge_slave_1) entered disabled state
[  444.941577] device bridge_slave_1 entered promiscuous mode
[  444.959589] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  444.968673] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  444.986298] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  444.993525] team0: Port device team_slave_0 added
[  444.998893] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  445.006556] team0: Port device team_slave_1 added
[  445.012022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  445.019267] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  445.082120] device hsr_slave_0 entered promiscuous mode
[  445.140364] device hsr_slave_1 entered promiscuous mode
[  445.210753] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  445.217863] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  445.230245] bridge0: port 2(bridge_slave_1) entered blocking state
[  445.236628] bridge0: port 2(bridge_slave_1) entered forwarding state
[  445.243276] bridge0: port 1(bridge_slave_0) entered blocking state
[  445.249627] bridge0: port 1(bridge_slave_0) entered forwarding state
[  445.276384] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  445.282723] 8021q: adding VLAN 0 to HW filter on device bond0
[  445.291156] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  445.299343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  445.306877] bridge0: port 1(bridge_slave_0) entered disabled state
[  445.314247] bridge0: port 2(bridge_slave_1) entered disabled state
[  445.323327] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  445.329393] 8021q: adding VLAN 0 to HW filter on device team0
[  445.338812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  445.346625] bridge0: port 1(bridge_slave_0) entered blocking state
[  445.353011] bridge0: port 1(bridge_slave_0) entered forwarding state
[  445.364480] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  445.372086] bridge0: port 2(bridge_slave_1) entered blocking state
[  445.378416] bridge0: port 2(bridge_slave_1) entered forwarding state
[  445.391261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  445.398836] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  445.409323] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  445.420950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  445.431542] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  445.442589] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  445.448597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  445.455673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  445.467371] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  445.475052] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  445.481908] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  445.493212] 8021q: adding VLAN 0 to HW filter on device batadv0
[  445.860437] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:21:40 executing program 1:
syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'')
r0 = inotify_init1(0x0)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:21:40 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:40 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e640000000014000200080005000200000008000100040000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:40 executing program 3:

13:21:40 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:21:40 executing program 4:
syz_emit_ethernet(0x96, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x60, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}]}}}}}}}, 0x0)

13:21:40 executing program 3:

13:21:40 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e640000000014000200080005000200000008000100040000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:40 executing program 4:
syz_emit_ethernet(0x96, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x60, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}]}}}}}}}, 0x0)

[  446.956359] audit: type=1800 audit(1572960100.250:291): pid=13556 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=46 res=0
13:21:40 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT')
preadv(r0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000300)=""/4096, 0x1000}], 0x2, 0x1a)

13:21:40 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x2}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:40 executing program 4:
syz_emit_ethernet(0x9e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x68, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh]}}}}}}}, 0x0)

[  447.115234] audit: type=1804 audit(1572960100.250:292): pid=13556 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/257/file0/file0" dev="loop2" ino=46 res=1
[  447.179190] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  447.228660] FAT-fs (loop2): Filesystem has been set read-only
[  447.264313] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
[  447.610468] device bridge_slave_1 left promiscuous mode
[  447.616011] bridge0: port 2(bridge_slave_1) entered disabled state
[  447.690914] device bridge_slave_0 left promiscuous mode
[  447.696438] bridge0: port 1(bridge_slave_0) entered disabled state
[  447.823265] device hsr_slave_1 left promiscuous mode
[  447.892610] device hsr_slave_0 left promiscuous mode
[  447.932761] team0 (unregistering): Port device team_slave_1 removed
[  447.942876] team0 (unregistering): Port device team_slave_0 removed
[  447.952140] bond0 (unregistering): Releasing backup interface bond_slave_1
[  447.984894] bond0 (unregistering): Releasing backup interface bond_slave_0
[  448.071250] bond0 (unregistering): Released all slaves
[  449.951433] IPVS: ftp: loaded support on port[0] = 21
[  450.728187] chnl_net:caif_netlink_parms(): no params data found
[  450.762909] bridge0: port 1(bridge_slave_0) entered blocking state
[  450.769325] bridge0: port 1(bridge_slave_0) entered disabled state
[  450.776464] device bridge_slave_0 entered promiscuous mode
[  450.783142] bridge0: port 2(bridge_slave_1) entered blocking state
[  450.789550] bridge0: port 2(bridge_slave_1) entered disabled state
[  450.796706] device bridge_slave_1 entered promiscuous mode
[  450.812644] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  450.822179] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  450.840992] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  450.848131] team0: Port device team_slave_0 added
[  450.853640] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  450.860884] team0: Port device team_slave_1 added
[  450.866146] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  450.873624] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  450.933591] device hsr_slave_0 entered promiscuous mode
[  450.970526] device hsr_slave_1 entered promiscuous mode
[  451.030694] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  451.037590] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  451.050158] bridge0: port 2(bridge_slave_1) entered blocking state
[  451.056525] bridge0: port 2(bridge_slave_1) entered forwarding state
[  451.063147] bridge0: port 1(bridge_slave_0) entered blocking state
[  451.069479] bridge0: port 1(bridge_slave_0) entered forwarding state
[  451.094807] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  451.101283] 8021q: adding VLAN 0 to HW filter on device bond0
[  451.109108] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  451.117702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  451.124916] bridge0: port 1(bridge_slave_0) entered disabled state
[  451.132639] bridge0: port 2(bridge_slave_1) entered disabled state
[  451.141802] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  451.147867] 8021q: adding VLAN 0 to HW filter on device team0
[  451.157065] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  451.164957] bridge0: port 1(bridge_slave_0) entered blocking state
[  451.171372] bridge0: port 1(bridge_slave_0) entered forwarding state
[  451.190443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  451.198021] bridge0: port 2(bridge_slave_1) entered blocking state
[  451.204427] bridge0: port 2(bridge_slave_1) entered forwarding state
[  451.211645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  451.219162] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  451.226803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  451.236051] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  451.243069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  451.252306] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  451.258318] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  451.269905] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  451.277016] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  451.284561] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  451.295862] 8021q: adding VLAN 0 to HW filter on device batadv0
[  451.720372] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:21:45 executing program 1:
syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'')
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r0=>0x0})
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r2=>0x0})
tkill(r2, 0x7)
process_vm_readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:21:45 executing program 3:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x0, 0x1}, 0x20)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400, 0x0, 0x1, 0x3}, 0x20)

13:21:45 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x2}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:45 executing program 4:
syz_emit_ethernet(0x9e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x68, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh]}}}}}}}, 0x0)

13:21:45 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:21:45 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:46 executing program 4:
syz_emit_ethernet(0x9e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x68, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh]}}}}}}}, 0x0)

13:21:46 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x2}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:46 executing program 3:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x0, 0x1}, 0x20)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400, 0x0, 0x1, 0x3}, 0x20)

[  452.736988] audit: type=1800 audit(1572960106.030:293): pid=13607 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=47 res=0
[  452.759961] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  452.759969] FAT-fs (loop2): Filesystem has been set read-only
13:21:46 executing program 1:
syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'')
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r0=>0x0})
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r2=>0x0})
tkill(r2, 0x7)
process_vm_readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:21:46 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x2}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:46 executing program 4:
syz_emit_ethernet(0x7e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x48, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  452.883195] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
13:21:46 executing program 3:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x0, 0x1}, 0x20)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400, 0x0, 0x1, 0x3}, 0x20)

[  452.916317] audit: type=1804 audit(1572960106.030:294): pid=13607 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/258/file0/file0" dev="loop2" ino=47 res=1
13:21:46 executing program 4:
syz_emit_ethernet(0x7e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x48, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:21:46 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:21:46 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x2}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:46 executing program 3:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x102, 0x1, 0x0, 0x0, 0x1}, 0x20)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400, 0x0, 0x1, 0x3}, 0x20)

[  453.049571] audit: type=1800 audit(1572960106.030:295): pid=13607 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=47 res=0
[  453.216307] audit: type=1800 audit(1572960106.510:296): pid=13646 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=48 res=0
[  453.247091] audit: type=1804 audit(1572960106.540:297): pid=13646 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/259/file0/file0" dev="loop2" ino=48 res=1
[  453.255869] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  453.284434] audit: type=1800 audit(1572960106.540:298): pid=13646 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=48 res=0
[  453.284797] FAT-fs (loop2): Filesystem has been set read-only
[  453.317602] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
13:21:46 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:46 executing program 3:
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket(0x10, 0x80002, 0x0)
bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc)
write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26)
connect$netlink(r0, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4)
sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x0, 0x0)

13:21:46 executing program 4:
syz_emit_ethernet(0x7e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x48, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:21:46 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x2}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

[  453.620618] device bridge_slave_1 left promiscuous mode
[  453.626185] bridge0: port 2(bridge_slave_1) entered disabled state
[  453.680752] device bridge_slave_0 left promiscuous mode
[  453.686363] bridge0: port 1(bridge_slave_0) entered disabled state
[  453.803950] device hsr_slave_1 left promiscuous mode
[  453.842681] device hsr_slave_0 left promiscuous mode
[  453.882848] team0 (unregistering): Port device team_slave_1 removed
[  453.893154] team0 (unregistering): Port device team_slave_0 removed
[  453.902556] bond0 (unregistering): Releasing backup interface bond_slave_1
[  453.923679] bond0 (unregistering): Releasing backup interface bond_slave_0
[  454.007204] bond0 (unregistering): Released all slaves
[  455.751411] IPVS: ftp: loaded support on port[0] = 21
[  456.587942] chnl_net:caif_netlink_parms(): no params data found
[  456.620309] bridge0: port 1(bridge_slave_0) entered blocking state
[  456.626723] bridge0: port 1(bridge_slave_0) entered disabled state
[  456.633867] device bridge_slave_0 entered promiscuous mode
[  456.640617] bridge0: port 2(bridge_slave_1) entered blocking state
[  456.647053] bridge0: port 2(bridge_slave_1) entered disabled state
[  456.654411] device bridge_slave_1 entered promiscuous mode
[  456.670825] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  456.679521] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  456.695655] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  456.702927] team0: Port device team_slave_0 added
[  456.708306] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  456.715443] team0: Port device team_slave_1 added
[  456.720819] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  456.727985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  456.783526] device hsr_slave_0 entered promiscuous mode
[  456.830382] device hsr_slave_1 entered promiscuous mode
[  456.870772] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  456.877735] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  456.892440] bridge0: port 2(bridge_slave_1) entered blocking state
[  456.898819] bridge0: port 2(bridge_slave_1) entered forwarding state
[  456.905490] bridge0: port 1(bridge_slave_0) entered blocking state
[  456.911879] bridge0: port 1(bridge_slave_0) entered forwarding state
[  456.938053] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  456.944413] 8021q: adding VLAN 0 to HW filter on device bond0
[  456.953992] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  456.962469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  456.969473] bridge0: port 1(bridge_slave_0) entered disabled state
[  456.976449] bridge0: port 2(bridge_slave_1) entered disabled state
[  456.985940] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  456.992105] 8021q: adding VLAN 0 to HW filter on device team0
[  457.001409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  457.008963] bridge0: port 1(bridge_slave_0) entered blocking state
[  457.015381] bridge0: port 1(bridge_slave_0) entered forwarding state
[  457.025272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  457.033079] bridge0: port 2(bridge_slave_1) entered blocking state
[  457.039421] bridge0: port 2(bridge_slave_1) entered forwarding state
[  457.053406] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  457.061311] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  457.071552] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  457.081853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  457.092632] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  457.103620] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  457.109706] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  457.117082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  457.129706] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  457.138308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  457.145448] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  457.155647] 8021q: adding VLAN 0 to HW filter on device batadv0
[  457.580382] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:21:51 executing program 1:
syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'')
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r0=>0x0})
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r2=>0x0})
tkill(r2, 0x7)
process_vm_readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:21:51 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:21:51 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:21:51 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:51 executing program 4:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x0, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:21:51 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:51 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:51 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:51 executing program 4:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x0, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:21:51 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

[  458.399464] audit: type=1800 audit(1572960111.690:299): pid=13685 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=49 res=0
[  458.490655] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  458.524779] FAT-fs (loop2): Filesystem has been set read-only
13:21:51 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:51 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

[  458.532354] audit: type=1804 audit(1572960111.720:300): pid=13685 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/260/file0/file0" dev="loop2" ino=49 res=1
[  458.604721] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17)
[  458.660339] audit: type=1800 audit(1572960111.720:301): pid=13685 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=49 res=0
[  459.040880] device bridge_slave_1 left promiscuous mode
[  459.046360] bridge0: port 2(bridge_slave_1) entered disabled state
[  459.100905] device bridge_slave_0 left promiscuous mode
[  459.106435] bridge0: port 1(bridge_slave_0) entered disabled state
[  459.205757] device hsr_slave_1 left promiscuous mode
[  459.272754] device hsr_slave_0 left promiscuous mode
[  459.324148] team0 (unregistering): Port device team_slave_1 removed
[  459.334081] team0 (unregistering): Port device team_slave_0 removed
[  459.343493] bond0 (unregistering): Releasing backup interface bond_slave_1
[  459.384919] bond0 (unregistering): Releasing backup interface bond_slave_0
[  459.453926] bond0 (unregistering): Released all slaves
[  461.170916] IPVS: ftp: loaded support on port[0] = 21
[  462.017652] chnl_net:caif_netlink_parms(): no params data found
[  462.049762] bridge0: port 1(bridge_slave_0) entered blocking state
[  462.057034] bridge0: port 1(bridge_slave_0) entered disabled state
[  462.064061] device bridge_slave_0 entered promiscuous mode
[  462.071172] bridge0: port 2(bridge_slave_1) entered blocking state
[  462.077549] bridge0: port 2(bridge_slave_1) entered disabled state
[  462.085491] device bridge_slave_1 entered promiscuous mode
[  462.099967] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  462.109230] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  462.126899] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  462.134173] team0: Port device team_slave_0 added
[  462.139558] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  462.146763] team0: Port device team_slave_1 added
[  462.152147] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  462.159282] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  462.213607] device hsr_slave_0 entered promiscuous mode
[  462.250517] device hsr_slave_1 entered promiscuous mode
[  462.320588] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  462.327538] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  462.339895] bridge0: port 2(bridge_slave_1) entered blocking state
[  462.346390] bridge0: port 2(bridge_slave_1) entered forwarding state
[  462.353066] bridge0: port 1(bridge_slave_0) entered blocking state
[  462.359404] bridge0: port 1(bridge_slave_0) entered forwarding state
[  462.385256] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  462.391810] 8021q: adding VLAN 0 to HW filter on device bond0
[  462.399657] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  462.408031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  462.415715] bridge0: port 1(bridge_slave_0) entered disabled state
[  462.422500] bridge0: port 2(bridge_slave_1) entered disabled state
[  462.432935] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  462.439051] 8021q: adding VLAN 0 to HW filter on device team0
[  462.448264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  462.455836] bridge0: port 1(bridge_slave_0) entered blocking state
[  462.462202] bridge0: port 1(bridge_slave_0) entered forwarding state
[  462.472135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  462.479660] bridge0: port 2(bridge_slave_1) entered blocking state
[  462.486047] bridge0: port 2(bridge_slave_1) entered forwarding state
[  462.501703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  462.509387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  462.517478] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  462.525918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  462.537025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  462.545521] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  462.552101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  462.563722] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  462.571794] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  462.578441] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  462.588619] 8021q: adding VLAN 0 to HW filter on device batadv0
[  463.010688] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:21:56 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:21:56 executing program 4:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x0, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:21:56 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:21:56 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="44000000100001050000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:56 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:21:56 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:57 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  463.714228] audit: type=1800 audit(1572960117.010:302): pid=13735 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=50 res=0
[  463.734598] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
13:21:57 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:21:57 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:21:57 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="44000000100001050000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

[  463.774367] FAT-fs (loop2): Filesystem has been set read-only
13:21:57 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:21:57 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  463.848145] audit: type=1804 audit(1572960117.010:303): pid=13735 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/261/file0/file0" dev="loop2" ino=50 res=1
[  463.850321] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17)
13:21:57 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="44000000100001050000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:57 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:21:57 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @ra]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:21:57 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010500000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:21:57 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  464.077391] audit: type=1800 audit(1572960117.010:304): pid=13735 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=50 res=0
[  464.200741] audit: type=1800 audit(1572960117.500:305): pid=13776 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=51 res=0
[  464.226924] audit: type=1804 audit(1572960117.520:306): pid=13776 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/262/file0/file0" dev="loop2" ino=51 res=1
[  464.255761] audit: type=1800 audit(1572960117.520:307): pid=13776 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=51 res=0
13:21:57 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:21:57 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:21:57 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  464.580638] device bridge_slave_1 left promiscuous mode
[  464.586152] bridge0: port 2(bridge_slave_1) entered disabled state
[  464.630700] device bridge_slave_0 left promiscuous mode
[  464.636265] bridge0: port 1(bridge_slave_0) entered disabled state
[  464.743378] device hsr_slave_1 left promiscuous mode
[  464.793783] device hsr_slave_0 left promiscuous mode
[  464.835262] team0 (unregistering): Port device team_slave_1 removed
[  464.844722] team0 (unregistering): Port device team_slave_0 removed
[  464.853897] bond0 (unregistering): Releasing backup interface bond_slave_1
[  464.893694] bond0 (unregistering): Releasing backup interface bond_slave_0
[  464.952264] bond0 (unregistering): Released all slaves
[  466.721407] IPVS: ftp: loaded support on port[0] = 21
[  467.667403] chnl_net:caif_netlink_parms(): no params data found
[  467.699068] bridge0: port 1(bridge_slave_0) entered blocking state
[  467.705635] bridge0: port 1(bridge_slave_0) entered disabled state
[  467.712964] device bridge_slave_0 entered promiscuous mode
[  467.719410] bridge0: port 2(bridge_slave_1) entered blocking state
[  467.726045] bridge0: port 2(bridge_slave_1) entered disabled state
[  467.733026] device bridge_slave_1 entered promiscuous mode
[  467.749563] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  467.758582] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  467.776381] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  467.783645] team0: Port device team_slave_0 added
[  467.789132] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  467.796334] team0: Port device team_slave_1 added
[  467.801712] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  467.808959] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  467.892136] device hsr_slave_0 entered promiscuous mode
[  467.940480] device hsr_slave_1 entered promiscuous mode
[  467.980707] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  467.987573] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  468.000757] bridge0: port 2(bridge_slave_1) entered blocking state
[  468.007109] bridge0: port 2(bridge_slave_1) entered forwarding state
[  468.013778] bridge0: port 1(bridge_slave_0) entered blocking state
[  468.020862] bridge0: port 1(bridge_slave_0) entered forwarding state
[  468.046343] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  468.052650] 8021q: adding VLAN 0 to HW filter on device bond0
[  468.060777] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  468.068716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  468.076015] bridge0: port 1(bridge_slave_0) entered disabled state
[  468.083706] bridge0: port 2(bridge_slave_1) entered disabled state
[  468.092792] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  468.098846] 8021q: adding VLAN 0 to HW filter on device team0
[  468.107782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  468.115602] bridge0: port 1(bridge_slave_0) entered blocking state
[  468.122005] bridge0: port 1(bridge_slave_0) entered forwarding state
[  468.141351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  468.148932] bridge0: port 2(bridge_slave_1) entered blocking state
[  468.155331] bridge0: port 2(bridge_slave_1) entered forwarding state
[  468.162497] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  468.169983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  468.177900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  468.185738] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  468.195872] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  468.206229] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  468.212429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  468.219393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  468.234843] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  468.242416] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  468.249051] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  468.259148] 8021q: adding VLAN 0 to HW filter on device batadv0
[  468.660313] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:22:02 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:02 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010500000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:22:02 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:02 executing program 3:
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:02 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:02 executing program 5:
r0 = socket$inet6(0xa, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:02 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim={0x4, 0x1, 0xfd}, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:02 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010500000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

[  469.544627] audit: type=1800 audit(1572960122.840:308): pid=13810 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=52 res=0
13:22:02 executing program 3:
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:02 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:02 executing program 3:
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

[  469.640015] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  469.669612] FAT-fs (loop2): Filesystem has been set read-only
13:22:03 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010500"/18, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:22:03 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

[  469.683297] audit: type=1804 audit(1572960122.870:309): pid=13810 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/263/file0/file0" dev="loop2" ino=52 res=1
[  469.744826] FAT-fs (loop2): error, invalid access to FAT (entry 0x000064ff)
13:22:03 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010500"/18, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:22:03 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:03 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:03 executing program 3:
r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

[  469.826544] audit: type=1800 audit(1572960122.870:310): pid=13810 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=52 res=0
[  469.944549] audit: type=1800 audit(1572960123.230:311): pid=13849 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=53 res=0
[  470.009788] audit: type=1804 audit(1572960123.240:312): pid=13849 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/264/file0/file0" dev="loop2" ino=53 res=1
[  470.013647] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  470.083229] audit: type=1800 audit(1572960123.240:313): pid=13849 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=53 res=0
[  470.089869] FAT-fs (loop2): Filesystem has been set read-only
[  470.116900] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17)
13:22:03 executing program 5:
r0 = socket$inet6(0xa, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:03 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010500"/18, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:22:03 executing program 3:
r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:03 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:03 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:03 executing program 4:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:03 executing program 3:
r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

[  470.365886] audit: type=1800 audit(1572960123.660:314): pid=13865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=54 res=0
[  470.442709] IPv6: addrconf: prefix option has invalid lifetime
[  470.443671] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  470.456811] audit: type=1804 audit(1572960123.660:315): pid=13865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/265/file0/file0" dev="loop2" ino=54 res=1
[  470.473785] FAT-fs (loop2): Filesystem has been set read-only
[  470.491378] audit: type=1800 audit(1572960123.660:316): pid=13865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=54 res=0
[  470.525174] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17)
[  470.600569] device bridge_slave_1 left promiscuous mode
[  470.606072] bridge0: port 2(bridge_slave_1) entered disabled state
[  470.650848] device bridge_slave_0 left promiscuous mode
[  470.656575] bridge0: port 1(bridge_slave_0) entered disabled state
[  470.765316] device hsr_slave_1 left promiscuous mode
[  470.804056] device hsr_slave_0 left promiscuous mode
[  470.854150] team0 (unregistering): Port device team_slave_1 removed
[  470.863710] team0 (unregistering): Port device team_slave_0 removed
[  470.873085] bond0 (unregistering): Releasing backup interface bond_slave_1
[  470.923119] bond0 (unregistering): Releasing backup interface bond_slave_0
[  471.002735] bond0 (unregistering): Released all slaves
[  472.791370] IPVS: ftp: loaded support on port[0] = 21
[  473.607523] chnl_net:caif_netlink_parms(): no params data found
[  473.639033] bridge0: port 1(bridge_slave_0) entered blocking state
[  473.645511] bridge0: port 1(bridge_slave_0) entered disabled state
[  473.652689] device bridge_slave_0 entered promiscuous mode
[  473.659140] bridge0: port 2(bridge_slave_1) entered blocking state
[  473.665675] bridge0: port 2(bridge_slave_1) entered disabled state
[  473.672679] device bridge_slave_1 entered promiscuous mode
[  473.690423] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  473.699108] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  473.716749] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  473.723986] team0: Port device team_slave_0 added
[  473.729433] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  473.736611] team0: Port device team_slave_1 added
[  473.741984] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  473.749152] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  473.832131] device hsr_slave_0 entered promiscuous mode
[  473.900475] device hsr_slave_1 entered promiscuous mode
[  473.940736] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  473.947731] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  473.959833] bridge0: port 2(bridge_slave_1) entered blocking state
[  473.966241] bridge0: port 2(bridge_slave_1) entered forwarding state
[  473.972888] bridge0: port 1(bridge_slave_0) entered blocking state
[  473.979220] bridge0: port 1(bridge_slave_0) entered forwarding state
[  474.006852] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  474.013601] 8021q: adding VLAN 0 to HW filter on device bond0
[  474.022359] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  474.031233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  474.038251] bridge0: port 1(bridge_slave_0) entered disabled state
[  474.045013] bridge0: port 2(bridge_slave_1) entered disabled state
[  474.055116] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  474.061281] 8021q: adding VLAN 0 to HW filter on device team0
[  474.069463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  474.077550] bridge0: port 1(bridge_slave_0) entered blocking state
[  474.083916] bridge0: port 1(bridge_slave_0) entered forwarding state
[  474.100942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  474.108481] bridge0: port 2(bridge_slave_1) entered blocking state
[  474.114934] bridge0: port 2(bridge_slave_1) entered forwarding state
[  474.123033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  474.130735] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  474.138643] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  474.147089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  474.157177] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  474.167882] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  474.175296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  474.182508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  474.194015] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  474.203760] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  474.210879] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  474.221936] 8021q: adding VLAN 0 to HW filter on device batadv0
[  474.600647] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:22:08 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:08 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010500"/19, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:22:08 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:08 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:08 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:08 executing program 5:
r0 = socket$inet6(0xa, 0x0, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:08 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:08 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010500"/19, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

[  475.458494] audit: type=1800 audit(1572960128.750:317): pid=13903 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=55 res=0
13:22:08 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  475.564807] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
13:22:08 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:08 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001000010500"/19, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:22:08 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

[  475.605159] audit: type=1804 audit(1572960128.780:318): pid=13903 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/266/file0/file0" dev="loop2" ino=55 res=1
13:22:08 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  475.654350] FAT-fs (loop2): Filesystem has been set read-only
13:22:09 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
r2 = socket(0x0, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:22:09 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

[  475.696462] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
13:22:09 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:09 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0xa, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  475.782514] audit: type=1800 audit(1572960128.780:319): pid=13903 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=55 res=0
[  475.959056] audit: type=1800 audit(1572960129.250:320): pid=13948 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=56 res=0
[  476.023503] audit: type=1804 audit(1572960129.280:321): pid=13948 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/267/file0/file0" dev="loop2" ino=56 res=1
[  476.036648] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  476.059473] FAT-fs (loop2): Filesystem has been set read-only
[  476.061533] audit: type=1800 audit(1572960129.280:322): pid=13948 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=56 res=0
[  476.066949] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17)
13:22:09 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x0, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:09 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:09 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:09 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
r2 = socket(0x0, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

[  476.310435] device bridge_slave_1 left promiscuous mode
[  476.318260] bridge0: port 2(bridge_slave_1) entered disabled state
[  476.361243] device bridge_slave_0 left promiscuous mode
[  476.366785] bridge0: port 1(bridge_slave_0) entered disabled state
[  476.473368] device hsr_slave_1 left promiscuous mode
[  476.513650] device hsr_slave_0 left promiscuous mode
[  476.553877] team0 (unregistering): Port device team_slave_1 removed
[  476.563269] team0 (unregistering): Port device team_slave_0 removed
[  476.572434] bond0 (unregistering): Releasing backup interface bond_slave_1
[  476.613236] bond0 (unregistering): Releasing backup interface bond_slave_0
[  476.681388] bond0 (unregistering): Released all slaves
[  478.340866] IPVS: ftp: loaded support on port[0] = 21
[  479.297681] chnl_net:caif_netlink_parms(): no params data found
[  479.329978] bridge0: port 1(bridge_slave_0) entered blocking state
[  479.336491] bridge0: port 1(bridge_slave_0) entered disabled state
[  479.343524] device bridge_slave_0 entered promiscuous mode
[  479.349973] bridge0: port 2(bridge_slave_1) entered blocking state
[  479.356514] bridge0: port 2(bridge_slave_1) entered disabled state
[  479.363624] device bridge_slave_1 entered promiscuous mode
[  479.383320] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  479.392307] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  479.409604] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  479.416866] team0: Port device team_slave_0 added
[  479.422369] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  479.429367] team0: Port device team_slave_1 added
[  479.435462] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  479.443099] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  479.502104] device hsr_slave_0 entered promiscuous mode
[  479.550421] device hsr_slave_1 entered promiscuous mode
[  479.600673] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  479.607594] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  479.619711] bridge0: port 2(bridge_slave_1) entered blocking state
[  479.626085] bridge0: port 2(bridge_slave_1) entered forwarding state
[  479.632707] bridge0: port 1(bridge_slave_0) entered blocking state
[  479.639040] bridge0: port 1(bridge_slave_0) entered forwarding state
[  479.664296] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  479.670609] 8021q: adding VLAN 0 to HW filter on device bond0
[  479.678403] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  479.687199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  479.694466] bridge0: port 1(bridge_slave_0) entered disabled state
[  479.703265] bridge0: port 2(bridge_slave_1) entered disabled state
[  479.712370] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  479.718524] 8021q: adding VLAN 0 to HW filter on device team0
[  479.727735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  479.735356] bridge0: port 1(bridge_slave_0) entered blocking state
[  479.741724] bridge0: port 1(bridge_slave_0) entered forwarding state
[  479.751343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  479.758878] bridge0: port 2(bridge_slave_1) entered blocking state
[  479.765242] bridge0: port 2(bridge_slave_1) entered forwarding state
[  479.781024] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  479.788613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  479.796516] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  479.806134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  479.817716] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  479.828123] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  479.834581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  479.842100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  479.854749] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  479.863381] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  479.870441] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  479.881163] 8021q: adding VLAN 0 to HW filter on device batadv0
[  480.300416] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:22:14 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:14 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x0, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:14 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:14 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:14 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:14 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
r2 = socket(0x0, 0x800000000080002, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:22:14 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040))
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:14 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
r2 = socket(0x10, 0x0, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:22:14 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:14 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
r2 = socket(0x10, 0x0, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

[  481.201530] audit: type=1800 audit(1572960134.500:323): pid=13986 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=57 res=0
13:22:14 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:14 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040))
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

[  481.331410] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  481.340867] audit: type=1804 audit(1572960134.540:324): pid=14003 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/268/file0/file0" dev="loop2" ino=57 res=1
[  481.407442] FAT-fs (loop2): Filesystem has been set read-only
[  481.442921] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
[  481.479129] audit: type=1800 audit(1572960134.550:325): pid=14003 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=57 res=0
[  481.890524] device bridge_slave_1 left promiscuous mode
[  481.896014] bridge0: port 2(bridge_slave_1) entered disabled state
[  481.940953] device bridge_slave_0 left promiscuous mode
[  481.946444] bridge0: port 1(bridge_slave_0) entered disabled state
[  482.063619] device hsr_slave_1 left promiscuous mode
[  482.102542] device hsr_slave_0 left promiscuous mode
[  482.143986] team0 (unregistering): Port device team_slave_1 removed
[  482.153313] team0 (unregistering): Port device team_slave_0 removed
[  482.163101] bond0 (unregistering): Releasing backup interface bond_slave_1
[  482.204867] bond0 (unregistering): Releasing backup interface bond_slave_0
[  482.281848] bond0 (unregistering): Released all slaves
[  484.060867] IPVS: ftp: loaded support on port[0] = 21
[  484.867293] chnl_net:caif_netlink_parms(): no params data found
[  484.899314] bridge0: port 1(bridge_slave_0) entered blocking state
[  484.905919] bridge0: port 1(bridge_slave_0) entered disabled state
[  484.912983] device bridge_slave_0 entered promiscuous mode
[  484.919485] bridge0: port 2(bridge_slave_1) entered blocking state
[  484.926145] bridge0: port 2(bridge_slave_1) entered disabled state
[  484.933062] device bridge_slave_1 entered promiscuous mode
[  484.949709] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  484.958730] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  484.978226] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  484.986049] team0: Port device team_slave_0 added
[  484.991436] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  484.998417] team0: Port device team_slave_1 added
[  485.003784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  485.011048] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  485.092060] device hsr_slave_0 entered promiscuous mode
[  485.130297] device hsr_slave_1 entered promiscuous mode
[  485.170455] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  485.177284] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  485.189368] bridge0: port 2(bridge_slave_1) entered blocking state
[  485.195744] bridge0: port 2(bridge_slave_1) entered forwarding state
[  485.202389] bridge0: port 1(bridge_slave_0) entered blocking state
[  485.208719] bridge0: port 1(bridge_slave_0) entered forwarding state
[  485.238005] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  485.245003] 8021q: adding VLAN 0 to HW filter on device bond0
[  485.253927] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  485.262831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  485.269847] bridge0: port 1(bridge_slave_0) entered disabled state
[  485.276566] bridge0: port 2(bridge_slave_1) entered disabled state
[  485.285655] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  485.291877] 8021q: adding VLAN 0 to HW filter on device team0
[  485.299910] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  485.307974] bridge0: port 1(bridge_slave_0) entered blocking state
[  485.314342] bridge0: port 1(bridge_slave_0) entered forwarding state
[  485.331959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  485.339517] bridge0: port 2(bridge_slave_1) entered blocking state
[  485.345899] bridge0: port 2(bridge_slave_1) entered forwarding state
[  485.353400] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  485.361354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  485.368867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  485.377410] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  485.386153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  485.395829] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  485.402165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  485.415390] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  485.422778] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  485.429409] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  485.439301] 8021q: adding VLAN 0 to HW filter on device batadv0
[  485.860632] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:22:20 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:20 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x0, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:20 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:20 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040))
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:20 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
r2 = socket(0x10, 0x0, 0x0)
sendmmsg$alg(r2, &(0x7f0000000140), 0x52b, 0x0)

13:22:20 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:20 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:20 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:20 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x52b, 0x0)

[  486.787862] audit: type=1800 audit(1572960140.080:326): pid=14045 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=58 res=0
13:22:20 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:20 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:20 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:20 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, 0x0)
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r2=>0x0})
tkill(r2, 0x7)
process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

[  486.937466] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  486.954440] audit: type=1804 audit(1572960140.110:327): pid=14045 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/269/file0/file0" dev="loop2" ino=58 res=1
13:22:20 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x52b, 0x0)

[  486.974059] FAT-fs (loop2): Filesystem has been set read-only
13:22:20 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000380)={0x0, 0x228, 0x0, 0x0, 0xdddd4351dbc15bb6})

13:22:20 executing program 4:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:22:20 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x52b, 0x0)

[  487.027237] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
13:22:20 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, 0x0)

13:22:20 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x2, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:20 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, 0x0, 0x0, 0x0)

13:22:20 executing program 4:
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x824000, 0x0)

[  487.185126] audit: type=1800 audit(1572960140.110:328): pid=14045 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=58 res=0
[  487.296320] audit: type=1800 audit(1572960140.530:329): pid=14093 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=59 res=0
[  487.356359] audit: type=1804 audit(1572960140.530:330): pid=14093 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/270/file0/file0" dev="loop2" ino=59 res=1
[  487.408794] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  487.413857] audit: type=1800 audit(1572960140.540:331): pid=14093 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=59 res=0
[  487.434750] FAT-fs (loop2): Filesystem has been set read-only
[  487.461288] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
13:22:21 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:21 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, 0x0, 0x0, 0x0)

13:22:21 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, 0x0)

[  487.710557] device bridge_slave_1 left promiscuous mode
[  487.716081] bridge0: port 2(bridge_slave_1) entered disabled state
[  487.774838] device bridge_slave_0 left promiscuous mode
[  487.787763] bridge0: port 1(bridge_slave_0) entered disabled state
[  487.883582] device hsr_slave_1 left promiscuous mode
[  487.934548] device hsr_slave_0 left promiscuous mode
[  487.974415] team0 (unregistering): Port device team_slave_1 removed
[  487.984288] team0 (unregistering): Port device team_slave_0 removed
[  487.993709] bond0 (unregistering): Releasing backup interface bond_slave_1
[  488.035186] bond0 (unregistering): Releasing backup interface bond_slave_0
[  488.114837] bond0 (unregistering): Released all slaves
[  489.871421] IPVS: ftp: loaded support on port[0] = 21
[  490.939113] chnl_net:caif_netlink_parms(): no params data found
[  490.972851] bridge0: port 1(bridge_slave_0) entered blocking state
[  490.979452] bridge0: port 1(bridge_slave_0) entered disabled state
[  490.987523] device bridge_slave_0 entered promiscuous mode
[  490.994675] bridge0: port 2(bridge_slave_1) entered blocking state
[  491.001447] bridge0: port 2(bridge_slave_1) entered disabled state
[  491.008460] device bridge_slave_1 entered promiscuous mode
[  491.025529] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  491.034891] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  491.051190] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  491.058308] team0: Port device team_slave_0 added
[  491.063843] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  491.070984] team0: Port device team_slave_1 added
[  491.076368] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  491.083772] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  491.132245] device hsr_slave_0 entered promiscuous mode
[  491.170397] device hsr_slave_1 entered promiscuous mode
[  491.210556] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  491.217549] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  491.231493] bridge0: port 2(bridge_slave_1) entered blocking state
[  491.237946] bridge0: port 2(bridge_slave_1) entered forwarding state
[  491.244843] bridge0: port 1(bridge_slave_0) entered blocking state
[  491.251244] bridge0: port 1(bridge_slave_0) entered forwarding state
[  491.278294] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  491.284627] 8021q: adding VLAN 0 to HW filter on device bond0
[  491.292921] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  491.301913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  491.309009] bridge0: port 1(bridge_slave_0) entered disabled state
[  491.317128] bridge0: port 2(bridge_slave_1) entered disabled state
[  491.326448] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  491.332813] 8021q: adding VLAN 0 to HW filter on device team0
[  491.341173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  491.348719] bridge0: port 1(bridge_slave_0) entered blocking state
[  491.355123] bridge0: port 1(bridge_slave_0) entered forwarding state
[  491.365594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  491.373378] bridge0: port 2(bridge_slave_1) entered blocking state
[  491.379861] bridge0: port 2(bridge_slave_1) entered forwarding state
[  491.398849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  491.410856] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  491.418025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  491.427419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  491.439121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  491.448670] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  491.454923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  491.467479] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  491.475779] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  491.482746] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  491.493276] 8021q: adding VLAN 0 to HW filter on device batadv0
[  491.930347] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:22:25 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, 0x0)
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r2=>0x0})
tkill(r2, 0x7)
process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:25 executing program 4:
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x824000, 0x0)

13:22:25 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:25 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, 0x0)

13:22:25 executing program 0:
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000105000000000000000000000012", @ANYRES32=0x0, @ANYBLOB="0000000000000000240012000c000100626f6e64000000001400020008000500020000000800010004000000"], 0x44}}, 0x0)
r2 = socket(0x10, 0x800000000080002, 0x0)
sendmmsg$alg(r2, 0x0, 0x0, 0x0)

13:22:25 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:26 executing program 4:
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x824000, 0x0)

13:22:26 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0xdddd4351dbc15bb6})

[  492.755321] audit: type=1800 audit(1572960146.050:332): pid=14139 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=60 res=0
13:22:26 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, 0x0)
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r2=>0x0})
tkill(r2, 0x7)
process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:26 executing program 4:
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x824000, 0x0)

13:22:26 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0xdddd4351dbc15bb6})

[  492.865410] audit: type=1804 audit(1572960146.050:333): pid=14139 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/271/file0/file0" dev="loop2" ino=60 res=1
[  492.902658] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
13:22:26 executing program 4:
openat$ashmem(0xffffffffffffff9c, 0x0, 0x824000, 0x0)

[  492.936795] FAT-fs (loop2): Filesystem has been set read-only
[  492.953116] audit: type=1800 audit(1572960146.050:334): pid=14139 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=60 res=0
13:22:26 executing program 0:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0900000000003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97bdc56a39da4d44a994474a9fa3f355214eeabd24fd620b2022d5ad63b369aaffe9a6b608a5fede0eca95d71f2d3e60613a027fb50cbcbd92d40700000000", 0x74}], 0x4, 0x0)
sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2018}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff})
r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = dup2(r2, r3)
r5 = fcntl$dupfd(r4, 0x0, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

13:22:26 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0xdddd4351dbc15bb6})

[  492.982460] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
13:22:26 executing program 4:
openat$ashmem(0xffffffffffffff9c, 0x0, 0x824000, 0x0)

13:22:26 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228})

13:22:26 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x101000, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  493.038414] __report_access: 1 callbacks suppressed
[  493.038421] ptrace attach of "/root/syz-executor.0"[14167] was attempted by "/root/syz-executor.0"[14169]
[  493.159557] audit: type=1800 audit(1572960146.450:335): pid=14179 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=61 res=0
[  493.250144] audit: type=1804 audit(1572960146.460:336): pid=14179 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/272/file0/file0" dev="loop2" ino=61 res=1
[  493.269564] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  493.296243] audit: type=1800 audit(1572960146.460:337): pid=14179 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=61 res=0
[  493.319346] FAT-fs (loop2): Filesystem has been set read-only
[  493.328939] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
13:22:26 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, 0x0, 0x0)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:26 executing program 4:
openat$ashmem(0xffffffffffffff9c, 0x0, 0x824000, 0x0)

13:22:26 executing program 0:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb03532ff2e3335100d5812fb4f77dcbd7a9b3cffd7a7c0c92465e5f9cc839639013a54121aaba9d7ae45b0051a1221af2772a9567bb821942ce72590f1bf41d20d4c000000279bd612811df1fcea94a96d58", 0x81}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

[  493.534904] ptrace attach of "/root/syz-executor.0"[14190] was attempted by "/root/syz-executor.0"[14191]
[  493.650503] device bridge_slave_1 left promiscuous mode
[  493.656176] bridge0: port 2(bridge_slave_1) entered disabled state
[  493.710980] device bridge_slave_0 left promiscuous mode
[  493.716615] bridge0: port 1(bridge_slave_0) entered disabled state
[  493.795163] device hsr_slave_1 left promiscuous mode
[  493.862626] device hsr_slave_0 left promiscuous mode
[  493.902974] team0 (unregistering): Port device team_slave_1 removed
[  493.913159] team0 (unregistering): Port device team_slave_0 removed
[  493.923598] bond0 (unregistering): Releasing backup interface bond_slave_1
[  493.963332] bond0 (unregistering): Releasing backup interface bond_slave_0
[  494.022661] bond0 (unregistering): Released all slaves
[  495.850892] IPVS: ftp: loaded support on port[0] = 21
[  496.736144] chnl_net:caif_netlink_parms(): no params data found
[  496.767653] bridge0: port 1(bridge_slave_0) entered blocking state
[  496.774162] bridge0: port 1(bridge_slave_0) entered disabled state
[  496.781105] device bridge_slave_0 entered promiscuous mode
[  496.787507] bridge0: port 2(bridge_slave_1) entered blocking state
[  496.793955] bridge0: port 2(bridge_slave_1) entered disabled state
[  496.801139] device bridge_slave_1 entered promiscuous mode
[  496.817424] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  496.826403] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  496.842873] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  496.849912] team0: Port device team_slave_0 added
[  496.855520] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  496.862643] team0: Port device team_slave_1 added
[  496.867872] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  496.875271] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  496.943546] device hsr_slave_0 entered promiscuous mode
[  497.010385] device hsr_slave_1 entered promiscuous mode
[  497.050777] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  497.057702] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  497.070389] bridge0: port 2(bridge_slave_1) entered blocking state
[  497.076761] bridge0: port 2(bridge_slave_1) entered forwarding state
[  497.083656] bridge0: port 1(bridge_slave_0) entered blocking state
[  497.090008] bridge0: port 1(bridge_slave_0) entered forwarding state
[  497.115771] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  497.122595] 8021q: adding VLAN 0 to HW filter on device bond0
[  497.131552] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  497.139663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  497.147520] bridge0: port 1(bridge_slave_0) entered disabled state
[  497.154419] bridge0: port 2(bridge_slave_1) entered disabled state
[  497.164950] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  497.171282] 8021q: adding VLAN 0 to HW filter on device team0
[  497.179360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  497.187049] bridge0: port 1(bridge_slave_0) entered blocking state
[  497.193438] bridge0: port 1(bridge_slave_0) entered forwarding state
[  497.210578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  497.218119] bridge0: port 2(bridge_slave_1) entered blocking state
[  497.224500] bridge0: port 2(bridge_slave_1) entered forwarding state
[  497.232437] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  497.239986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  497.248038] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  497.256957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  497.268319] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  497.278508] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  497.285843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  497.293339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  497.306889] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  497.314914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  497.321836] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  497.332675] 8021q: adding VLAN 0 to HW filter on device batadv0
[  497.730346] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:22:31 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:31 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228})

13:22:31 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:31 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:31 executing program 4:
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0)

13:22:31 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, 0x0, 0x0)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:31 executing program 4:
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0)

13:22:32 executing program 3:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}})
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x228})

[  498.670891] audit: type=1800 audit(1572960151.970:338): pid=14216 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=62 res=0
13:22:32 executing program 4:
openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0)

13:22:32 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

[  498.749776] audit: type=1804 audit(1572960151.970:339): pid=14216 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/273/file0/file0" dev="loop2" ino=62 res=1
13:22:32 executing program 3:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0900000000003639408fa3a3ba27660199783b", 0x13}], 0x4, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup2(r2, r1)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffffffffcdb, 0x0, 0xfffffeda}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000ec0)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRESHEX]], 0x1)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

[  498.809935] audit: type=1800 audit(1572960151.970:340): pid=14216 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=62 res=0
13:22:32 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast1}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6)
sendto$inet(r0, 0x0, 0x0, 0x22000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10)
sendmmsg$inet(r0, &(0x7f0000006e80)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000002a00)='F', 0x1}], 0x1}}], 0x1, 0x6049054)
r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r2 = dup(r1)
r3 = dup3(r0, r2, 0x0)
sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x800b, 0x0, {0x8}}}, 0x24}}, 0x0)

[  498.883109] ptrace attach of "/root/syz-executor.3"[14236] was attempted by "/root/syz-executor.3"[14237]
13:22:32 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:32 executing program 4:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, 0x0, @in6=@rand_addr="00c8e8767e00", 0x0, 0x0, 0x0, 0x5}}, 0xe8)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1c)
sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0)

[  498.928413] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  498.945850] FAT-fs (loop2): Filesystem has been set read-only
[  498.965679] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF
13:22:32 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:32 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffd82}, {0x0, 0xfffffffffffffeee}, {0x0, 0xffffffffffffff4f}, {&(0x7f0000000200)="090000000000363940d3c7a3ba27660199783b0a82f79b3207b4bcfa7790ac47a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24fd620b2022d5ad63b369aaffe9a6b608a5fece0eca95d71f2d3e60633a027fb50cbcbd92d44076d3b97247e066165ccf1032f51d36ab231f6c20d87e9167edf69776dca67d90a17ccd18fb9c5b2cb0c26bd0254072ba9bf0fc3d7b21d53478e382dcf296a23a060bfe5519de6c998ed4984eee3b3e9f030065b32c5428b09815f36dec66a130a0956915cdbd3ff71bb14c87b3a8a728a8ac0a0cbd9e86", 0x7f}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3d)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

13:22:32 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

[  499.180992] audit: type=1800 audit(1572960152.480:341): pid=14265 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=63 res=0
[  499.274720] audit: type=1804 audit(1572960152.530:342): pid=14277 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/274/file0/file0" dev="loop2" ino=63 res=1
[  499.305973] audit: type=1800 audit(1572960152.530:343): pid=14277 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=63 res=0
13:22:32 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, 0x0, 0x0)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:32 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:32 executing program 4:
io_setup(0x9f2, &(0x7f0000000040))
recvmmsg(0xffffffffffffffff, &(0x7f0000009740)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000003c0)=""/75, 0x4b}, {0x0}], 0x2}}], 0x1, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
write$char_usb(0xffffffffffffffff, 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='syscall\x00')
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp\x00')
preadv(r0, &(0x7f0000000480), 0x1000000000000181, 0x0)
futex(&(0x7f0000000100), 0x0, 0x2, 0x0, 0x0, 0x2)
socket$inet6(0xa, 0x0, 0x3c)
syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f)
ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)

13:22:32 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  499.400433] device bridge_slave_1 left promiscuous mode
[  499.405930] bridge0: port 2(bridge_slave_1) entered disabled state
[  499.437855] audit: type=1800 audit(1572960152.730:344): pid=14283 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=64 res=0
[  499.480963] device bridge_slave_0 left promiscuous mode
[  499.483767] audit: type=1804 audit(1572960152.730:345): pid=14283 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/275/file0/file0" dev="loop2" ino=64 res=1
[  499.487890] bridge0: port 1(bridge_slave_0) entered disabled state
[  499.518662] audit: type=1800 audit(1572960152.730:346): pid=14283 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=64 res=0
[  499.673482] device hsr_slave_1 left promiscuous mode
[  499.725616] device hsr_slave_0 left promiscuous mode
[  499.782805] team0 (unregistering): Port device team_slave_1 removed
[  499.794183] team0 (unregistering): Port device team_slave_0 removed
[  499.805312] bond0 (unregistering): Releasing backup interface bond_slave_1
[  499.866528] bond0 (unregistering): Releasing backup interface bond_slave_0
[  499.923183] bond0 (unregistering): Released all slaves
[  501.660880] IPVS: ftp: loaded support on port[0] = 21
[  502.458173] chnl_net:caif_netlink_parms(): no params data found
[  502.489809] bridge0: port 1(bridge_slave_0) entered blocking state
[  502.496362] bridge0: port 1(bridge_slave_0) entered disabled state
[  502.503307] device bridge_slave_0 entered promiscuous mode
[  502.509779] bridge0: port 2(bridge_slave_1) entered blocking state
[  502.516376] bridge0: port 2(bridge_slave_1) entered disabled state
[  502.524592] device bridge_slave_1 entered promiscuous mode
[  502.539991] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  502.549121] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  502.565811] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  502.573024] team0: Port device team_slave_0 added
[  502.578430] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  502.586359] team0: Port device team_slave_1 added
[  502.591719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  502.599748] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  502.652110] device hsr_slave_0 entered promiscuous mode
[  502.690343] device hsr_slave_1 entered promiscuous mode
[  502.770550] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  502.777465] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  502.789691] bridge0: port 2(bridge_slave_1) entered blocking state
[  502.796203] bridge0: port 2(bridge_slave_1) entered forwarding state
[  502.802856] bridge0: port 1(bridge_slave_0) entered blocking state
[  502.809245] bridge0: port 1(bridge_slave_0) entered forwarding state
[  502.836552] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  502.843071] 8021q: adding VLAN 0 to HW filter on device bond0
[  502.851569] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  502.859732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  502.867554] bridge0: port 1(bridge_slave_0) entered disabled state
[  502.874551] bridge0: port 2(bridge_slave_1) entered disabled state
[  502.884629] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  502.891069] 8021q: adding VLAN 0 to HW filter on device team0
[  502.899352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  502.907169] bridge0: port 1(bridge_slave_0) entered blocking state
[  502.913598] bridge0: port 1(bridge_slave_0) entered forwarding state
[  502.923834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  502.931645] bridge0: port 2(bridge_slave_1) entered blocking state
[  502.937979] bridge0: port 2(bridge_slave_1) entered forwarding state
[  502.951550] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  502.959081] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  502.969277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  502.979222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  502.990806] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  503.000920] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  503.007002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  503.018685] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  503.026274] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  503.033367] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  503.045461] 8021q: adding VLAN 0 to HW filter on device batadv0
[  503.450901] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:22:37 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:37 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x200)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:37 executing program 4:
io_setup(0x9f2, &(0x7f0000000040))
recvmmsg(0xffffffffffffffff, &(0x7f0000009740)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000003c0)=""/75, 0x4b}, {0x0}], 0x2}}], 0x1, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
write$char_usb(0xffffffffffffffff, 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='syscall\x00')
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp\x00')
preadv(r0, &(0x7f0000000480), 0x1000000000000181, 0x0)
futex(&(0x7f0000000100), 0x0, 0x2, 0x0, 0x0, 0x2)
socket$inet6(0xa, 0x0, 0x3c)
syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f)
ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)

13:22:37 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:37 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040), 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:37 executing program 3:
io_setup(0x9f2, &(0x7f0000000040))
recvmmsg(0xffffffffffffffff, &(0x7f0000009740)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000003c0)=""/75, 0x4b}, {0x0}], 0x2}}], 0x1, 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
write$char_usb(0xffffffffffffffff, 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='syscall\x00')
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp\x00')
preadv(r0, &(0x7f0000000480), 0x1000000000000181, 0x0)
futex(&(0x7f0000000100), 0x0, 0x2, 0x0, 0x0, 0x2)
socket$inet6(0xa, 0x0, 0x3c)
syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f)
ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)

[  504.253086] ptrace attach of "/root/syz-executor.1"[14308] was attempted by "/root/syz-executor.1"[14321]
[  504.299723] ptrace attach of "/root/syz-executor.1"[14308] was attempted by "/root/syz-executor.1"[14329]
13:22:37 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

[  504.347434] audit: type=1800 audit(1572960157.640:347): pid=14334 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=65 res=0
13:22:37 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:37 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, 0x0, 0x0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:37 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

[  504.511621] ptrace attach of "/root/syz-executor.1"[14308] was attempted by "/root/syz-executor.1"[14353]
13:22:37 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

[  504.549731] audit: type=1804 audit(1572960157.680:348): pid=14334 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/276/file0/file0" dev="loop2" ino=65 res=1
13:22:37 executing program 0:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280))

13:22:38 executing program 0:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280))

13:22:38 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, 0x0, 0x0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  504.677329] ptrace attach of "/root/syz-executor.1"[14308] was attempted by "/root/syz-executor.1"[14363]
13:22:38 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:22:38 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

[  504.737497] audit: type=1800 audit(1572960157.680:349): pid=14334 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=65 res=0
[  504.808372] audit: type=1800 audit(1572960158.000:350): pid=14362 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=66 res=0
[  504.833806] audit: type=1804 audit(1572960158.000:351): pid=14362 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/277/file0/file0" dev="loop2" ino=66 res=1
[  504.862582] audit: type=1800 audit(1572960158.000:352): pid=14362 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=66 res=0
[  504.943602] ptrace attach of "/root/syz-executor.1"[14308] was attempted by "/root/syz-executor.1"[14384]
[  504.977814] audit: type=1800 audit(1572960158.190:353): pid=14377 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=67 res=0
[  505.005861] audit: type=1804 audit(1572960158.200:354): pid=14377 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/278/file0/file0" dev="loop2" ino=67 res=1
[  505.033758] audit: type=1800 audit(1572960158.200:355): pid=14377 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=67 res=0
13:22:38 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040), 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:38 executing program 0:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280))

13:22:38 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0)
rmdir(&(0x7f0000000240)='./file0//ile0\x00')
socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="4d100c1dbe3cdcfce179e4da5aed7bcb49fefb6c8146f00b0b16a21d99ac66d1b9c8c4b4051d5c0609172809201580113f374f96bd05d3bde52576eefc57e7d4082cc512e19b7f957524559008132c933278db42056d7f1b505fa421d858388975235821a51dcd32c5dc265941c4267726f970e3b463a5c927a1f4e5bdae28075bb55e8569211d2db59e", 0x8a, 0xfffffffffffffffe)
mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0)

13:22:38 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, 0x0, 0x0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:38 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, 0x0)
tkill(0x0, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

[  505.138943] ptrace attach of "/root/syz-executor.1"[14308] was attempted by "/root/syz-executor.1"[14395]
13:22:38 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600), 0x0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:38 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:38 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, 0x0)
tkill(0x0, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

[  505.174239] audit: type=1800 audit(1572960158.460:356): pid=14398 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=68 res=0
13:22:38 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0)
rmdir(&(0x7f0000000240)='./file0//ile0\x00')
socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="4d100c1dbe3cdcfce179e4da5aed7bcb49fefb6c8146f00b0b16a21d99ac66d1b9c8c4b4051d5c0609172809201580113f374f96bd05d3bde52576eefc57e7d4082cc512e19b7f957524559008132c933278db42056d7f1b505fa421d858388975235821a51dcd32c5dc265941c4267726f970e3b463a5c927a1f4e5bdae28075bb55e8569211d2db59e", 0x8a, 0xfffffffffffffffe)
mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0)

13:22:38 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

[  505.258048] ptrace attach of "/root/syz-executor.1"[14308] was attempted by "/root/syz-executor.1"[14412]
13:22:38 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:22:38 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, 0x0)
tkill(0x0, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

[  505.606393] ptrace attach of "/root/syz-executor.1"[14308] was attempted by "/root/syz-executor.1"[14432]
13:22:39 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040), 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:39 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:39 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600), 0x0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:39 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0)
rmdir(&(0x7f0000000240)='./file0//ile0\x00')
socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="4d100c1dbe3cdcfce179e4da5aed7bcb49fefb6c8146f00b0b16a21d99ac66d1b9c8c4b4051d5c0609172809201580113f374f96bd05d3bde52576eefc57e7d4082cc512e19b7f957524559008132c933278db42056d7f1b505fa421d858388975235821a51dcd32c5dc265941c4267726f970e3b463a5c927a1f4e5bdae28075bb55e8569211d2db59e", 0x8a, 0xfffffffffffffffe)
mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0)

13:22:39 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140))
tkill(0x0, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:39 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:39 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140))
tkill(0x0, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

[  505.985946] ptrace attach of "/root/syz-executor.1"[14308] was attempted by "/root/syz-executor.1"[14442]
13:22:39 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0)
rmdir(&(0x7f0000000240)='./file0//ile0\x00')
socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="4d100c1dbe3cdcfce179e4da5aed7bcb49fefb6c8146f00b0b16a21d99ac66d1b9c8c4b4051d5c0609172809201580113f374f96bd05d3bde52576eefc57e7d4082cc512e19b7f957524559008132c933278db42056d7f1b505fa421d858388975235821a51dcd32c5dc265941c4267726f970e3b463a5c927a1f4e5bdae28075bb55e8569211d2db59e", 0x8a, 0xfffffffffffffffe)
mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0)

13:22:39 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600), 0x0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:39 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

[  506.115090] ptrace attach of "/root/syz-executor.1"[14308] was attempted by "/root/syz-executor.1"[14458]
13:22:39 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:22:39 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140))
tkill(0x0, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:40 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:40 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:40 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0)
rmdir(&(0x7f0000000240)='./file0//ile0\x00')
socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="4d100c1dbe3cdcfce179e4da5aed7bcb49fefb6c8146f00b0b16a21d99ac66d1b9c8c4b4051d5c0609172809201580113f374f96bd05d3bde52576eefc57e7d4082cc512e19b7f957524559008132c933278db42056d7f1b505fa421d858388975235821a51dcd32c5dc265941c4267726f970e3b463a5c927a1f4e5bdae28075bb55e8569211d2db59e", 0x8a, 0xfffffffffffffffe)
mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0)

13:22:40 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x100)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:40 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x0)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:40 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x0)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:40 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:40 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:40 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:22:40 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x0)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:40 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:22:40 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x100)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:40 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:40 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140))
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r2=>0x0})
tkill(r2, 0x7)
process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:40 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:22:40 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:40 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:22:40 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:40 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x100)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:40 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:40 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:22:40 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:41 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
splice(r0, 0x0, r1, 0x0, 0x10003, 0x0)

13:22:41 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140))
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r2=>0x0})
tkill(r2, 0x7)
process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:41 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

13:22:41 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:41 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:22:41 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x180)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  508.078953] device bridge_slave_1 left promiscuous mode
[  508.095980] bridge0: port 2(bridge_slave_1) entered disabled state
13:22:41 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:41 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x180)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  508.170827] device bridge_slave_0 left promiscuous mode
[  508.190504] bridge0: port 1(bridge_slave_0) entered disabled state
13:22:41 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, 0x0, 0x0)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

[  508.333253] device hsr_slave_1 left promiscuous mode
13:22:41 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x180)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  508.374135] device hsr_slave_0 left promiscuous mode
13:22:41 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, 0x0, 0x0)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

[  508.415860] team0 (unregistering): Port device team_slave_1 removed
[  508.430537] team0 (unregistering): Port device team_slave_0 removed
[  508.439599] bond0 (unregistering): Releasing backup interface bond_slave_1
[  508.453897] bond0 (unregistering): Releasing backup interface bond_slave_0
13:22:41 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1c0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  508.548418] bond0 (unregistering): Released all slaves
13:22:42 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'})
ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000280))

[  510.321399] IPVS: ftp: loaded support on port[0] = 21
[  511.288165] chnl_net:caif_netlink_parms(): no params data found
[  511.320305] bridge0: port 1(bridge_slave_0) entered blocking state
[  511.326728] bridge0: port 1(bridge_slave_0) entered disabled state
[  511.333843] device bridge_slave_0 entered promiscuous mode
[  511.340498] bridge0: port 2(bridge_slave_1) entered blocking state
[  511.346882] bridge0: port 2(bridge_slave_1) entered disabled state
[  511.353902] device bridge_slave_1 entered promiscuous mode
[  511.370711] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  511.379426] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  511.397605] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  511.404870] team0: Port device team_slave_0 added
[  511.410496] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  511.417553] team0: Port device team_slave_1 added
[  511.422908] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  511.430180] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  511.492175] device hsr_slave_0 entered promiscuous mode
[  511.540353] device hsr_slave_1 entered promiscuous mode
[  511.600570] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  511.608290] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  511.622137] bridge0: port 2(bridge_slave_1) entered blocking state
[  511.628495] bridge0: port 2(bridge_slave_1) entered forwarding state
[  511.635137] bridge0: port 1(bridge_slave_0) entered blocking state
[  511.641538] bridge0: port 1(bridge_slave_0) entered forwarding state
[  511.667657] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  511.674024] 8021q: adding VLAN 0 to HW filter on device bond0
[  511.683037] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  511.691609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  511.698675] bridge0: port 1(bridge_slave_0) entered disabled state
[  511.706070] bridge0: port 2(bridge_slave_1) entered disabled state
[  511.715750] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  511.721927] 8021q: adding VLAN 0 to HW filter on device team0
[  511.730099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  511.737675] bridge0: port 1(bridge_slave_0) entered blocking state
[  511.744192] bridge0: port 1(bridge_slave_0) entered forwarding state
[  511.761422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  511.769032] bridge0: port 2(bridge_slave_1) entered blocking state
[  511.775420] bridge0: port 2(bridge_slave_1) entered forwarding state
[  511.783128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  511.790927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  511.798851] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  511.812022] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  511.821876] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  511.832190] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  511.838696] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  511.846610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  511.854462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  511.865699] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  511.873598] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  511.880488] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  511.892088] 8021q: adding VLAN 0 to HW filter on device batadv0
[  512.280480] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:22:46 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:22:46 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140))
r1 = inotify_init1(0x0)
fcntl$setown(r1, 0x8, 0xffffffffffffffff)
fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r2=>0x0})
tkill(r2, 0x7)
process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:46 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, 0x0, 0x0)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:46 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280))

13:22:46 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
splice(r0, 0x0, r1, 0x0, 0x10003, 0x0)

13:22:46 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1c0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  513.341604] kauditd_printk_skb: 32 callbacks suppressed
[  513.341611] audit: type=1800 audit(1572960166.640:389): pid=14641 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=79 res=0
13:22:46 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  513.350194] audit: type=1804 audit(1572960166.640:390): pid=14641 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/290/file0/file0" dev="loop2" ino=79 res=1
13:22:46 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080), 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:46 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280))

13:22:46 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1c0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:46 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:22:46 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  513.590158] audit: type=1800 audit(1572960166.640:391): pid=14641 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=79 res=0
13:22:47 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080), 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

[  513.758954] audit: type=1800 audit(1572960167.020:392): pid=14666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=80 res=0
[  513.815922] audit: type=1804 audit(1572960167.020:393): pid=14666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/291/file0/file0" dev="loop2" ino=80 res=1
[  513.848043] audit: type=1800 audit(1572960167.020:394): pid=14666 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=80 res=0
[  514.130433] device bridge_slave_1 left promiscuous mode
[  514.135957] bridge0: port 2(bridge_slave_1) entered disabled state
[  514.180710] device bridge_slave_0 left promiscuous mode
[  514.186381] bridge0: port 1(bridge_slave_0) entered disabled state
[  514.322116] device hsr_slave_1 left promiscuous mode
[  514.362638] device hsr_slave_0 left promiscuous mode
[  514.404208] team0 (unregistering): Port device team_slave_1 removed
[  514.413873] team0 (unregistering): Port device team_slave_0 removed
[  514.423157] bond0 (unregistering): Releasing backup interface bond_slave_1
[  514.494314] bond0 (unregistering): Releasing backup interface bond_slave_0
[  514.550153] bond0 (unregistering): Released all slaves
[  516.251394] IPVS: ftp: loaded support on port[0] = 21
[  517.139389] chnl_net:caif_netlink_parms(): no params data found
[  517.171548] bridge0: port 1(bridge_slave_0) entered blocking state
[  517.177946] bridge0: port 1(bridge_slave_0) entered disabled state
[  517.185074] device bridge_slave_0 entered promiscuous mode
[  517.192113] bridge0: port 2(bridge_slave_1) entered blocking state
[  517.198495] bridge0: port 2(bridge_slave_1) entered disabled state
[  517.205955] device bridge_slave_1 entered promiscuous mode
[  517.221554] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  517.230398] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  517.248037] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  517.255307] team0: Port device team_slave_0 added
[  517.260867] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  517.267948] team0: Port device team_slave_1 added
[  517.273372] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  517.280674] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  517.362190] device hsr_slave_0 entered promiscuous mode
[  517.440365] device hsr_slave_1 entered promiscuous mode
[  517.480557] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  517.487629] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  517.499669] bridge0: port 2(bridge_slave_1) entered blocking state
[  517.506075] bridge0: port 2(bridge_slave_1) entered forwarding state
[  517.512722] bridge0: port 1(bridge_slave_0) entered blocking state
[  517.519071] bridge0: port 1(bridge_slave_0) entered forwarding state
[  517.544726] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  517.551331] 8021q: adding VLAN 0 to HW filter on device bond0
[  517.559152] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  517.567932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  517.576860] bridge0: port 1(bridge_slave_0) entered disabled state
[  517.583882] bridge0: port 2(bridge_slave_1) entered disabled state
[  517.593603] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  517.599684] 8021q: adding VLAN 0 to HW filter on device team0
[  517.609030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  517.616840] bridge0: port 1(bridge_slave_0) entered blocking state
[  517.623202] bridge0: port 1(bridge_slave_0) entered forwarding state
[  517.633692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  517.641319] bridge0: port 2(bridge_slave_1) entered blocking state
[  517.647667] bridge0: port 2(bridge_slave_1) entered forwarding state
[  517.661061] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  517.674483] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  517.684483] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  517.694733] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  517.703628] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  517.710999] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  517.718474] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  517.726050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  517.734487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  517.747772] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  517.754947] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  517.761807] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  517.773796] 8021q: adding VLAN 0 to HW filter on device batadv0
[  518.140340] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:22:52 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, 0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:52 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
splice(r0, 0x0, r1, 0x0, 0x10003, 0x0)

13:22:52 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280))

13:22:52 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:22:52 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1e0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:52 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080), 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:52 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1e0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:52 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  519.178211] audit: type=1800 audit(1572960172.470:395): pid=14699 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=81 res=0
13:22:52 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:52 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0)

[  519.240558] audit: type=1804 audit(1572960172.470:396): pid=14699 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/292/file0/file0" dev="loop2" ino=81 res=1
[  519.341788] audit: type=1800 audit(1572960172.470:397): pid=14699 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=81 res=0
13:22:52 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
socket$inet6_tcp(0xa, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:22:52 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

[  519.487318] audit: type=1800 audit(1572960172.690:398): pid=14714 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=82 res=0
[  519.564399] audit: type=1804 audit(1572960172.700:399): pid=14714 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/293/file0/file0" dev="loop2" ino=82 res=1
[  519.599347] audit: type=1800 audit(1572960172.700:400): pid=14714 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=82 res=0
[  520.000943] device bridge_slave_1 left promiscuous mode
[  520.006502] bridge0: port 2(bridge_slave_1) entered disabled state
[  520.060703] device bridge_slave_0 left promiscuous mode
[  520.066213] bridge0: port 1(bridge_slave_0) entered disabled state
[  520.202194] device hsr_slave_1 left promiscuous mode
[  520.253916] device hsr_slave_0 left promiscuous mode
[  520.294091] team0 (unregistering): Port device team_slave_1 removed
[  520.303616] team0 (unregistering): Port device team_slave_0 removed
[  520.313680] bond0 (unregistering): Releasing backup interface bond_slave_1
[  520.355027] bond0 (unregistering): Releasing backup interface bond_slave_0
[  520.430662] bond0 (unregistering): Released all slaves
[  522.100899] IPVS: ftp: loaded support on port[0] = 21
[  522.917649] chnl_net:caif_netlink_parms(): no params data found
[  522.948877] bridge0: port 1(bridge_slave_0) entered blocking state
[  522.955671] bridge0: port 1(bridge_slave_0) entered disabled state
[  522.962926] device bridge_slave_0 entered promiscuous mode
[  522.969363] bridge0: port 2(bridge_slave_1) entered blocking state
[  522.976317] bridge0: port 2(bridge_slave_1) entered disabled state
[  522.983548] device bridge_slave_1 entered promiscuous mode
[  523.000770] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  523.009533] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  523.027898] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  523.035157] team0: Port device team_slave_0 added
[  523.041351] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  523.048441] team0: Port device team_slave_1 added
[  523.053732] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  523.060917] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  523.122821] device hsr_slave_0 entered promiscuous mode
[  523.160390] device hsr_slave_1 entered promiscuous mode
[  523.200819] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  523.207703] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  523.219710] bridge0: port 2(bridge_slave_1) entered blocking state
[  523.226186] bridge0: port 2(bridge_slave_1) entered forwarding state
[  523.232841] bridge0: port 1(bridge_slave_0) entered blocking state
[  523.239242] bridge0: port 1(bridge_slave_0) entered forwarding state
[  523.264912] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  523.273725] 8021q: adding VLAN 0 to HW filter on device bond0
[  523.282549] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  523.291198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  523.298246] bridge0: port 1(bridge_slave_0) entered disabled state
[  523.305117] bridge0: port 2(bridge_slave_1) entered disabled state
[  523.315024] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  523.321231] 8021q: adding VLAN 0 to HW filter on device team0
[  523.329449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  523.337489] bridge0: port 1(bridge_slave_0) entered blocking state
[  523.343852] bridge0: port 1(bridge_slave_0) entered forwarding state
[  523.354350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  523.362145] bridge0: port 2(bridge_slave_1) entered blocking state
[  523.369608] bridge0: port 2(bridge_slave_1) entered forwarding state
[  523.384035] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  523.392113] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  523.402883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  523.415486] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  523.425418] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  523.435600] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  523.442555] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  523.450808] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  523.458302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  523.469672] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  523.477494] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  523.484286] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  523.494181] 8021q: adding VLAN 0 to HW filter on device batadv0
[  523.920534] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:22:58 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, 0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:58 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1e0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:58 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:22:58 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:58 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0)

13:22:58 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:22:58 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

[  524.916089] audit: type=1800 audit(1572960178.210:401): pid=14756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=83 res=0
13:22:58 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a})
ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0)

13:22:58 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:22:58 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1f0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:22:58 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, 0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:22:58 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  525.048829] audit: type=1804 audit(1572960178.240:402): pid=14756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/294/file0/file0" dev="loop2" ino=83 res=1
13:22:58 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:58 executing program 0:
select(0x7e764d91726b6591, &(0x7f00000004c0)={0xdeafbead}, 0x0, 0x0, 0x0)

13:22:58 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  525.254654] audit: type=1800 audit(1572960178.240:403): pid=14756 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=83 res=0
13:22:58 executing program 0:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000700)=ANY=[@ANYBLOB="1400000003070140133b80f71fe087605a000000"], 0x14}}, 0x0)

13:22:58 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1f0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  525.391759] audit: type=1800 audit(1572960178.510:404): pid=14783 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=84 res=0
[  525.463270] audit: type=1804 audit(1572960178.520:405): pid=14783 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/295/file0/file0" dev="loop2" ino=84 res=1
[  525.513426] audit: type=1800 audit(1572960178.520:406): pid=14783 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=84 res=0
[  525.537437] audit: type=1400 audit(1572960178.660:407): avc:  denied  { create } for  pid=14799 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
[  525.562627] audit: type=1400 audit(1572960178.660:408): avc:  denied  { write } for  pid=14799 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
[  525.602056] audit: type=1800 audit(1572960178.900:409): pid=14807 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=85 res=0
[  525.629755] audit: type=1804 audit(1572960178.920:410): pid=14807 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/296/file0/file0" dev="loop2" ino=85 res=1
13:22:59 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:22:59 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:22:59 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:22:59 executing program 0:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d5, 0x32}, 0x0, @in6=@rand_addr="00c8e8767e00", 0x0, 0x0, 0x0, 0x5}}, 0xe8)
connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1c)
sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0)

13:22:59 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1f0)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  525.780483] device bridge_slave_1 left promiscuous mode
[  525.786285] bridge0: port 2(bridge_slave_1) entered disabled state
[  525.851522] device bridge_slave_0 left promiscuous mode
[  525.857140] bridge0: port 1(bridge_slave_0) entered disabled state
[  525.961514] device hsr_slave_1 left promiscuous mode
[  526.013064] device hsr_slave_0 left promiscuous mode
[  526.052913] team0 (unregistering): Port device team_slave_1 removed
[  526.063410] team0 (unregistering): Port device team_slave_0 removed
[  526.072697] bond0 (unregistering): Releasing backup interface bond_slave_1
[  526.094568] bond0 (unregistering): Releasing backup interface bond_slave_0
[  526.174217] bond0 (unregistering): Released all slaves
[  527.921387] IPVS: ftp: loaded support on port[0] = 21
[  528.738846] chnl_net:caif_netlink_parms(): no params data found
[  528.771962] bridge0: port 1(bridge_slave_0) entered blocking state
[  528.778396] bridge0: port 1(bridge_slave_0) entered disabled state
[  528.785429] device bridge_slave_0 entered promiscuous mode
[  528.792489] bridge0: port 2(bridge_slave_1) entered blocking state
[  528.799168] bridge0: port 2(bridge_slave_1) entered disabled state
[  528.806319] device bridge_slave_1 entered promiscuous mode
[  528.822342] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  528.831600] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  528.847535] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  528.854869] team0: Port device team_slave_0 added
[  528.860499] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  528.867731] team0: Port device team_slave_1 added
[  528.873110] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  528.880530] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  528.942194] device hsr_slave_0 entered promiscuous mode
[  529.000391] device hsr_slave_1 entered promiscuous mode
[  529.052759] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  529.059672] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  529.073411] bridge0: port 2(bridge_slave_1) entered blocking state
[  529.079783] bridge0: port 2(bridge_slave_1) entered forwarding state
[  529.086616] bridge0: port 1(bridge_slave_0) entered blocking state
[  529.092988] bridge0: port 1(bridge_slave_0) entered forwarding state
[  529.119358] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  529.125727] 8021q: adding VLAN 0 to HW filter on device bond0
[  529.134538] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  529.142928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  529.149915] bridge0: port 1(bridge_slave_0) entered disabled state
[  529.157114] bridge0: port 2(bridge_slave_1) entered disabled state
[  529.166191] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  529.172524] 8021q: adding VLAN 0 to HW filter on device team0
[  529.180771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  529.188280] bridge0: port 1(bridge_slave_0) entered blocking state
[  529.194652] bridge0: port 1(bridge_slave_0) entered forwarding state
[  529.203339] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  529.211508] bridge0: port 2(bridge_slave_1) entered blocking state
[  529.217850] bridge0: port 2(bridge_slave_1) entered forwarding state
[  529.236716] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  529.246575] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  529.256864] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  529.263921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  529.271819] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  529.279340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  529.286924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  529.294471] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  529.301326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  529.313173] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  529.320685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  529.327384] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  529.337842] 8021q: adding VLAN 0 to HW filter on device batadv0
[  529.730513] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:23:04 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0), 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:23:04 executing program 5:
socket$inet6(0xa, 0x2, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:23:04 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1f8)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:23:04 executing program 0:
r0 = socket(0x80000000000000a, 0x2, 0x0)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
close(r0)

13:23:04 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:04 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:04 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:04 executing program 0:
r0 = socket(0x80000000000000a, 0x2, 0x0)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
close(r0)

[  530.897873] kauditd_printk_skb: 4 callbacks suppressed
[  530.897880] audit: type=1800 audit(1572960184.190:415): pid=14865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=87 res=0
13:23:04 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1f8)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:23:04 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:04 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0), 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:23:04 executing program 0:
r0 = socket(0x80000000000000a, 0x2, 0x0)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
close(r0)

13:23:04 executing program 3:
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  531.043464] audit: type=1804 audit(1572960184.230:416): pid=14865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/298/file0/file0" dev="loop2" ino=87 res=1
[  531.166601] audit: type=1800 audit(1572960184.230:417): pid=14865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=87 res=0
[  531.280574] audit: type=1800 audit(1572960184.460:418): pid=14893 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=88 res=0
[  531.335496] audit: type=1804 audit(1572960184.460:419): pid=14893 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/299/file0/file0" dev="loop2" ino=88 res=1
[  531.364429] audit: type=1800 audit(1572960184.460:420): pid=14893 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=88 res=0
13:23:04 executing program 5:
socket$inet6(0xa, 0x2, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:23:04 executing program 0:
r0 = socket(0x80000000000000a, 0x2, 0x0)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
close(r0)

13:23:04 executing program 3:
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:04 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1f8)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:23:04 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

[  531.660446] device bridge_slave_1 left promiscuous mode
[  531.666031] bridge0: port 2(bridge_slave_1) entered disabled state
[  531.701329] device bridge_slave_0 left promiscuous mode
[  531.708028] bridge0: port 1(bridge_slave_0) entered disabled state
13:23:05 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fc)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  531.739580] audit: type=1800 audit(1572960185.030:421): pid=14907 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=89 res=0
[  531.764889] audit: type=1804 audit(1572960185.030:422): pid=14907 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/300/file0/file0" dev="loop2" ino=89 res=1
[  531.793816] audit: type=1800 audit(1572960185.030:423): pid=14907 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=89 res=0
13:23:05 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fc)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  531.890862] device hsr_slave_1 left promiscuous mode
[  531.892582] audit: type=1800 audit(1572960185.190:424): pid=14923 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=90 res=0
[  531.933836] device hsr_slave_0 left promiscuous mode
[  531.984130] team0 (unregistering): Port device team_slave_1 removed
[  531.995508] team0 (unregistering): Port device team_slave_0 removed
[  532.005436] bond0 (unregistering): Releasing backup interface bond_slave_1
13:23:05 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fc)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  532.054884] bond0 (unregistering): Releasing backup interface bond_slave_0
[  532.135451] bond0 (unregistering): Released all slaves
13:23:05 executing program 3:
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  533.981380] IPVS: ftp: loaded support on port[0] = 21
[  534.788254] chnl_net:caif_netlink_parms(): no params data found
[  534.819761] bridge0: port 1(bridge_slave_0) entered blocking state
[  534.826389] bridge0: port 1(bridge_slave_0) entered disabled state
[  534.833612] device bridge_slave_0 entered promiscuous mode
[  534.840411] bridge0: port 2(bridge_slave_1) entered blocking state
[  534.846833] bridge0: port 2(bridge_slave_1) entered disabled state
[  534.853958] device bridge_slave_1 entered promiscuous mode
[  534.870909] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  534.879586] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  534.898789] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  534.906029] team0: Port device team_slave_0 added
[  534.911501] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  534.918548] team0: Port device team_slave_1 added
[  534.923939] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  534.931189] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  535.003550] device hsr_slave_0 entered promiscuous mode
[  535.070377] device hsr_slave_1 entered promiscuous mode
[  535.140722] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  535.147646] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  535.159925] bridge0: port 2(bridge_slave_1) entered blocking state
[  535.166334] bridge0: port 2(bridge_slave_1) entered forwarding state
[  535.173108] bridge0: port 1(bridge_slave_0) entered blocking state
[  535.179453] bridge0: port 1(bridge_slave_0) entered forwarding state
[  535.205527] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  535.212847] 8021q: adding VLAN 0 to HW filter on device bond0
[  535.222338] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  535.230984] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  535.238014] bridge0: port 1(bridge_slave_0) entered disabled state
[  535.244781] bridge0: port 2(bridge_slave_1) entered disabled state
[  535.254866] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  535.261314] 8021q: adding VLAN 0 to HW filter on device team0
[  535.269348] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  535.277422] bridge0: port 1(bridge_slave_0) entered blocking state
[  535.283777] bridge0: port 1(bridge_slave_0) entered forwarding state
[  535.301021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  535.308588] bridge0: port 2(bridge_slave_1) entered blocking state
[  535.314959] bridge0: port 2(bridge_slave_1) entered forwarding state
[  535.323025] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  535.330907] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  535.339429] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  535.346583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  535.356722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  535.366532] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  535.372740] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  535.385943] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  535.393476] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  535.401088] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  535.412172] 8021q: adding VLAN 0 to HW filter on device batadv0
[  535.780466] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:23:09 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0), 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:23:09 executing program 0:
r0 = socket(0x80000000000000a, 0x2, 0x0)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108)
close(r0)

13:23:09 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fe)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:23:09 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:09 executing program 5:
socket$inet6(0xa, 0x2, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c)

13:23:09 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:09 executing program 0:
syz_emit_ethernet(0x8e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6010000000580600fe800000000000000000aafe8000000000000000000000000000aa004d1afb0000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="60c2000090780000030300fe06e2d4c3d90000000000000000000000001312000000000000000000000000010000801312eaaab4d0ceb3a8d98f5d9f0100fdc19a4000"/76], 0x0)

13:23:10 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:10 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{0x0}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

[  536.680346] kauditd_printk_skb: 8 callbacks suppressed
[  536.680354] audit: type=1800 audit(1572960189.970:433): pid=14966 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=93 res=0
13:23:10 executing program 0:
syz_emit_ethernet(0x8e, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6010000000580600fe800000000000000000aafe8000000000000000000000000000aa004d1afb0000000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="60c2000090780000030300fe06e2d4c3d90000000000000000000000001312000000000000000000000000010000801312eaaab4d0ceb3a8d98f5d9f0100fdc19a4000"/76], 0x0)

13:23:10 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:10 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fe)
sendfile(r1, r2, 0x0, 0x7fffffa7)

[  536.811547] audit: type=1804 audit(1572960190.010:434): pid=14966 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/304/file0/file0" dev="loop2" ino=93 res=1
13:23:10 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:10 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  536.859631] audit: type=1800 audit(1572960190.010:435): pid=14966 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=93 res=0
13:23:10 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:10 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  537.026649] audit: type=1800 audit(1572960190.320:436): pid=14999 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=94 res=0
[  537.120894] audit: type=1804 audit(1572960190.350:437): pid=14999 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/305/file0/file0" dev="loop2" ino=94 res=1
[  537.157939] audit: type=1800 audit(1572960190.350:438): pid=14999 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=94 res=0
13:23:10 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0)

13:23:10 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:10 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:10 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  537.440734] device bridge_slave_1 left promiscuous mode
[  537.446406] bridge0: port 2(bridge_slave_1) entered disabled state
[  537.501077] device bridge_slave_0 left promiscuous mode
[  537.506747] bridge0: port 1(bridge_slave_0) entered disabled state
[  537.603496] device hsr_slave_1 left promiscuous mode
[  537.644238] device hsr_slave_0 left promiscuous mode
[  537.704826] team0 (unregistering): Port device team_slave_1 removed
[  537.715149] team0 (unregistering): Port device team_slave_0 removed
[  537.726025] bond0 (unregistering): Releasing backup interface bond_slave_1
[  537.773701] bond0 (unregistering): Releasing backup interface bond_slave_0
[  537.864408] bond0 (unregistering): Released all slaves
[  539.561387] IPVS: ftp: loaded support on port[0] = 21
[  540.577869] chnl_net:caif_netlink_parms(): no params data found
[  540.611666] bridge0: port 1(bridge_slave_0) entered blocking state
[  540.618211] bridge0: port 1(bridge_slave_0) entered disabled state
[  540.625283] device bridge_slave_0 entered promiscuous mode
[  540.632533] bridge0: port 2(bridge_slave_1) entered blocking state
[  540.638900] bridge0: port 2(bridge_slave_1) entered disabled state
[  540.646478] device bridge_slave_1 entered promiscuous mode
[  540.662790] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  540.671961] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  540.687486] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  540.694706] team0: Port device team_slave_0 added
[  540.700190] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  540.707240] team0: Port device team_slave_1 added
[  540.712669] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  540.719916] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  540.773417] device hsr_slave_0 entered promiscuous mode
[  540.810527] device hsr_slave_1 entered promiscuous mode
[  540.850779] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  540.857788] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  540.870259] bridge0: port 2(bridge_slave_1) entered blocking state
[  540.876644] bridge0: port 2(bridge_slave_1) entered forwarding state
[  540.883349] bridge0: port 1(bridge_slave_0) entered blocking state
[  540.889734] bridge0: port 1(bridge_slave_0) entered forwarding state
[  540.916281] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  540.922930] 8021q: adding VLAN 0 to HW filter on device bond0
[  540.931915] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  540.940904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  540.948137] bridge0: port 1(bridge_slave_0) entered disabled state
[  540.955099] bridge0: port 2(bridge_slave_1) entered disabled state
[  540.965134] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  540.971466] 8021q: adding VLAN 0 to HW filter on device team0
[  540.979697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  540.987482] bridge0: port 1(bridge_slave_0) entered blocking state
[  540.993871] bridge0: port 1(bridge_slave_0) entered forwarding state
[  541.003818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  541.011617] bridge0: port 2(bridge_slave_1) entered blocking state
[  541.017976] bridge0: port 2(bridge_slave_1) entered forwarding state
[  541.031772] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  541.039719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  541.048778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  541.062637] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  541.072600] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  541.083190] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  541.089626] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  541.097483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  541.105400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  541.117031] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  541.125399] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  541.132534] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  541.143097] 8021q: adding VLAN 0 to HW filter on device batadv0
[  541.570502] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:23:15 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{0x0}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:23:15 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d6", 0x1fe)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:23:15 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:15 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:15 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0)

13:23:15 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
socket$inet_udplite(0x2, 0x2, 0x88)
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:15 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:15 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

[  542.443136] audit: type=1800 audit(1572960195.740:439): pid=15046 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=95 res=0
13:23:15 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{0x0}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)=""/233, 0xe9}], 0x1, 0x0)

13:23:15 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fc)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:23:15 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:15 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

[  542.579106] audit: type=1804 audit(1572960195.780:440): pid=15046 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/306/file0/file0" dev="loop2" ino=95 res=1
13:23:16 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:16 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

[  542.704171] audit: type=1800 audit(1572960195.780:441): pid=15046 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=95 res=0
13:23:16 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:16 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  542.865444] audit: type=1800 audit(1572960196.080:442): pid=15072 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=96 res=0
[  542.937437] audit: type=1804 audit(1572960196.090:443): pid=15072 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/307/file0/file0" dev="loop2" ino=96 res=1
[  542.978315] audit: type=1800 audit(1572960196.090:444): pid=15072 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=96 res=0
13:23:16 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0)

13:23:16 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fc)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:23:16 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:16 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

[  543.272406] device bridge_slave_1 left promiscuous mode
[  543.277970] bridge0: port 2(bridge_slave_1) entered disabled state
[  543.298119] audit: type=1800 audit(1572960196.590:445): pid=15096 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=97 res=0
[  543.360211] audit: type=1804 audit(1572960196.630:446): pid=15096 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/308/file0/file0" dev="loop2" ino=97 res=1
[  543.388772] audit: type=1800 audit(1572960196.630:447): pid=15096 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=97 res=0
[  543.412051] device bridge_slave_0 left promiscuous mode
[  543.417576] bridge0: port 1(bridge_slave_0) entered disabled state
[  543.523992] device hsr_slave_1 left promiscuous mode
[  543.562718] device hsr_slave_0 left promiscuous mode
[  543.602827] team0 (unregistering): Port device team_slave_1 removed
[  543.613707] team0 (unregistering): Port device team_slave_0 removed
[  543.622996] bond0 (unregistering): Releasing backup interface bond_slave_1
[  543.674951] bond0 (unregistering): Releasing backup interface bond_slave_0
[  543.762986] bond0 (unregistering): Released all slaves
[  545.520927] IPVS: ftp: loaded support on port[0] = 21
[  546.467405] chnl_net:caif_netlink_parms(): no params data found
[  546.499607] bridge0: port 1(bridge_slave_0) entered blocking state
[  546.506105] bridge0: port 1(bridge_slave_0) entered disabled state
[  546.513778] device bridge_slave_0 entered promiscuous mode
[  546.520509] bridge0: port 2(bridge_slave_1) entered blocking state
[  546.526909] bridge0: port 2(bridge_slave_1) entered disabled state
[  546.534009] device bridge_slave_1 entered promiscuous mode
[  546.550501] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  546.559140] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  546.576728] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  546.583952] team0: Port device team_slave_0 added
[  546.589313] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  546.596520] team0: Port device team_slave_1 added
[  546.602719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  546.609859] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  546.672180] device hsr_slave_0 entered promiscuous mode
[  546.740483] device hsr_slave_1 entered promiscuous mode
[  546.780761] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  546.787820] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  546.800673] bridge0: port 2(bridge_slave_1) entered blocking state
[  546.807053] bridge0: port 2(bridge_slave_1) entered forwarding state
[  546.813854] bridge0: port 1(bridge_slave_0) entered blocking state
[  546.820271] bridge0: port 1(bridge_slave_0) entered forwarding state
[  546.847749] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  546.854112] 8021q: adding VLAN 0 to HW filter on device bond0
[  546.863598] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  546.872356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  546.879507] bridge0: port 1(bridge_slave_0) entered disabled state
[  546.886642] bridge0: port 2(bridge_slave_1) entered disabled state
[  546.895751] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  546.902620] 8021q: adding VLAN 0 to HW filter on device team0
[  546.911243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  546.918772] bridge0: port 1(bridge_slave_0) entered blocking state
[  546.925151] bridge0: port 1(bridge_slave_0) entered forwarding state
[  546.940906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  546.948488] bridge0: port 2(bridge_slave_1) entered blocking state
[  546.955211] bridge0: port 2(bridge_slave_1) entered forwarding state
[  546.963158] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  546.971174] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  546.980348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  546.989758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  546.999360] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  547.009065] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  547.015278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  547.028326] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  547.036065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  547.042869] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  547.055646] 8021q: adding VLAN 0 to HW filter on device batadv0
[  547.460503] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:23:21 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, 0x0, 0x0, 0x0)

13:23:21 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
socket$inet_udplite(0x2, 0x2, 0x88)
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:21 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:21 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:21 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed183", 0x1fc)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:23:21 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c)

13:23:21 executing program 0:
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0)

13:23:21 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  548.376463] audit: type=1800 audit(1572960201.670:448): pid=15128 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=98 res=0
13:23:21 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, 0x0, 0x0, 0x0)

13:23:21 executing program 0:
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0)

[  548.471208] audit: type=1804 audit(1572960201.700:449): pid=15128 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/309/file0/file0" dev="loop2" ino=98 res=1
13:23:21 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fd)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:23:21 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  548.532280] audit: type=1800 audit(1572960201.700:450): pid=15128 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=98 res=0
13:23:21 executing program 0:
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0)

[  548.686226] audit: type=1800 audit(1572960201.980:451): pid=15152 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=99 res=0
[  548.745322] audit: type=1804 audit(1572960201.980:452): pid=15152 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/310/file0/file0" dev="loop2" ino=99 res=1
[  548.789627] audit: type=1800 audit(1572960201.980:453): pid=15152 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=99 res=0
13:23:22 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
socket$inet_udplite(0x2, 0x2, 0x88)
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:22 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:22 executing program 0:
r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:22 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335", 0x1fd)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:23:22 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c)

13:23:22 executing program 0:
r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:22 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

[  549.227986] audit: type=1800 audit(1572960202.520:454): pid=15169 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=100 res=0
[  549.290987] device bridge_slave_1 left promiscuous mode
[  549.296903] bridge0: port 2(bridge_slave_1) entered disabled state
[  549.324867] audit: type=1804 audit(1572960202.550:455): pid=15169 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/311/file0/file0" dev="loop2" ino=100 res=1
[  549.359571] audit: type=1800 audit(1572960202.550:456): pid=15169 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=100 res=0
[  549.411208] device bridge_slave_0 left promiscuous mode
[  549.416883] bridge0: port 1(bridge_slave_0) entered disabled state
[  549.504416] device hsr_slave_1 left promiscuous mode
[  549.554143] device hsr_slave_0 left promiscuous mode
[  549.604726] team0 (unregistering): Port device team_slave_1 removed
[  549.615692] team0 (unregistering): Port device team_slave_0 removed
[  549.626340] bond0 (unregistering): Releasing backup interface bond_slave_1
[  549.694560] bond0 (unregistering): Releasing backup interface bond_slave_0
[  549.762857] bond0 (unregistering): Released all slaves
[  551.421369] IPVS: ftp: loaded support on port[0] = 21
[  552.377736] chnl_net:caif_netlink_parms(): no params data found
[  552.409180] bridge0: port 1(bridge_slave_0) entered blocking state
[  552.415879] bridge0: port 1(bridge_slave_0) entered disabled state
[  552.423236] device bridge_slave_0 entered promiscuous mode
[  552.429842] bridge0: port 2(bridge_slave_1) entered blocking state
[  552.437031] bridge0: port 2(bridge_slave_1) entered disabled state
[  552.444050] device bridge_slave_1 entered promiscuous mode
[  552.460694] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  552.469621] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  552.488532] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  552.496213] team0: Port device team_slave_0 added
[  552.501633] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  552.508623] team0: Port device team_slave_1 added
[  552.514511] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  552.522351] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  552.582072] device hsr_slave_0 entered promiscuous mode
[  552.650511] device hsr_slave_1 entered promiscuous mode
[  552.720729] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  552.727690] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  552.739944] bridge0: port 2(bridge_slave_1) entered blocking state
[  552.746363] bridge0: port 2(bridge_slave_1) entered forwarding state
[  552.753021] bridge0: port 1(bridge_slave_0) entered blocking state
[  552.759632] bridge0: port 1(bridge_slave_0) entered forwarding state
[  552.786386] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  552.792950] 8021q: adding VLAN 0 to HW filter on device bond0
[  552.801471] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  552.809591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  552.817353] bridge0: port 1(bridge_slave_0) entered disabled state
[  552.824328] bridge0: port 2(bridge_slave_1) entered disabled state
[  552.834497] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  552.840858] 8021q: adding VLAN 0 to HW filter on device team0
[  552.849137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  552.856889] bridge0: port 1(bridge_slave_0) entered blocking state
[  552.863368] bridge0: port 1(bridge_slave_0) entered forwarding state
[  552.880953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  552.888647] bridge0: port 2(bridge_slave_1) entered blocking state
[  552.895027] bridge0: port 2(bridge_slave_1) entered forwarding state
[  552.904050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  552.911901] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  552.920611] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  552.928761] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  552.939872] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  552.950799] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  552.956844] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  552.964164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  552.976816] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  552.984883] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  552.993872] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  553.004371] 8021q: adding VLAN 0 to HW filter on device batadv0
[  553.380718] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:23:27 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, 0x0, 0x0, 0x0)

13:23:27 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c)
setsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080)=0x1, 0x4)
recvfrom$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001280)={0xa, 0x0, 0x0, @mcast1}, 0x71a000)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c)

13:23:27 executing program 3:
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)

13:23:27 executing program 0:
r0 = syz_open_dev$sndtimer(0x0, 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:27 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fd)
sendfile(r1, r2, 0x0, 0x7fffffa7)

13:23:27 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:27 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000000))

13:23:27 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

[  554.466771] audit: type=1800 audit(1572960207.760:457): pid=15207 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=101 res=0
[  554.499940] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details.
13:23:27 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fe)
sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffa7)

13:23:27 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:27 executing program 3:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)

[  554.611461] audit: type=1804 audit(1572960207.790:458): pid=15207 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/312/file0/file0" dev="loop2" ino=101 res=1
13:23:28 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0)
fchdir(r0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000940)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0)
write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b)
open(0x0, 0x0, 0x0)
openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0)

[  554.772415] audit: type=1800 audit(1572960207.790:459): pid=15207 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=101 res=0
[  554.819346] audit: type=1800 audit(1572960208.010:460): pid=15229 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=102 res=0
[  554.842781] audit: type=1804 audit(1572960208.010:461): pid=15229 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/313/file0/file0" dev="loop2" ino=102 res=1
[  554.890191] audit: type=1800 audit(1572960208.010:462): pid=15229 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=102 res=0
[  555.270481] device bridge_slave_1 left promiscuous mode
[  555.275963] bridge0: port 2(bridge_slave_1) entered disabled state
[  555.302370] device bridge_slave_0 left promiscuous mode
[  555.307909] bridge0: port 1(bridge_slave_0) entered disabled state
[  555.452821] device hsr_slave_1 left promiscuous mode
[  555.492663] device hsr_slave_0 left promiscuous mode
[  555.544007] team0 (unregistering): Port device team_slave_1 removed
[  555.553463] team0 (unregistering): Port device team_slave_0 removed
[  555.564756] bond0 (unregistering): Releasing backup interface bond_slave_1
[  555.634152] bond0 (unregistering): Releasing backup interface bond_slave_0
[  555.693095] bond0 (unregistering): Released all slaves
[  557.411335] IPVS: ftp: loaded support on port[0] = 21
[  558.198209] chnl_net:caif_netlink_parms(): no params data found
[  558.229750] bridge0: port 1(bridge_slave_0) entered blocking state
[  558.236472] bridge0: port 1(bridge_slave_0) entered disabled state
[  558.243406] device bridge_slave_0 entered promiscuous mode
[  558.249859] bridge0: port 2(bridge_slave_1) entered blocking state
[  558.256443] bridge0: port 2(bridge_slave_1) entered disabled state
[  558.263343] device bridge_slave_1 entered promiscuous mode
[  558.280802] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  558.289444] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  558.306291] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  558.313536] team0: Port device team_slave_0 added
[  558.318944] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  558.326155] team0: Port device team_slave_1 added
[  558.331546] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  558.338701] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  558.393010] device hsr_slave_0 entered promiscuous mode
[  558.451084] device hsr_slave_1 entered promiscuous mode
[  558.490737] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  558.497678] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  558.510247] bridge0: port 2(bridge_slave_1) entered blocking state
[  558.516630] bridge0: port 2(bridge_slave_1) entered forwarding state
[  558.523287] bridge0: port 1(bridge_slave_0) entered blocking state
[  558.529688] bridge0: port 1(bridge_slave_0) entered forwarding state
[  558.555305] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  558.562027] 8021q: adding VLAN 0 to HW filter on device bond0
[  558.569781] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  558.578217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  558.585868] bridge0: port 1(bridge_slave_0) entered disabled state
[  558.593451] bridge0: port 2(bridge_slave_1) entered disabled state
[  558.604007] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  558.610269] 8021q: adding VLAN 0 to HW filter on device team0
[  558.618400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  558.627465] bridge0: port 1(bridge_slave_0) entered blocking state
[  558.633828] bridge0: port 1(bridge_slave_0) entered forwarding state
[  558.644057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  558.651811] bridge0: port 2(bridge_slave_1) entered blocking state
[  558.658135] bridge0: port 2(bridge_slave_1) entered forwarding state
[  558.671559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  558.679014] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  558.693057] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  558.703119] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  558.713975] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  558.720636] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  558.728258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  558.735852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  558.743810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  558.756126] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  558.763685] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  558.770701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  558.781221] 8021q: adding VLAN 0 to HW filter on device batadv0
[  559.190356] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:23:33 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640), 0x0, 0x0)

13:23:33 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:33 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fe)
sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffa7)

13:23:33 executing program 3:
r0 = socket$inet6(0xa, 0x1, 0x0)
ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000))

13:23:33 executing program 5:
syz_open_procfs(0x0, &(0x7f00000002c0)='net/dev_mcast\x00')

13:23:33 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:33 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:33 executing program 3:
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0)

13:23:33 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
fcntl$lock(r0, 0x5, &(0x7f0000000080))

[  560.122261] audit: type=1800 audit(1572960213.420:463): pid=15262 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=103 res=0
13:23:33 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:33 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fe)
sendfile(0xffffffffffffffff, r2, 0x0, 0x7fffffa7)

13:23:33 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640), 0x0, 0x0)

13:23:33 executing program 3:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb03532ff2e3335100d5812fb4f77dcbd7a9b3cffd7a7c0c92465e5f9cc839639013a54121aaba9d7ae45b0051a1221af2772a9567bb821942ce72590f1bf41d20d4c000000279bd612811df1fcea94a96d58db92af7f9298918ae95b745777a1968e48d46358c8735e3b009f9d0100000000000000", 0xa4}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

13:23:33 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$team(0x0)
socket$nl_route(0x10, 0x3, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200))
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0)
syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00')
socket(0x10, 0x0, 0x0)
getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x0, 0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'syz_tun\x00', 0x0})
getsockname(0xffffffffffffffff, 0x0, &(0x7f00000027c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002900)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@initdev}}, &(0x7f0000002a00)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@multicast2, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000002b40)=0xe8)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @broadcast}]}, 0x20}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x272, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000014000104002100000000000002000000", @ANYRES32=r6], 0x20}}, 0x0)
r7 = socket$nl_route(0x10, 0x3, 0x0)
r8 = socket$nl_route(0x10, 0x3, 0x0)
r9 = socket$netlink(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, <r11=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0)
sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r11}, [@IFA_LOCAL={0x8, 0x2, @broadcast}]}, 0x20}}, 0x0)
sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x272, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r11}}, 0x20}}, 0x0)
r12 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCETHTOOL(r12, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_flash={0x4b, 0x0, "4d72d184b89b201a1598ebd7406aed3a4b80a03a83f06aac89368d3d3d5589ea93ed3f9cadf9db4e17d407e039b09de7733fbd79cde104fe6872b283e23e82b5db4536e7a9769b614d9d5a35b9dea07dedc23bfceaa48f8cf32a4cb8adaf39968e051eb0eaba8cc635ebea9ba67e35c316483b1ea1a92159657fde4558000fd0"}})
r13 = socket$nl_route(0x10, 0x3, 0x0)
r14 = socket$netlink(0x10, 0x3, 0x0)
r15 = socket(0x10, 0x803, 0x0)
getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, <r16=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r16, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r16}, [@IFA_LOCAL={0x8, 0x2, @broadcast}]}, 0x20}}, 0x0)
sendmsg$nl_route(r13, &(0x7f0000000180)={0x0, 0x272, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r16}}, 0x20}}, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r12, 0x8933, &(0x7f0000002ec0)={'vxcan0\x00', r16})
setsockopt$inet_buf(r0, 0x0, 0x2b, &(0x7f0000000500)="9ac90b4a4dc46adf7c322ea6e441675b73b6f9a3c9a1fce0e94505", 0x1b)
r17 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r17, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r17, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10)
recvmsg(r17, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c)
write$binfmt_elf64(r17, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35)

[  560.232528] audit: type=1804 audit(1572960213.450:464): pid=15262 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/314/file0/file0" dev="loop2" ino=103 res=1
13:23:33 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:33 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'')
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00')
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = dup(r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
sendfile(r0, r1, 0x0, 0x1)

[  560.321693] __report_access: 4 callbacks suppressed
[  560.321699] ptrace attach of "/root/syz-executor.3"[15290] was attempted by "/root/syz-executor.3"[15291]
[  560.343864] audit: type=1800 audit(1572960213.450:465): pid=15262 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=103 res=0
13:23:33 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040))
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

[  560.475202] audit: type=1800 audit(1572960213.760:466): pid=15305 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=104 res=0
[  560.534081] audit: type=1804 audit(1572960213.760:467): pid=15305 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/315/file0/file0" dev="loop2" ino=104 res=1
[  560.562122] audit: type=1800 audit(1572960213.760:468): pid=15305 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=104 res=0
[  560.720324] protocol 88fb is buggy, dev hsr_slave_0
[  560.725488] protocol 88fb is buggy, dev hsr_slave_1
13:23:34 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:34 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040))
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:34 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fe)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7)

13:23:34 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000))
r1 = syz_open_pts(r0, 0x0)
clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0)
write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = fcntl$dupfd(r3, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x19)

[  560.860325] device bridge_slave_1 left promiscuous mode
[  560.865919] bridge0: port 2(bridge_slave_1) entered disabled state
13:23:34 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040))
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

[  560.923660] device bridge_slave_0 left promiscuous mode
[  560.929413] bridge0: port 1(bridge_slave_0) entered disabled state
[  560.964783] audit: type=1800 audit(1572960214.260:469): pid=15321 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=105 res=0
13:23:34 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d6", 0x1fe)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7)

[  561.012035] audit: type=1804 audit(1572960214.260:470): pid=15321 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/316/file0/file0" dev="loop2" ino=105 res=1
[  561.043478] audit: type=1800 audit(1572960214.260:471): pid=15321 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=105 res=0
[  561.119458] device hsr_slave_1 left promiscuous mode
[  561.130303] protocol 88fb is buggy, dev hsr_slave_0
[  561.135474] protocol 88fb is buggy, dev hsr_slave_1
[  561.152362] audit: type=1800 audit(1572960214.450:472): pid=15339 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=106 res=0
[  561.189808] device hsr_slave_0 left promiscuous mode
[  561.222791] team0 (unregistering): Port device team_slave_1 removed
[  561.233464] team0 (unregistering): Port device team_slave_0 removed
[  561.242775] bond0 (unregistering): Releasing backup interface bond_slave_1
[  561.266211] bond0 (unregistering): Releasing backup interface bond_slave_0
[  561.326268] bond0 (unregistering): Released all slaves
[  562.991360] IPVS: ftp: loaded support on port[0] = 21
[  563.788149] chnl_net:caif_netlink_parms(): no params data found
[  563.819730] bridge0: port 1(bridge_slave_0) entered blocking state
[  563.826226] bridge0: port 1(bridge_slave_0) entered disabled state
[  563.833799] device bridge_slave_0 entered promiscuous mode
[  563.841053] bridge0: port 2(bridge_slave_1) entered blocking state
[  563.847422] bridge0: port 2(bridge_slave_1) entered disabled state
[  563.854819] device bridge_slave_1 entered promiscuous mode
[  563.871430] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  563.880332] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  563.896373] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  563.903637] team0: Port device team_slave_0 added
[  563.909047] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  563.916283] team0: Port device team_slave_1 added
[  563.921662] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  563.928860] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  563.993680] device hsr_slave_0 entered promiscuous mode
[  564.030417] device hsr_slave_1 entered promiscuous mode
[  564.090758] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  564.097663] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  564.111642] bridge0: port 2(bridge_slave_1) entered blocking state
[  564.118004] bridge0: port 2(bridge_slave_1) entered forwarding state
[  564.124654] bridge0: port 1(bridge_slave_0) entered blocking state
[  564.131062] bridge0: port 1(bridge_slave_0) entered forwarding state
[  564.156857] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  564.163343] 8021q: adding VLAN 0 to HW filter on device bond0
[  564.172112] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  564.180645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  564.187692] bridge0: port 1(bridge_slave_0) entered disabled state
[  564.195006] bridge0: port 2(bridge_slave_1) entered disabled state
[  564.205103] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  564.211287] 8021q: adding VLAN 0 to HW filter on device team0
[  564.219556] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  564.227496] bridge0: port 1(bridge_slave_0) entered blocking state
[  564.233863] bridge0: port 1(bridge_slave_0) entered forwarding state
[  564.251667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  564.259248] bridge0: port 2(bridge_slave_1) entered blocking state
[  564.265618] bridge0: port 2(bridge_slave_1) entered forwarding state
[  564.274066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  564.281816] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  564.289776] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  564.302880] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  564.312880] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  564.323536] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  564.331267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  564.338727] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  564.346376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  564.357125] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  564.367362] 8021q: adding VLAN 0 to HW filter on device batadv0
[  564.375000] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  564.383005] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  564.780385] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:23:38 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640), 0x0, 0x0)

13:23:38 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:38 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d6", 0x1fe)
sendfile(r1, 0xffffffffffffffff, 0x0, 0x7fffffa7)

13:23:38 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000))
r1 = syz_open_pts(r0, 0x0)
clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0)
write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = fcntl$dupfd(r3, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200)
ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x19)

13:23:38 executing program 5:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, 0x0, 0x0, 0x0)
syz_genetlink_get_family_id$team(0x0)
socket$nl_route(0x10, 0x3, 0x0)
getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200))
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0)
syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00')
socket(0x10, 0x0, 0x0)
getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
socket(0x0, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$netlink(0x10, 0x3, 0x0)
r1 = socket(0x10, 0x0, 0x0)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r1, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0)
socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'syz_tun\x00', 0x0})
getsockname(0xffffffffffffffff, 0x0, &(0x7f00000027c0))
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002900)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@initdev}}, &(0x7f0000002a00)=0xe8)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@multicast2, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000002b40)=0xe8)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @broadcast}]}, 0x20}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x272, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000014000104002100000000000002000000", @ANYRES32=r6], 0x20}}, 0x0)
r7 = socket$nl_route(0x10, 0x3, 0x0)
r8 = socket$nl_route(0x10, 0x3, 0x0)
r9 = socket$netlink(0x10, 0x3, 0x0)
r10 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, <r11=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0)
sendmsg$nl_route(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r11}, [@IFA_LOCAL={0x8, 0x2, @broadcast}]}, 0x20}}, 0x0)
sendmsg$nl_route(r7, &(0x7f0000000180)={0x0, 0x272, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r11}}, 0x20}}, 0x0)
r12 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCETHTOOL(r12, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000002fc0)=@ethtool_flash={0x4b, 0x0, "4d72d184b89b201a1598ebd7406aed3a4b80a03a83f06aac89368d3d3d5589ea93ed3f9cadf9db4e17d407e039b09de7733fbd79cde104fe6872b283e23e82b5db4536e7a9769b614d9d5a35b9dea07dedc23bfceaa48f8cf32a4cb8adaf39968e051eb0eaba8cc635ebea9ba67e35c316483b1ea1a92159657fde4558000fd0"}})
r13 = socket$nl_route(0x10, 0x3, 0x0)
r14 = socket$netlink(0x10, 0x3, 0x0)
r15 = socket(0x10, 0x803, 0x0)
getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, <r16=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r16, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002011400010000000000", @ANYRES32=0x0, @ANYBLOB="0000000000c76f4503775e3a23a7073ab87e54d66704d2654729"], 0x48}}, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r16}, [@IFA_LOCAL={0x8, 0x2, @broadcast}]}, 0x20}}, 0x0)
sendmsg$nl_route(r13, &(0x7f0000000180)={0x0, 0x272, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r16}}, 0x20}}, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r12, 0x8933, &(0x7f0000002ec0)={'vxcan0\x00', r16})
setsockopt$inet_buf(r0, 0x0, 0x2b, &(0x7f0000000500)="9ac90b4a4dc46adf7c322ea6e441675b73b6f9a3c9a1fce0e94505", 0x1b)
r17 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r17, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r17, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x24e23, @local}, 0x10)
recvmsg(r17, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0xd10c)
write$binfmt_elf64(r17, &(0x7f00000000c0)=ANY=[@ANYRES64], 0xc63b9e35)

13:23:38 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:38 executing program 3:
r0 = socket$inet6(0xa, 0x40000000000001, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c)
listen(r0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, @tcp={{0x0, 0x4e20, 0x42424242, 0x41424344, 0x0, 0x0, 0x5, 0x90a443025eb162d0}}}}}}, 0x0)

13:23:38 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

[  565.572671] kauditd_printk_skb: 2 callbacks suppressed
[  565.572679] audit: type=1800 audit(1572960218.870:475): pid=15377 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=107 res=0
13:23:39 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0)

13:23:39 executing program 3:
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:39 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{0x0}], 0x1, 0x0)

13:23:39 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fe)
sendfile(r1, r2, 0x0, 0x0)

13:23:39 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0)

13:23:39 executing program 3:
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  565.771994] audit: type=1804 audit(1572960218.910:476): pid=15384 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/318/file0/file0" dev="loop2" ino=107 res=1
[  565.921001] audit: type=1800 audit(1572960218.930:477): pid=15384 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=107 res=0
13:23:39 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0)

13:23:39 executing program 3:
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  566.036999] audit: type=1800 audit(1572960219.270:478): pid=15410 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=108 res=0
[  566.080150] protocol 88fb is buggy, dev hsr_slave_0
[  566.080153] protocol 88fb is buggy, dev hsr_slave_0
[  566.080189] protocol 88fb is buggy, dev hsr_slave_1
[  566.085286] protocol 88fb is buggy, dev hsr_slave_1
[  566.109759] audit: type=1804 audit(1572960219.270:479): pid=15410 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/319/file0/file0" dev="loop2" ino=108 res=1
[  566.149518] audit: type=1800 audit(1572960219.270:480): pid=15410 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=108 res=0
13:23:39 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:23:39 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fe)
sendfile(r1, r2, 0x0, 0x0)

13:23:39 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}})
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0)

13:23:39 executing program 3:
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:39 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

[  566.435244] audit: type=1800 audit(1572960219.730:481): pid=15435 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=109 res=0
13:23:39 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

[  566.479796] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15436 comm=syz-executor.5
[  566.480186] audit: type=1804 audit(1572960219.730:482): pid=15435 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/320/file0/file0" dev="loop2" ino=109 res=1
[  566.520812] audit: type=1800 audit(1572960219.730:483): pid=15435 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=109 res=0
[  566.539963] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15436 comm=syz-executor.5
[  566.560000] device bridge_slave_1 left promiscuous mode
[  566.568787] bridge0: port 2(bridge_slave_1) entered disabled state
[  566.579049] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15436 comm=syz-executor.5
[  566.600769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15436 comm=syz-executor.5
[  566.613519] device bridge_slave_0 left promiscuous mode
[  566.613942] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15436 comm=syz-executor.5
[  566.619203] bridge0: port 1(bridge_slave_0) entered disabled state
[  566.631575] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15436 comm=syz-executor.5
[  566.650706] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15436 comm=syz-executor.5
[  566.667380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15436 comm=syz-executor.5
[  566.680522] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15436 comm=syz-executor.5
[  566.693440] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15436 comm=syz-executor.5
[  566.764145] device hsr_slave_1 left promiscuous mode
[  566.803901] device hsr_slave_0 left promiscuous mode
[  566.843121] team0 (unregistering): Port device team_slave_1 removed
[  566.854376] team0 (unregistering): Port device team_slave_0 removed
[  566.864759] bond0 (unregistering): Releasing backup interface bond_slave_1
[  566.913530] bond0 (unregistering): Releasing backup interface bond_slave_0
[  566.960142] protocol 88fb is buggy, dev hsr_slave_0
[  566.965330] protocol 88fb is buggy, dev hsr_slave_1
[  566.993917] bond0 (unregistering): Released all slaves
[  568.920933] IPVS: ftp: loaded support on port[0] = 21
[  569.837823] chnl_net:caif_netlink_parms(): no params data found
[  569.870887] bridge0: port 1(bridge_slave_0) entered blocking state
[  569.877308] bridge0: port 1(bridge_slave_0) entered disabled state
[  569.884399] device bridge_slave_0 entered promiscuous mode
[  569.891667] bridge0: port 2(bridge_slave_1) entered blocking state
[  569.898153] bridge0: port 2(bridge_slave_1) entered disabled state
[  569.905431] device bridge_slave_1 entered promiscuous mode
[  569.922107] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  569.931717] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  569.947730] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  569.955007] team0: Port device team_slave_0 added
[  569.960794] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  569.967848] team0: Port device team_slave_1 added
[  569.973266] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  569.980862] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  570.033541] device hsr_slave_0 entered promiscuous mode
[  570.070461] device hsr_slave_1 entered promiscuous mode
[  570.110764] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  570.117772] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  570.129997] bridge0: port 2(bridge_slave_1) entered blocking state
[  570.136488] bridge0: port 2(bridge_slave_1) entered forwarding state
[  570.143146] bridge0: port 1(bridge_slave_0) entered blocking state
[  570.149483] bridge0: port 1(bridge_slave_0) entered forwarding state
[  570.176531] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  570.182855] 8021q: adding VLAN 0 to HW filter on device bond0
[  570.191167] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  570.199677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  570.207078] bridge0: port 1(bridge_slave_0) entered disabled state
[  570.213936] bridge0: port 2(bridge_slave_1) entered disabled state
[  570.224639] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  570.230940] 8021q: adding VLAN 0 to HW filter on device team0
[  570.239049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  570.247000] bridge0: port 1(bridge_slave_0) entered blocking state
[  570.253374] bridge0: port 1(bridge_slave_0) entered forwarding state
[  570.270515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  570.278101] bridge0: port 2(bridge_slave_1) entered blocking state
[  570.284504] bridge0: port 2(bridge_slave_1) entered forwarding state
[  570.291888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  570.299365] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  570.307444] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  570.315779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  570.327597] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  570.337855] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  570.344040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  570.353942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  570.366369] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  570.374418] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  570.381299] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  570.392265] 8021q: adding VLAN 0 to HW filter on device batadv0
[  570.830630] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:23:44 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{0x0}], 0x1, 0x0)

13:23:44 executing program 2:
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
write(r1, &(0x7f0000000600)="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", 0x1fe)
sendfile(r1, r2, 0x0, 0x0)

13:23:44 executing program 3:
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:44 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:23:44 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:44 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:23:45 executing program 3:
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  571.724914] audit: type=1800 audit(1572960225.020:484): pid=15477 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=110 res=0
[  571.763755] selinux_nlmsg_perm: 1555 callbacks suppressed
13:23:45 executing program 3:
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  571.763765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15480 comm=syz-executor.5
[  571.814095] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15480 comm=syz-executor.5
[  571.828995] audit: type=1804 audit(1572960225.050:485): pid=15477 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir282623296/syzkaller.Ht4vLs/321/file0/file0" dev="loop2" ino=110 res=1
[  571.831616] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15490 comm=syz-executor.0
13:23:45 executing program 2:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="5f454c44065b05007311e6e11adb0024711bff2cebca7da1968e234c4d3d8e20db74ab218ea49d12b8b5e42a082564894c92b49de70be624558128bd680db19db769d72bf973a5bfdb715093d18108242e74ad2f00b39609dbf3a57a945c5cbd7b8258824e92918acaf74ae7f424d440e1bee19cc477c72b29e7d003409f3274ca0a60285738d8e1bc84a0ab7d4421cf5872786b5c4c6b14505876b16f7bdcd84f18de10661fb3a0852e14ce491a42db4c5735ea6aa6ec95a82b8435d60f4268c3aebc870bb2c27dbe3ef5f021175d994ec4831811c7b0f0d7dfe3af92878b78073db713c2803cac5483ec88eafc639728b40baaffe0363040321e1984dcf0ac32a6c3cf"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:23:45 executing program 3:
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:45 executing program 1:
r0 = inotify_init1(0x0)
fcntl$setown(r0, 0x8, 0xffffffffffffffff)
fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, <r1=>0x0})
r2 = inotify_init1(0x0)
fcntl$setown(r2, 0x8, 0xffffffffffffffff)
fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, <r3=>0x0})
tkill(r3, 0x7)
process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/125, 0x7d}], 0x1, &(0x7f0000000640)=[{0x0}], 0x1, 0x0)

[  571.885228] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15480 comm=syz-executor.5
[  571.892297] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15490 comm=syz-executor.0
[  571.906244] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15480 comm=syz-executor.5
[  571.927214] audit: type=1800 audit(1572960225.050:486): pid=15477 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="loop2" ino=110 res=0
[  571.930153] protocol 88fb is buggy, dev hsr_slave_0
[  571.955271] protocol 88fb is buggy, dev hsr_slave_1
[  571.956152] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15480 comm=syz-executor.5
[  571.988613] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15480 comm=syz-executor.5
[  572.001328] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15490 comm=syz-executor.0
[  572.027840] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15480 comm=syz-executor.5
13:23:45 executing program 3:
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:45 executing program 3:
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:45 executing program 3:
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:45 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  572.320125] protocol 88fb is buggy, dev hsr_slave_0
[  572.325244] protocol 88fb is buggy, dev hsr_slave_1
[  572.330116] protocol 88fb is buggy, dev hsr_slave_0
[  572.335326] protocol 88fb is buggy, dev hsr_slave_1
13:23:45 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:23:45 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

[  572.470924] device bridge_slave_1 left promiscuous mode
[  572.476757] bridge0: port 2(bridge_slave_1) entered disabled state
13:23:45 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:23:45 executing program 3:
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:45 executing program 3:
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  572.581515] device bridge_slave_0 left promiscuous mode
[  572.592975] bridge0: port 1(bridge_slave_0) entered disabled state
[  572.762992] device hsr_slave_1 left promiscuous mode
[  572.793402] device hsr_slave_0 left promiscuous mode
[  572.843339] team0 (unregistering): Port device team_slave_1 removed
[  572.854123] team0 (unregistering): Port device team_slave_0 removed
[  572.863697] bond0 (unregistering): Releasing backup interface bond_slave_1
[  572.906094] bond0 (unregistering): Releasing backup interface bond_slave_0
[  572.995863] bond0 (unregistering): Released all slaves
13:23:46 executing program 2:
r0 = socket$inet6(0xa, 0x3, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071")
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @loopback}, 0x1c)
listen(r1, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c)
shutdown(r2, 0x1)
r3 = accept(r1, 0x0, 0x0)
sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)}, 0x0)
recvfrom$inet(r3, &(0x7f0000000040)=""/55, 0x37, 0x100, 0x0, 0x0)

13:23:46 executing program 3:
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  573.103993] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies.  Check SNMP counters.
[  573.200109] protocol 88fb is buggy, dev hsr_slave_0
[  573.205231] protocol 88fb is buggy, dev hsr_slave_1
[  574.921398] IPVS: ftp: loaded support on port[0] = 21
[  575.697487] chnl_net:caif_netlink_parms(): no params data found
[  575.729178] bridge0: port 1(bridge_slave_0) entered blocking state
[  575.735695] bridge0: port 1(bridge_slave_0) entered disabled state
[  575.742686] device bridge_slave_0 entered promiscuous mode
[  575.749182] bridge0: port 2(bridge_slave_1) entered blocking state
[  575.755978] bridge0: port 2(bridge_slave_1) entered disabled state
[  575.763327] device bridge_slave_1 entered promiscuous mode
[  575.779499] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  575.788694] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  575.805134] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  575.812414] team0: Port device team_slave_0 added
[  575.817883] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  575.825096] team0: Port device team_slave_1 added
[  575.830436] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  575.837610] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  575.904331] device hsr_slave_0 entered promiscuous mode
[  575.950492] device hsr_slave_1 entered promiscuous mode
[  575.990808] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  575.998229] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  576.011029] bridge0: port 2(bridge_slave_1) entered blocking state
[  576.017419] bridge0: port 2(bridge_slave_1) entered forwarding state
[  576.024115] bridge0: port 1(bridge_slave_0) entered blocking state
[  576.030495] bridge0: port 1(bridge_slave_0) entered forwarding state
[  576.057353] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  576.063798] 8021q: adding VLAN 0 to HW filter on device bond0
[  576.072625] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  576.081699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  576.088829] bridge0: port 1(bridge_slave_0) entered disabled state
[  576.095651] bridge0: port 2(bridge_slave_1) entered disabled state
[  576.105529] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  576.111728] 8021q: adding VLAN 0 to HW filter on device team0
[  576.119932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  576.127917] bridge0: port 1(bridge_slave_0) entered blocking state
[  576.134295] bridge0: port 1(bridge_slave_0) entered forwarding state
[  576.151217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  576.159023] bridge0: port 2(bridge_slave_1) entered blocking state
[  576.165467] bridge0: port 2(bridge_slave_1) entered forwarding state
[  576.172949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  576.180698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  576.191278] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  576.198141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  576.208102] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  576.218394] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  576.224515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  576.232830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  576.246514] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  576.254050] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  576.261439] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  576.273095] 8021q: adding VLAN 0 to HW filter on device batadv0
[  576.690536] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
13:23:50 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:23:50 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000), 0x0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:50 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:23:50 executing program 1:
mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4001, &(0x7f0000000040)=0x1009, 0x3ef0, 0x0)
get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2)

13:23:50 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:23:50 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:50 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:23:50 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000), 0x0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  577.668559] selinux_nlmsg_perm: 2529 callbacks suppressed
[  577.668570] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15575 comm=syz-executor.0
[  577.699071] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15570 comm=syz-executor.5
[  577.725507] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15575 comm=syz-executor.0
[  577.755691] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15570 comm=syz-executor.5
13:23:51 executing program 1:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]})
r0 = semget$private(0x0, 0x2000000010a, 0x0)
semop(r0, &(0x7f0000000200)=[{}], 0x1)
semtimedop(0x0, 0x0, 0x0, 0x0)

[  577.767114] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15575 comm=syz-executor.0
[  577.767990] protocol 88fb is buggy, dev hsr_slave_0
[  577.785277] protocol 88fb is buggy, dev hsr_slave_1
[  577.786279] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15575 comm=syz-executor.0
[  577.804272] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15575 comm=syz-executor.0
13:23:51 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

[  577.817692] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15575 comm=syz-executor.0
13:23:51 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000), 0x0, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  577.848762] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15575 comm=syz-executor.0
13:23:51 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{0x0}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  577.896345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=15570 comm=syz-executor.5
[  578.160296] protocol 88fb is buggy, dev hsr_slave_0
[  578.165544] protocol 88fb is buggy, dev hsr_slave_1
13:23:51 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:23:51 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:23:51 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{0x0}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:51 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:23:51 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff})
r1 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r1, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)

[  578.460507] device bridge_slave_1 left promiscuous mode
[  578.467313] bridge0: port 2(bridge_slave_1) entered disabled state
13:23:51 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{0x0}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  578.521228] device bridge_slave_0 left promiscuous mode
[  578.528474] bridge0: port 1(bridge_slave_0) entered disabled state
[  578.560353] protocol 88fb is buggy, dev hsr_slave_0
[  578.565603] protocol 88fb is buggy, dev hsr_slave_1
13:23:51 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:51 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

[  578.570111] protocol 88fb is buggy, dev hsr_slave_0
[  578.575722] protocol 88fb is buggy, dev hsr_slave_1
[  578.667098] device hsr_slave_1 left promiscuous mode
[  578.704551] device hsr_slave_0 left promiscuous mode
[  578.744600] team0 (unregistering): Port device team_slave_1 removed
[  578.754678] team0 (unregistering): Port device team_slave_0 removed
[  578.765822] bond0 (unregistering): Releasing backup interface bond_slave_1
[  578.804808] bond0 (unregistering): Releasing backup interface bond_slave_0
[  578.867785] bond0 (unregistering): Released all slaves
[  580.611355] IPVS: ftp: loaded support on port[0] = 21
[  581.498698] chnl_net:caif_netlink_parms(): no params data found
[  581.529962] bridge0: port 1(bridge_slave_0) entered blocking state
[  581.536443] bridge0: port 1(bridge_slave_0) entered disabled state
[  581.543506] device bridge_slave_0 entered promiscuous mode
[  581.550222] bridge0: port 2(bridge_slave_1) entered blocking state
[  581.556665] bridge0: port 2(bridge_slave_1) entered disabled state
[  581.563948] device bridge_slave_1 entered promiscuous mode
[  581.581266] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  581.590153] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  581.606516] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  581.613824] team0: Port device team_slave_0 added
[  581.619205] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  581.626767] team0: Port device team_slave_1 added
[  581.632056] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  581.639325] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  581.693602] device hsr_slave_0 entered promiscuous mode
[  581.760377] device hsr_slave_1 entered promiscuous mode
[  581.830786] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  581.837768] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  581.851944] bridge0: port 2(bridge_slave_1) entered blocking state
[  581.858320] bridge0: port 2(bridge_slave_1) entered forwarding state
[  581.864975] bridge0: port 1(bridge_slave_0) entered blocking state
[  581.871370] bridge0: port 1(bridge_slave_0) entered forwarding state
[  581.898068] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  581.904497] 8021q: adding VLAN 0 to HW filter on device bond0
[  581.913664] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  581.921979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  581.929044] bridge0: port 1(bridge_slave_0) entered disabled state
[  581.936985] bridge0: port 2(bridge_slave_1) entered disabled state
[  581.946162] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  581.952631] 8021q: adding VLAN 0 to HW filter on device team0
[  581.961146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  581.968688] bridge0: port 1(bridge_slave_0) entered blocking state
[  581.976761] bridge0: port 1(bridge_slave_0) entered forwarding state
[  581.986738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  581.994633] bridge0: port 2(bridge_slave_1) entered blocking state
[  582.001029] bridge0: port 2(bridge_slave_1) entered forwarding state
[  582.021005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  582.028574] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  582.036776] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  582.044259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  582.052110] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  582.060986] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  582.067290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  582.081972] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[  582.089414] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  582.096770] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  582.106405] 8021q: adding VLAN 0 to HW filter on device batadv0
[  582.490562] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  583.344454] audit: type=1326 audit(1572960236.640:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d05a code=0xffff0000
13:23:57 executing program 1:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0)
fchdir(r0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r2)
r3 = open(&(0x7f0000000000)='./bus\x00', 0x1e5042, 0x0)
sendfile(r2, r3, 0x0, 0x80001d00c0d0)

13:23:57 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x2)

13:23:57 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:23:57 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:23:57 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(0xffffffffffffffff)
socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10003, 0x0)

13:23:57 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff})
r1 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r1, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)

[  584.126299] audit: type=1326 audit(1572960237.420:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=15635 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45d05a code=0xffff0000
13:23:57 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x0)

[  584.249376] audit: type=1800 audit(1572960237.540:489): pid=15655 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=17621 res=0
[  584.276724] audit: type=1800 audit(1572960237.570:490): pid=15657 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="bus" dev="sda1" ino=17621 res=0
13:23:57 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x0)

13:23:57 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfa, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:23:57 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:23:57 executing program 3:
vmsplice(0xffffffffffffffff, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0xfdea}], 0x1, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0)
mbind(&(0x7f0000289000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0, 0x0)

13:23:57 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'')
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00')
sendfile(r0, r1, 0x0, 0x54bd)

13:23:57 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
fcntl$dupfd(r6, 0x0, r5)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:23:57 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfa, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

[  584.489876] selinux_nlmsg_perm: 1812 callbacks suppressed
[  584.489887] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15687 comm=syz-executor.0
[  584.509819] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15687 comm=syz-executor.0
[  584.523218] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15687 comm=syz-executor.0
[  584.536481] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15687 comm=syz-executor.0
[  584.549189] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15687 comm=syz-executor.0
[  584.561851] protocol 88fb is buggy, dev hsr_slave_0
[  584.567021] protocol 88fb is buggy, dev hsr_slave_1
[  584.572744] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15687 comm=syz-executor.0
[  584.585603] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15687 comm=syz-executor.0
[  584.598294] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15687 comm=syz-executor.0
[  584.610987] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15687 comm=syz-executor.0
[  584.623926] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15687 comm=syz-executor.0
[  584.800160] protocol 88fb is buggy, dev hsr_slave_0
[  584.800206] protocol 88fb is buggy, dev hsr_slave_0
[  584.805262] protocol 88fb is buggy, dev hsr_slave_1
[  584.815742] protocol 88fb is buggy, dev hsr_slave_1
13:23:58 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:23:58 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'')
r1 = gettid()
r2 = syz_open_procfs(r1, &(0x7f0000000440)='syscall\x00')
sendfile(r0, r2, 0x0, 0x1)
fstat(0xffffffffffffffff, 0x0)

13:23:58 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(0xffffffffffffffff)
socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10003, 0x0)

13:23:58 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff})
r1 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r1, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)

13:23:58 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfa, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:23:58 executing program 3:
r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x802)
ioctl$BLKDISCARD(r0, 0x1277, 0x0)

13:23:58 executing program 3:
r0 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r3}, @IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r3}]]}}}]}, 0x40}}, 0x0)

13:23:58 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfa, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:23:58 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d5, 0x32}, 0x0, @in6=@rand_addr="00c8e8767e00", 0x0, 0x0, 0x0, 0x5}}, 0xe8)
connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c)

13:23:58 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:23:58 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
fcntl$dupfd(r6, 0x0, r5)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:23:58 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100))
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

[  585.680107] protocol 88fb is buggy, dev hsr_slave_0
[  585.685367] protocol 88fb is buggy, dev hsr_slave_1
13:23:59 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:23:59 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100))
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:23:59 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(0xffffffffffffffff)
socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10003, 0x0)

13:23:59 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
sendmmsg$inet(r0, &(0x7f0000004f40)=[{{&(0x7f0000000140)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000001700)=[{&(0x7f0000000180)="aed0255f46087f4ef6d7ebc5c7fbbbf7e5ca8b3756fdbb569e12de5ed5739bb2fd49c0b4e21bb099d95025c654214c9d52f5e07ef221f8792595d063604848c798fa1aa13eda461dc25a2160f78e36c8c01cdcb4df764cd1d7912bfc808365bf6f7dcb0df75b1840094bb51801ef7b9168c90d3930dd6eec7f7112cc359b0687e8453ab284a71db67f37c447a42199cfc8ac86e5973321da7749070856c83e48f3e7b73b395572d16ac9173a0e34c8e6ed71cb", 0xb3}, {&(0x7f0000000240)="db942c843a910cc72960cb06877256f638ba0067f6b7b7d250203ffbb1ee07d79a7b5d2176ff9212165e0c57980a045b5ae81a2fbe02c2392842253b2e8f7eeea9a489804e1ff288ad245317915543064ea98eb510515edda4b0c58a83d362e072a5e4accee9160aca375e1af4c21226e80c76680db91a087ba55d1a6de022664bb4571ae6e68d3506633bd7326609c1ca5cae703fc5c72d66a9687c84ddbf373451044936fd1459dac29c58280888937e37202d8f257da081d2a9b1454edcb9e29704fddf20fa10b7387a9cc19da3f40f9e6196097ffad9a0", 0xd9}, {&(0x7f0000000340)="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", 0x435}], 0x3, &(0x7f0000001780)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @local}}}], 0x20}}], 0x1, 0x0)

13:23:59 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:23:59 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100))
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:23:59 executing program 3:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

13:23:59 executing program 1:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:23:59 executing program 3:
r0 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'lo\x00\t\x00\x00\x00\x00\x00\x00\xfc\x00', <r1=>0x0})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
sendmmsg$inet(r2, &(0x7f0000004940)=[{{&(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @dev, @multicast2}}}], 0x20}}], 0x1, 0x0)

13:23:59 executing program 1:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

[  586.025680] ptrace attach of "/root/syz-executor.3"[15764] was attempted by "/root/syz-executor.3"[15765]
[  586.080118] protocol 88fb is buggy, dev hsr_slave_0
[  586.085411] protocol 88fb is buggy, dev hsr_slave_1
13:23:59 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
fcntl$dupfd(r6, 0x0, r5)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:23:59 executing program 1:
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:23:59 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:23:59 executing program 3:

13:24:00 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10003, 0x0)

13:24:00 executing program 1:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:00 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:00 executing program 3:

13:24:00 executing program 1:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:00 executing program 3:

13:24:00 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10003, 0x0)

13:24:00 executing program 3:

13:24:00 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="5f454c44065b05007311e6e11adb0024711bff2cebca7da1968e234c4d3d8e20db74ab218ea49d12b8b5e42a082564894c92b49de70be624558128bd680db19db769d72bf973a5bfdb715093d18108242e74ad2f00b39609dbf3a57a945c5cbd7b8258824e92918acaf74ae7f424d440e1bee19cc477c72b29e7d003409f3274ca0a60285738d8e1bc84a0ab7d4421cf5872786b5c4c6b14505876b16f7bdcd84f18de10661fb3a0852e14ce491a42db4c5735ea6aa6ec95a82b8435d60f4268c3aebc870bb2c27dbe3ef5f021175d994ec4831811c7b0f0d7dfe3af92878b78073db713c2803cac5483ec88eafc639728b40baaffe0363040321e1984dcf0ac32a6c3cf"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:00 executing program 1:
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:00 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:00 executing program 4:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10003, 0x0)

13:24:00 executing program 3:

13:24:00 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:00 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:00 executing program 3:

13:24:00 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:00 executing program 4:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10003, 0x0)

13:24:00 executing program 3:

13:24:01 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:01 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="5f454c44065b05007311e6e11adb0024711bff2cebca7da1968e234c4d3d8e20db74ab218ea49d12b8b5e42a082564894c92b49de70be624558128bd680db19db769d72bf973a5bfdb715093d18108242e74ad2f00b39609dbf3a57a945c5cbd7b8258824e92918acaf74ae7f424d440e1bee19cc477c72b29e7d003409f3274ca0a60285738d8e1bc84a0ab7d4421cf5872786b5c4c6b14505876b16f7bdcd84f18de10661fb3a0852e14ce491a42db4c5735ea6aa6ec95a82b8435d60f4268c3aebc870bb2c27dbe3ef5f021175d994ec4831811c7b0f0d7dfe3af92878b78073db713c2803cac5483ec88eafc639728b40baaffe0363040321e1984dcf0ac32a6c3cf"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:01 executing program 4:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10003, 0x0)

13:24:01 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:01 executing program 3:

13:24:01 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:01 executing program 4:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10003, 0x0)

13:24:01 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:01 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:01 executing program 3:

13:24:01 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:01 executing program 3:

13:24:01 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:02 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:02 executing program 3:

13:24:02 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:02 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:02 executing program 3:

13:24:02 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:02 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:02 executing program 3:

13:24:02 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:02 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0)
quotactl(0x40000080000100, 0x0, 0x0, 0x0)

13:24:02 executing program 3:

13:24:02 executing program 3:

[  589.490241] selinux_nlmsg_perm: 14007 callbacks suppressed
[  589.490250] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15888 comm=syz-executor.0
[  589.509027] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15888 comm=syz-executor.0
[  589.521877] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15888 comm=syz-executor.0
[  589.535382] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15888 comm=syz-executor.0
[  589.548128] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15888 comm=syz-executor.0
[  589.560761] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15888 comm=syz-executor.0
[  589.574243] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15888 comm=syz-executor.0
[  589.586838] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15888 comm=syz-executor.0
[  589.599504] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15888 comm=syz-executor.0
[  589.613913] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=15888 comm=syz-executor.0
13:24:02 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:02 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
quotactl(0x0, 0x0, 0x0, 0x0)

[  589.840162] net_ratelimit: 20 callbacks suppressed
[  589.840168] protocol 88fb is buggy, dev hsr_slave_0
[  589.850231] protocol 88fb is buggy, dev hsr_slave_1
13:24:03 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:03 executing program 3:

13:24:03 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
quotactl(0x0, 0x0, 0x0, 0x0)

13:24:03 executing program 3:

13:24:03 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:03 executing program 1:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
quotactl(0x0, 0x0, 0x0, 0x0)

13:24:03 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:03 executing program 3:

13:24:03 executing program 3:

13:24:03 executing program 1:

[  590.250099] protocol 88fb is buggy, dev hsr_slave_0
[  590.255284] protocol 88fb is buggy, dev hsr_slave_1
13:24:03 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="5f454c44065b05007311e6e11adb0024711bff2cebca7da1968e234c4d3d8e20db74ab218ea49d12b8b5e42a082564894c92b49de70be624558128bd680db19db769d72bf973a5bfdb715093d18108242e74ad2f00b39609dbf3a57a945c5cbd7b8258824e92918acaf74ae7f424d440e1bee19cc477c72b29e7d003409f3274ca0a60285738d8e1bc84a0ab7d4421cf5872786b5c4c6b14505876b16f7bdcd84f18de10661fb3a0852e14ce491a42db4c5735ea6aa6ec95a82b8435d60f4268c3aebc870bb2c27dbe3ef5f021175d994ec4831811c7b0f0d7dfe3af92878b78073db713c2803cac5483ec88eafc639728b40baaffe0363040321e1984dcf0ac32a6c3cf"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:03 executing program 3:

[  590.640157] protocol 88fb is buggy, dev hsr_slave_0
[  590.645336] protocol 88fb is buggy, dev hsr_slave_1
13:24:04 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:04 executing program 1:

13:24:04 executing program 3:

[  590.800158] protocol 88fb is buggy, dev hsr_slave_0
[  590.805355] protocol 88fb is buggy, dev hsr_slave_1
13:24:04 executing program 3:

13:24:04 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:04 executing program 1:
socket$inet6(0xa, 0x80003, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071")
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:04 executing program 3:
syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c795)

13:24:04 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:04 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88)

[  591.041161] protocol 88fb is buggy, dev hsr_slave_0
[  591.046283] protocol 88fb is buggy, dev hsr_slave_1
13:24:04 executing program 5:
r0 = socket$netlink(0x10, 0x3, 0x0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:04 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:04 executing program 1:
socket$inet6(0xa, 0x80003, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071")
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:05 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdc)
read(0xffffffffffffffff, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:05 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r4, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f00000005c0)=""/230)
r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r5, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100)=<r6=>0x0)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r9}]]}}}]}, 0x38}}, 0x0)
r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r10, 0x0)
r11 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r11, 0x0)
r12 = socket$inet6(0xa, 0x400000000001, 0x0)
r13 = dup(r12)
setsockopt$inet_tcp_int(r13, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r13, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r13, &(0x7f0000000400)=@abs, 0x6e)
r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r15 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r14, r15, 0x0, 0x1)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
r16 = eventfd2(0x3, 0x800)
io_submit(r6, 0x9, &(0x7f0000000fc0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x200, r7, &(0x7f0000000780)="96f9ca3610f73fee70b99d28662e1449f38efd7312657f48bd17428a21b39c588a63d2a5c6edc5ef0f2aa9ad0d74bdfb83cdf57a75fd5a289728d7458757268fe89751c94f5d5abe746a0a352164863d32cb6f03647d76dc71de0e866df1cbd04beb918a721f5dd19370d4d91acf20ae522360f9213fe8646bece14f2c24e00436c3b382d2860d9aeb7e280ea9d5d6d7", 0x90, 0x6, 0x0, 0x3, r10}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x8001, 0xffffffffffffffff, &(0x7f0000000400)="6bd33a5e3ca8e106fe5344aa9f8528ab077cc6d443835793f916b66c284c7fb8f43b45c50cfacfdc06a11a6559bdc9", 0x2f, 0x5, 0x0, 0x0, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x3, r11, &(0x7f0000000840)="098f65ab9e6cafae538f18b8dcee8ec0eeed4837f37f477d98149d427476d8dfa9a201ae2e48292910adfbc02c0d99af972a042f67b35f377e0180e8254e12648f52c38ed83c166f6968633b61caf1760bff06f4ba81272cda6cc7af2a74553e19ac8cbddd9e36df7be098a14a9ed2e858a59a7312554e67d38a83e97106dab08bec607b8ce0dd972be18b8ee5c5b44cb6f5ca8ce5378fab72fc1ff575c8e245337c38266c360ebce68d625fca672fefdcbca8d528", 0xb5, 0x81, 0x0, 0x0, r13}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x6, 0x3ff, 0xffffffffffffffff, &(0x7f0000000980)="5666fa2feacfe87641954a70e7fed284f09ab2f0137784a13235e0e70b3307de0cb6176c68914bdc7cfd797ea7ac9b01053d9d5b1de70bc06dfe7f3ec0ab9b6aacfab9cf398909c59d51a10b4eb7bbe66a3e67500aa0a4379310680bca4242e7ff92c03e2316e616dfdaac6a8b4cecfcb7fd6578c87fa9c9efa4d7e01c285f9667adc74342c35675de6e6ac3f45a416f569e58b1649e3b355ab2f003a8d10690ae90b69a3670c45e0aeca5143d7dd095f78a7c57b302b3", 0xb7, 0x0, 0x0, 0x0, r4}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000b80)="4259c3040cfcf200b46f4480bbd633014706e255b26a662b4b63df168f17f500a0ad0e5bf4fe03eebe7fa6afc73e9d4f4c0cde71cabcd3742979898be03d7f9ad78646bb4dda9a16b09c8bcb0194dd7e2080c2f98da361a1de11e5cb748f1888775132c1f9ce67237802fd92160faeb112cab72a92f99002388c3e4ae624aa83b3416c7b119492098039b29c4e9e905f0e13c64205fdc2e2a79f5165d0813c61c057ede4f82c262ee60301e7d5c59c3d27c2c79862c33b1c91abf5fdf98e441bc933eb5224a87c60305a18b02c830e2d7a0e3970985e944d0f920f412d5a2cc82fa1ca59567a668de492bac0a31ee6a3406f7e0993baa8e8", 0xf8, 0x3522}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x7, 0x8, 0xffffffffffffffff, &(0x7f0000000c80)="3102cc9fc6d472cef729b9033a5a3bd4b8f0816de1ed690106c78c83efd5021d8a9e397901e83fee785d9b75510df2223017231fe02dd836ddc0f72654d9cb56b8ba84887419dc56e111b7e8f2718261d28ea7ce1862b2baad0de1dbf1a9a8e8efe85a27ebce70fa67b6ab917dc3c2868f1dacbd21f722375a7380d49848f8e5488aab9dff424bc1d7b3c33a008bcfa88fc21e62692628d6bceee97316ec5e9029023c5d", 0xa4, 0x3, 0x0, 0x0, r16}, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x7, 0x9, r16, &(0x7f0000000d40)="79b89df67ce9a1b8fc922c3f68c61389e3647ac45c6232020661441f4eadcf270646e58b692a7c72a0d0a4f79544f866c0852752d74d5cf28e76e13797a6c5532c3b0ce4e22fae871eae78", 0x4b, 0xd3, 0x0, 0x1}, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x20, 0xffffffffffffffff, &(0x7f0000000e00)="3a885cb9030837a909bdc8da5484a3999654c54b43ce684dd41a419865ad8d01e7d02483024c676e6d86e641b658adf9e951e3268113b80306494df1410e9c037ae47fd2611b8cbf630bf247084a02e1966a4fe1b3846f100e2366581714130a272d0c9122c126ed4aa1159c1db68bf35a2f78dd7b1cfe3c77471968132709d3", 0x80}, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x4, 0x1000, r3, &(0x7f0000000ec0)="aecaf9ec3b28aef66bf4d4cb91c6dc12d907cb862afe6eaab89f6873f0572da0cb2bafb3ddedf5aa1c8ca40bd3c0c32cb772753eda793bb192adf35c957f02a596edc2c3da3c7d287f6f27a4dc588dc600a5c04e294f6f5f9f28ef4a149b499edcc7c0606597f6bcce689669ca9a3b96e18b638a1182dfc50f18d60a6f7e670502ff1195", 0x84, 0x3f, 0x0, 0x1}])

13:24:05 executing program 5:
pipe(0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:05 executing program 1:
socket$inet6(0xa, 0x80003, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071")
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:05 executing program 5:
pipe(0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:05 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdc)
read(0xffffffffffffffff, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:05 executing program 1:
socket$inet6(0xa, 0x80003, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071")
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:05 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:05 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r4, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f00000005c0)=""/230)
r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r5, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100)=<r6=>0x0)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r9}]]}}}]}, 0x38}}, 0x0)
r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r10, 0x0)
r11 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r11, 0x0)
r12 = socket$inet6(0xa, 0x400000000001, 0x0)
r13 = dup(r12)
setsockopt$inet_tcp_int(r13, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r13, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r13, &(0x7f0000000400)=@abs, 0x6e)
r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r15 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r14, r15, 0x0, 0x1)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
r16 = eventfd2(0x3, 0x800)
io_submit(r6, 0x9, &(0x7f0000000fc0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x200, r7, &(0x7f0000000780)="96f9ca3610f73fee70b99d28662e1449f38efd7312657f48bd17428a21b39c588a63d2a5c6edc5ef0f2aa9ad0d74bdfb83cdf57a75fd5a289728d7458757268fe89751c94f5d5abe746a0a352164863d32cb6f03647d76dc71de0e866df1cbd04beb918a721f5dd19370d4d91acf20ae522360f9213fe8646bece14f2c24e00436c3b382d2860d9aeb7e280ea9d5d6d7", 0x90, 0x6, 0x0, 0x3, r10}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x8001, 0xffffffffffffffff, &(0x7f0000000400)="6bd33a5e3ca8e106fe5344aa9f8528ab077cc6d443835793f916b66c284c7fb8f43b45c50cfacfdc06a11a6559bdc9", 0x2f, 0x5, 0x0, 0x0, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x3, r11, &(0x7f0000000840)="098f65ab9e6cafae538f18b8dcee8ec0eeed4837f37f477d98149d427476d8dfa9a201ae2e48292910adfbc02c0d99af972a042f67b35f377e0180e8254e12648f52c38ed83c166f6968633b61caf1760bff06f4ba81272cda6cc7af2a74553e19ac8cbddd9e36df7be098a14a9ed2e858a59a7312554e67d38a83e97106dab08bec607b8ce0dd972be18b8ee5c5b44cb6f5ca8ce5378fab72fc1ff575c8e245337c38266c360ebce68d625fca672fefdcbca8d528", 0xb5, 0x81, 0x0, 0x0, r13}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x6, 0x3ff, 0xffffffffffffffff, &(0x7f0000000980)="5666fa2feacfe87641954a70e7fed284f09ab2f0137784a13235e0e70b3307de0cb6176c68914bdc7cfd797ea7ac9b01053d9d5b1de70bc06dfe7f3ec0ab9b6aacfab9cf398909c59d51a10b4eb7bbe66a3e67500aa0a4379310680bca4242e7ff92c03e2316e616dfdaac6a8b4cecfcb7fd6578c87fa9c9efa4d7e01c285f9667adc74342c35675de6e6ac3f45a416f569e58b1649e3b355ab2f003a8d10690ae90b69a3670c45e0aeca5143d7dd095f78a7c57b302b3", 0xb7, 0x0, 0x0, 0x0, r4}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000b80)="4259c3040cfcf200b46f4480bbd633014706e255b26a662b4b63df168f17f500a0ad0e5bf4fe03eebe7fa6afc73e9d4f4c0cde71cabcd3742979898be03d7f9ad78646bb4dda9a16b09c8bcb0194dd7e2080c2f98da361a1de11e5cb748f1888775132c1f9ce67237802fd92160faeb112cab72a92f99002388c3e4ae624aa83b3416c7b119492098039b29c4e9e905f0e13c64205fdc2e2a79f5165d0813c61c057ede4f82c262ee60301e7d5c59c3d27c2c79862c33b1c91abf5fdf98e441bc933eb5224a87c60305a18b02c830e2d7a0e3970985e944d0f920f412d5a2cc82fa1ca59567a668de492bac0a31ee6a3406f7e0993baa8e8", 0xf8, 0x3522}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x7, 0x8, 0xffffffffffffffff, &(0x7f0000000c80)="3102cc9fc6d472cef729b9033a5a3bd4b8f0816de1ed690106c78c83efd5021d8a9e397901e83fee785d9b75510df2223017231fe02dd836ddc0f72654d9cb56b8ba84887419dc56e111b7e8f2718261d28ea7ce1862b2baad0de1dbf1a9a8e8efe85a27ebce70fa67b6ab917dc3c2868f1dacbd21f722375a7380d49848f8e5488aab9dff424bc1d7b3c33a008bcfa88fc21e62692628d6bceee97316ec5e9029023c5d", 0xa4, 0x3, 0x0, 0x0, r16}, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x7, 0x9, r16, &(0x7f0000000d40)="79b89df67ce9a1b8fc922c3f68c61389e3647ac45c6232020661441f4eadcf270646e58b692a7c72a0d0a4f79544f866c0852752d74d5cf28e76e13797a6c5532c3b0ce4e22fae871eae78", 0x4b, 0xd3, 0x0, 0x1}, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x20, 0xffffffffffffffff, &(0x7f0000000e00)="3a885cb9030837a909bdc8da5484a3999654c54b43ce684dd41a419865ad8d01e7d02483024c676e6d86e641b658adf9e951e3268113b80306494df1410e9c037ae47fd2611b8cbf630bf247084a02e1966a4fe1b3846f100e2366581714130a272d0c9122c126ed4aa1159c1db68bf35a2f78dd7b1cfe3c77471968132709d3", 0x80}, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x4, 0x1000, r3, &(0x7f0000000ec0)="aecaf9ec3b28aef66bf4d4cb91c6dc12d907cb862afe6eaab89f6873f0572da0cb2bafb3ddedf5aa1c8ca40bd3c0c32cb772753eda793bb192adf35c957f02a596edc2c3da3c7d287f6f27a4dc588dc600a5c04e294f6f5f9f28ef4a149b499edcc7c0606597f6bcce689669ca9a3b96e18b638a1182dfc50f18d60a6f7e670502ff1195", 0x84, 0x3f, 0x0, 0x1}])

13:24:05 executing program 5:
pipe(0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:05 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="5f454c44065b05007311e6e11adb0024711bff2cebca7da1968e234c4d3d8e20db74ab218ea49d12b8b5e42a082564894c92b49de70be624558128bd680db19db769d72bf973a5bfdb715093d18108242e74ad2f00b39609dbf3a57a945c5cbd7b8258824e92918acaf74ae7f424d440e1bee19cc477c72b29e7d003409f3274ca0a60285738d8e1bc84a0ab7d4421cf5872786b5c4c6b14505876b16f7bdcd84f18de10661fb3a0852e14ce491a42db4c5735ea6aa6ec95a82b8435d60f4268c3aebc870bb2c27dbe3ef5f021175d994ec4831811c7b0f0d7dfe3af92878b78073db713c2803cac5483ec88eafc639728b40baaffe0363040321e1984dcf0ac32a6c3cf"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
socket$netlink(0x10, 0x3, 0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:05 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdc)
read(0xffffffffffffffff, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:05 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r4, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f00000005c0)=""/230)
r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r5, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100)=<r6=>0x0)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r9}]]}}}]}, 0x38}}, 0x0)
r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r10, 0x0)
r11 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r11, 0x0)
r12 = socket$inet6(0xa, 0x400000000001, 0x0)
r13 = dup(r12)
setsockopt$inet_tcp_int(r13, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r13, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r13, &(0x7f0000000400)=@abs, 0x6e)
r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r15 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r14, r15, 0x0, 0x1)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
r16 = eventfd2(0x3, 0x800)
io_submit(r6, 0x9, &(0x7f0000000fc0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x200, r7, &(0x7f0000000780)="96f9ca3610f73fee70b99d28662e1449f38efd7312657f48bd17428a21b39c588a63d2a5c6edc5ef0f2aa9ad0d74bdfb83cdf57a75fd5a289728d7458757268fe89751c94f5d5abe746a0a352164863d32cb6f03647d76dc71de0e866df1cbd04beb918a721f5dd19370d4d91acf20ae522360f9213fe8646bece14f2c24e00436c3b382d2860d9aeb7e280ea9d5d6d7", 0x90, 0x6, 0x0, 0x3, r10}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x8001, 0xffffffffffffffff, &(0x7f0000000400)="6bd33a5e3ca8e106fe5344aa9f8528ab077cc6d443835793f916b66c284c7fb8f43b45c50cfacfdc06a11a6559bdc9", 0x2f, 0x5, 0x0, 0x0, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x3, r11, &(0x7f0000000840)="098f65ab9e6cafae538f18b8dcee8ec0eeed4837f37f477d98149d427476d8dfa9a201ae2e48292910adfbc02c0d99af972a042f67b35f377e0180e8254e12648f52c38ed83c166f6968633b61caf1760bff06f4ba81272cda6cc7af2a74553e19ac8cbddd9e36df7be098a14a9ed2e858a59a7312554e67d38a83e97106dab08bec607b8ce0dd972be18b8ee5c5b44cb6f5ca8ce5378fab72fc1ff575c8e245337c38266c360ebce68d625fca672fefdcbca8d528", 0xb5, 0x81, 0x0, 0x0, r13}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x6, 0x3ff, 0xffffffffffffffff, &(0x7f0000000980)="5666fa2feacfe87641954a70e7fed284f09ab2f0137784a13235e0e70b3307de0cb6176c68914bdc7cfd797ea7ac9b01053d9d5b1de70bc06dfe7f3ec0ab9b6aacfab9cf398909c59d51a10b4eb7bbe66a3e67500aa0a4379310680bca4242e7ff92c03e2316e616dfdaac6a8b4cecfcb7fd6578c87fa9c9efa4d7e01c285f9667adc74342c35675de6e6ac3f45a416f569e58b1649e3b355ab2f003a8d10690ae90b69a3670c45e0aeca5143d7dd095f78a7c57b302b3", 0xb7, 0x0, 0x0, 0x0, r4}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000b80)="4259c3040cfcf200b46f4480bbd633014706e255b26a662b4b63df168f17f500a0ad0e5bf4fe03eebe7fa6afc73e9d4f4c0cde71cabcd3742979898be03d7f9ad78646bb4dda9a16b09c8bcb0194dd7e2080c2f98da361a1de11e5cb748f1888775132c1f9ce67237802fd92160faeb112cab72a92f99002388c3e4ae624aa83b3416c7b119492098039b29c4e9e905f0e13c64205fdc2e2a79f5165d0813c61c057ede4f82c262ee60301e7d5c59c3d27c2c79862c33b1c91abf5fdf98e441bc933eb5224a87c60305a18b02c830e2d7a0e3970985e944d0f920f412d5a2cc82fa1ca59567a668de492bac0a31ee6a3406f7e0993baa8e8", 0xf8, 0x3522}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x7, 0x8, 0xffffffffffffffff, &(0x7f0000000c80)="3102cc9fc6d472cef729b9033a5a3bd4b8f0816de1ed690106c78c83efd5021d8a9e397901e83fee785d9b75510df2223017231fe02dd836ddc0f72654d9cb56b8ba84887419dc56e111b7e8f2718261d28ea7ce1862b2baad0de1dbf1a9a8e8efe85a27ebce70fa67b6ab917dc3c2868f1dacbd21f722375a7380d49848f8e5488aab9dff424bc1d7b3c33a008bcfa88fc21e62692628d6bceee97316ec5e9029023c5d", 0xa4, 0x3, 0x0, 0x0, r16}, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x7, 0x9, r16, &(0x7f0000000d40)="79b89df67ce9a1b8fc922c3f68c61389e3647ac45c6232020661441f4eadcf270646e58b692a7c72a0d0a4f79544f866c0852752d74d5cf28e76e13797a6c5532c3b0ce4e22fae871eae78", 0x4b, 0xd3, 0x0, 0x1}, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x20, 0xffffffffffffffff, &(0x7f0000000e00)="3a885cb9030837a909bdc8da5484a3999654c54b43ce684dd41a419865ad8d01e7d02483024c676e6d86e641b658adf9e951e3268113b80306494df1410e9c037ae47fd2611b8cbf630bf247084a02e1966a4fe1b3846f100e2366581714130a272d0c9122c126ed4aa1159c1db68bf35a2f78dd7b1cfe3c77471968132709d3", 0x80}, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x4, 0x1000, r3, &(0x7f0000000ec0)="aecaf9ec3b28aef66bf4d4cb91c6dc12d907cb862afe6eaab89f6873f0572da0cb2bafb3ddedf5aa1c8ca40bd3c0c32cb772753eda793bb192adf35c957f02a596edc2c3da3c7d287f6f27a4dc588dc600a5c04e294f6f5f9f28ef4a149b499edcc7c0606597f6bcce689669ca9a3b96e18b638a1182dfc50f18d60a6f7e670502ff1195", 0x84, 0x3f, 0x0, 0x1}])

13:24:05 executing program 1:
socket$inet6(0xa, 0x80003, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
socket$inet6(0xa, 0x80003, 0x6b)
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:05 executing program 5:
pipe(&(0x7f00000002c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$netlink(0x10, 0x3, 0x0)
splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:05 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:05 executing program 1:
socket$inet6(0xa, 0x80003, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:05 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:05 executing program 1:
socket$inet6(0xa, 0x80003, 0x0)
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:06 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:06 executing program 2:
r0 = socket$inet6(0xa, 0x80003, 0x6b)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071")
r1 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r1, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r1, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:06 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r4, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f00000005c0)=""/230)
r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r5, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100)=<r6=>0x0)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r9}]]}}}]}, 0x38}}, 0x0)
r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r10, 0x0)
r11 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r11, 0x0)
r12 = socket$inet6(0xa, 0x400000000001, 0x0)
r13 = dup(r12)
setsockopt$inet_tcp_int(r13, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r13, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r13, &(0x7f0000000400)=@abs, 0x6e)
r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r15 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r14, r15, 0x0, 0x1)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
r16 = eventfd2(0x3, 0x800)
io_submit(r6, 0x9, &(0x7f0000000fc0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x200, r7, &(0x7f0000000780)="96f9ca3610f73fee70b99d28662e1449f38efd7312657f48bd17428a21b39c588a63d2a5c6edc5ef0f2aa9ad0d74bdfb83cdf57a75fd5a289728d7458757268fe89751c94f5d5abe746a0a352164863d32cb6f03647d76dc71de0e866df1cbd04beb918a721f5dd19370d4d91acf20ae522360f9213fe8646bece14f2c24e00436c3b382d2860d9aeb7e280ea9d5d6d7", 0x90, 0x6, 0x0, 0x3, r10}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x8001, 0xffffffffffffffff, &(0x7f0000000400)="6bd33a5e3ca8e106fe5344aa9f8528ab077cc6d443835793f916b66c284c7fb8f43b45c50cfacfdc06a11a6559bdc9", 0x2f, 0x5, 0x0, 0x0, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x3, r11, &(0x7f0000000840)="098f65ab9e6cafae538f18b8dcee8ec0eeed4837f37f477d98149d427476d8dfa9a201ae2e48292910adfbc02c0d99af972a042f67b35f377e0180e8254e12648f52c38ed83c166f6968633b61caf1760bff06f4ba81272cda6cc7af2a74553e19ac8cbddd9e36df7be098a14a9ed2e858a59a7312554e67d38a83e97106dab08bec607b8ce0dd972be18b8ee5c5b44cb6f5ca8ce5378fab72fc1ff575c8e245337c38266c360ebce68d625fca672fefdcbca8d528", 0xb5, 0x81, 0x0, 0x0, r13}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x6, 0x3ff, 0xffffffffffffffff, &(0x7f0000000980)="5666fa2feacfe87641954a70e7fed284f09ab2f0137784a13235e0e70b3307de0cb6176c68914bdc7cfd797ea7ac9b01053d9d5b1de70bc06dfe7f3ec0ab9b6aacfab9cf398909c59d51a10b4eb7bbe66a3e67500aa0a4379310680bca4242e7ff92c03e2316e616dfdaac6a8b4cecfcb7fd6578c87fa9c9efa4d7e01c285f9667adc74342c35675de6e6ac3f45a416f569e58b1649e3b355ab2f003a8d10690ae90b69a3670c45e0aeca5143d7dd095f78a7c57b302b3", 0xb7, 0x0, 0x0, 0x0, r4}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000b80)="4259c3040cfcf200b46f4480bbd633014706e255b26a662b4b63df168f17f500a0ad0e5bf4fe03eebe7fa6afc73e9d4f4c0cde71cabcd3742979898be03d7f9ad78646bb4dda9a16b09c8bcb0194dd7e2080c2f98da361a1de11e5cb748f1888775132c1f9ce67237802fd92160faeb112cab72a92f99002388c3e4ae624aa83b3416c7b119492098039b29c4e9e905f0e13c64205fdc2e2a79f5165d0813c61c057ede4f82c262ee60301e7d5c59c3d27c2c79862c33b1c91abf5fdf98e441bc933eb5224a87c60305a18b02c830e2d7a0e3970985e944d0f920f412d5a2cc82fa1ca59567a668de492bac0a31ee6a3406f7e0993baa8e8", 0xf8, 0x3522}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x7, 0x8, 0xffffffffffffffff, &(0x7f0000000c80)="3102cc9fc6d472cef729b9033a5a3bd4b8f0816de1ed690106c78c83efd5021d8a9e397901e83fee785d9b75510df2223017231fe02dd836ddc0f72654d9cb56b8ba84887419dc56e111b7e8f2718261d28ea7ce1862b2baad0de1dbf1a9a8e8efe85a27ebce70fa67b6ab917dc3c2868f1dacbd21f722375a7380d49848f8e5488aab9dff424bc1d7b3c33a008bcfa88fc21e62692628d6bceee97316ec5e9029023c5d", 0xa4, 0x3, 0x0, 0x0, r16}, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x7, 0x9, r16, &(0x7f0000000d40)="79b89df67ce9a1b8fc922c3f68c61389e3647ac45c6232020661441f4eadcf270646e58b692a7c72a0d0a4f79544f866c0852752d74d5cf28e76e13797a6c5532c3b0ce4e22fae871eae78", 0x4b, 0xd3, 0x0, 0x1}, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x20, 0xffffffffffffffff, &(0x7f0000000e00)="3a885cb9030837a909bdc8da5484a3999654c54b43ce684dd41a419865ad8d01e7d02483024c676e6d86e641b658adf9e951e3268113b80306494df1410e9c037ae47fd2611b8cbf630bf247084a02e1966a4fe1b3846f100e2366581714130a272d0c9122c126ed4aa1159c1db68bf35a2f78dd7b1cfe3c77471968132709d3", 0x80}, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x4, 0x1000, r3, &(0x7f0000000ec0)="aecaf9ec3b28aef66bf4d4cb91c6dc12d907cb862afe6eaab89f6873f0572da0cb2bafb3ddedf5aa1c8ca40bd3c0c32cb772753eda793bb192adf35c957f02a596edc2c3da3c7d287f6f27a4dc588dc600a5c04e294f6f5f9f28ef4a149b499edcc7c0606597f6bcce689669ca9a3b96e18b638a1182dfc50f18d60a6f7e670502ff1195", 0x84, 0x3f, 0x0, 0x1}])

13:24:06 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
socket$netlink(0x10, 0x3, 0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:06 executing program 1:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:06 executing program 2:
socket$inet6(0xa, 0x80003, 0x6b)
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:06 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r4, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f00000005c0)=""/230)
r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r5, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100)=<r6=>0x0)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r9}]]}}}]}, 0x38}}, 0x0)
r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r10, 0x0)
r11 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r11, 0x0)
r12 = socket$inet6(0xa, 0x400000000001, 0x0)
r13 = dup(r12)
setsockopt$inet_tcp_int(r13, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r13, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r13, &(0x7f0000000400)=@abs, 0x6e)
r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r15 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r14, r15, 0x0, 0x1)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
r16 = eventfd2(0x3, 0x800)
io_submit(r6, 0x9, &(0x7f0000000fc0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x200, r7, &(0x7f0000000780)="96f9ca3610f73fee70b99d28662e1449f38efd7312657f48bd17428a21b39c588a63d2a5c6edc5ef0f2aa9ad0d74bdfb83cdf57a75fd5a289728d7458757268fe89751c94f5d5abe746a0a352164863d32cb6f03647d76dc71de0e866df1cbd04beb918a721f5dd19370d4d91acf20ae522360f9213fe8646bece14f2c24e00436c3b382d2860d9aeb7e280ea9d5d6d7", 0x90, 0x6, 0x0, 0x3, r10}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x8001, 0xffffffffffffffff, &(0x7f0000000400)="6bd33a5e3ca8e106fe5344aa9f8528ab077cc6d443835793f916b66c284c7fb8f43b45c50cfacfdc06a11a6559bdc9", 0x2f, 0x5, 0x0, 0x0, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x3, r11, &(0x7f0000000840)="098f65ab9e6cafae538f18b8dcee8ec0eeed4837f37f477d98149d427476d8dfa9a201ae2e48292910adfbc02c0d99af972a042f67b35f377e0180e8254e12648f52c38ed83c166f6968633b61caf1760bff06f4ba81272cda6cc7af2a74553e19ac8cbddd9e36df7be098a14a9ed2e858a59a7312554e67d38a83e97106dab08bec607b8ce0dd972be18b8ee5c5b44cb6f5ca8ce5378fab72fc1ff575c8e245337c38266c360ebce68d625fca672fefdcbca8d528", 0xb5, 0x81, 0x0, 0x0, r13}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x6, 0x3ff, 0xffffffffffffffff, &(0x7f0000000980)="5666fa2feacfe87641954a70e7fed284f09ab2f0137784a13235e0e70b3307de0cb6176c68914bdc7cfd797ea7ac9b01053d9d5b1de70bc06dfe7f3ec0ab9b6aacfab9cf398909c59d51a10b4eb7bbe66a3e67500aa0a4379310680bca4242e7ff92c03e2316e616dfdaac6a8b4cecfcb7fd6578c87fa9c9efa4d7e01c285f9667adc74342c35675de6e6ac3f45a416f569e58b1649e3b355ab2f003a8d10690ae90b69a3670c45e0aeca5143d7dd095f78a7c57b302b3", 0xb7, 0x0, 0x0, 0x0, r4}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000b80)="4259c3040cfcf200b46f4480bbd633014706e255b26a662b4b63df168f17f500a0ad0e5bf4fe03eebe7fa6afc73e9d4f4c0cde71cabcd3742979898be03d7f9ad78646bb4dda9a16b09c8bcb0194dd7e2080c2f98da361a1de11e5cb748f1888775132c1f9ce67237802fd92160faeb112cab72a92f99002388c3e4ae624aa83b3416c7b119492098039b29c4e9e905f0e13c64205fdc2e2a79f5165d0813c61c057ede4f82c262ee60301e7d5c59c3d27c2c79862c33b1c91abf5fdf98e441bc933eb5224a87c60305a18b02c830e2d7a0e3970985e944d0f920f412d5a2cc82fa1ca59567a668de492bac0a31ee6a3406f7e0993baa8e8", 0xf8, 0x3522}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x7, 0x8, 0xffffffffffffffff, &(0x7f0000000c80)="3102cc9fc6d472cef729b9033a5a3bd4b8f0816de1ed690106c78c83efd5021d8a9e397901e83fee785d9b75510df2223017231fe02dd836ddc0f72654d9cb56b8ba84887419dc56e111b7e8f2718261d28ea7ce1862b2baad0de1dbf1a9a8e8efe85a27ebce70fa67b6ab917dc3c2868f1dacbd21f722375a7380d49848f8e5488aab9dff424bc1d7b3c33a008bcfa88fc21e62692628d6bceee97316ec5e9029023c5d", 0xa4, 0x3, 0x0, 0x0, r16}, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x7, 0x9, r16, &(0x7f0000000d40)="79b89df67ce9a1b8fc922c3f68c61389e3647ac45c6232020661441f4eadcf270646e58b692a7c72a0d0a4f79544f866c0852752d74d5cf28e76e13797a6c5532c3b0ce4e22fae871eae78", 0x4b, 0xd3, 0x0, 0x1}, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x20, 0xffffffffffffffff, &(0x7f0000000e00)="3a885cb9030837a909bdc8da5484a3999654c54b43ce684dd41a419865ad8d01e7d02483024c676e6d86e641b658adf9e951e3268113b80306494df1410e9c037ae47fd2611b8cbf630bf247084a02e1966a4fe1b3846f100e2366581714130a272d0c9122c126ed4aa1159c1db68bf35a2f78dd7b1cfe3c77471968132709d3", 0x80}, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x4, 0x1000, r3, &(0x7f0000000ec0)="aecaf9ec3b28aef66bf4d4cb91c6dc12d907cb862afe6eaab89f6873f0572da0cb2bafb3ddedf5aa1c8ca40bd3c0c32cb772753eda793bb192adf35c957f02a596edc2c3da3c7d287f6f27a4dc588dc600a5c04e294f6f5f9f28ef4a149b499edcc7c0606597f6bcce689669ca9a3b96e18b638a1182dfc50f18d60a6f7e670502ff1195", 0x84, 0x3f, 0x0, 0x1}])

13:24:06 executing program 5:
pipe(&(0x7f00000002c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$netlink(0x10, 0x3, 0x0)
splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:06 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:06 executing program 1:
syz_emit_ethernet(0x0, 0x0, 0x0)

13:24:06 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r4, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f00000005c0)=""/230)
r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r5, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100)=<r6=>0x0)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r9}]]}}}]}, 0x38}}, 0x0)
r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r10, 0x0)
r11 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r11, 0x0)
r12 = socket$inet6(0xa, 0x400000000001, 0x0)
r13 = dup(r12)
setsockopt$inet_tcp_int(r13, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r13, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r13, &(0x7f0000000400)=@abs, 0x6e)
r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r15 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r14, r15, 0x0, 0x1)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
r16 = eventfd2(0x3, 0x800)
io_submit(r6, 0x9, &(0x7f0000000fc0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x200, r7, &(0x7f0000000780)="96f9ca3610f73fee70b99d28662e1449f38efd7312657f48bd17428a21b39c588a63d2a5c6edc5ef0f2aa9ad0d74bdfb83cdf57a75fd5a289728d7458757268fe89751c94f5d5abe746a0a352164863d32cb6f03647d76dc71de0e866df1cbd04beb918a721f5dd19370d4d91acf20ae522360f9213fe8646bece14f2c24e00436c3b382d2860d9aeb7e280ea9d5d6d7", 0x90, 0x6, 0x0, 0x3, r10}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x8001, 0xffffffffffffffff, &(0x7f0000000400)="6bd33a5e3ca8e106fe5344aa9f8528ab077cc6d443835793f916b66c284c7fb8f43b45c50cfacfdc06a11a6559bdc9", 0x2f, 0x5, 0x0, 0x0, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x3, r11, &(0x7f0000000840)="098f65ab9e6cafae538f18b8dcee8ec0eeed4837f37f477d98149d427476d8dfa9a201ae2e48292910adfbc02c0d99af972a042f67b35f377e0180e8254e12648f52c38ed83c166f6968633b61caf1760bff06f4ba81272cda6cc7af2a74553e19ac8cbddd9e36df7be098a14a9ed2e858a59a7312554e67d38a83e97106dab08bec607b8ce0dd972be18b8ee5c5b44cb6f5ca8ce5378fab72fc1ff575c8e245337c38266c360ebce68d625fca672fefdcbca8d528", 0xb5, 0x81, 0x0, 0x0, r13}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x6, 0x3ff, 0xffffffffffffffff, &(0x7f0000000980)="5666fa2feacfe87641954a70e7fed284f09ab2f0137784a13235e0e70b3307de0cb6176c68914bdc7cfd797ea7ac9b01053d9d5b1de70bc06dfe7f3ec0ab9b6aacfab9cf398909c59d51a10b4eb7bbe66a3e67500aa0a4379310680bca4242e7ff92c03e2316e616dfdaac6a8b4cecfcb7fd6578c87fa9c9efa4d7e01c285f9667adc74342c35675de6e6ac3f45a416f569e58b1649e3b355ab2f003a8d10690ae90b69a3670c45e0aeca5143d7dd095f78a7c57b302b3", 0xb7, 0x0, 0x0, 0x0, r4}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000b80)="4259c3040cfcf200b46f4480bbd633014706e255b26a662b4b63df168f17f500a0ad0e5bf4fe03eebe7fa6afc73e9d4f4c0cde71cabcd3742979898be03d7f9ad78646bb4dda9a16b09c8bcb0194dd7e2080c2f98da361a1de11e5cb748f1888775132c1f9ce67237802fd92160faeb112cab72a92f99002388c3e4ae624aa83b3416c7b119492098039b29c4e9e905f0e13c64205fdc2e2a79f5165d0813c61c057ede4f82c262ee60301e7d5c59c3d27c2c79862c33b1c91abf5fdf98e441bc933eb5224a87c60305a18b02c830e2d7a0e3970985e944d0f920f412d5a2cc82fa1ca59567a668de492bac0a31ee6a3406f7e0993baa8e8", 0xf8, 0x3522}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x7, 0x8, 0xffffffffffffffff, &(0x7f0000000c80)="3102cc9fc6d472cef729b9033a5a3bd4b8f0816de1ed690106c78c83efd5021d8a9e397901e83fee785d9b75510df2223017231fe02dd836ddc0f72654d9cb56b8ba84887419dc56e111b7e8f2718261d28ea7ce1862b2baad0de1dbf1a9a8e8efe85a27ebce70fa67b6ab917dc3c2868f1dacbd21f722375a7380d49848f8e5488aab9dff424bc1d7b3c33a008bcfa88fc21e62692628d6bceee97316ec5e9029023c5d", 0xa4, 0x3, 0x0, 0x0, r16}, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x7, 0x9, r16, &(0x7f0000000d40)="79b89df67ce9a1b8fc922c3f68c61389e3647ac45c6232020661441f4eadcf270646e58b692a7c72a0d0a4f79544f866c0852752d74d5cf28e76e13797a6c5532c3b0ce4e22fae871eae78", 0x4b, 0xd3, 0x0, 0x1}, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x20, 0xffffffffffffffff, &(0x7f0000000e00)="3a885cb9030837a909bdc8da5484a3999654c54b43ce684dd41a419865ad8d01e7d02483024c676e6d86e641b658adf9e951e3268113b80306494df1410e9c037ae47fd2611b8cbf630bf247084a02e1966a4fe1b3846f100e2366581714130a272d0c9122c126ed4aa1159c1db68bf35a2f78dd7b1cfe3c77471968132709d3", 0x80}, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x4, 0x1000, r3, &(0x7f0000000ec0)="aecaf9ec3b28aef66bf4d4cb91c6dc12d907cb862afe6eaab89f6873f0572da0cb2bafb3ddedf5aa1c8ca40bd3c0c32cb772753eda793bb192adf35c957f02a596edc2c3da3c7d287f6f27a4dc588dc600a5c04e294f6f5f9f28ef4a149b499edcc7c0606597f6bcce689669ca9a3b96e18b638a1182dfc50f18d60a6f7e670502ff1195", 0x84, 0x3f, 0x0, 0x1}])

13:24:06 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:06 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:06 executing program 1:
syz_emit_ethernet(0x0, 0x0, 0x0)

13:24:06 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r13 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r12, r13, 0x0, 0x1)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
eventfd2(0x3, 0x800)

13:24:07 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
socket$netlink(0x10, 0x3, 0x4)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:07 executing program 1:
syz_emit_ethernet(0x0, 0x0, 0x0)

13:24:07 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r13 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r12, r13, 0x0, 0x1)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:07 executing program 5:
pipe(&(0x7f00000002c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$netlink(0x10, 0x3, 0x0)
splice(0xffffffffffffffff, 0x0, r1, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:07 executing program 1:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x0, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:07 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r13 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r12, r13, 0x0, 0x1)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:07 executing program 1:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x0, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:07 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:07 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r13 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r12, r13, 0x0, 0x1)

13:24:07 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:07 executing program 1:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x0, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:07 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r13 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r12, r13, 0x0, 0x1)

[  594.500137] selinux_nlmsg_perm: 12253 callbacks suppressed
[  594.500147] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16157 comm=syz-executor.0
[  594.518451] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16157 comm=syz-executor.0
[  594.531705] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16157 comm=syz-executor.0
[  594.544515] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16157 comm=syz-executor.0
[  594.557819] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16157 comm=syz-executor.0
[  594.570609] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16157 comm=syz-executor.0
[  594.583253] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16157 comm=syz-executor.0
[  594.595979] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16157 comm=syz-executor.0
[  594.608580] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16157 comm=syz-executor.0
[  594.621261] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16157 comm=syz-executor.0
13:24:08 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:08 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
r12 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r13 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r12, r13, 0x0, 0x1)

13:24:08 executing program 1:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x0, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:08 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:08 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:08 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:08 executing program 1:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x0, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:08 executing program 1:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x0, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:08 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:08 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:08 executing program 1:
syz_emit_ethernet(0x96, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x60, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}]}}}}}}}, 0x0)

[  595.200133] net_ratelimit: 27 callbacks suppressed
[  595.200139] protocol 88fb is buggy, dev hsr_slave_0
[  595.200150] protocol 88fb is buggy, dev hsr_slave_0
[  595.205165] protocol 88fb is buggy, dev hsr_slave_1
[  595.210177] protocol 88fb is buggy, dev hsr_slave_1
13:24:08 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:09 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:09 executing program 1:
syz_emit_ethernet(0x96, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x60, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}]}}}}}}}, 0x0)

13:24:09 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:09 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:09 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x10, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:09 executing program 1:
syz_emit_ethernet(0x96, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x60, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}]}}}}}}}, 0x0)

13:24:09 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x10, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:09 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r11, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:09 executing program 1:
syz_emit_ethernet(0x9e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x68, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh]}}}}}}}, 0x0)

13:24:09 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, 0x0)
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:09 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x10, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:09 executing program 1:
syz_emit_ethernet(0x9e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x68, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh]}}}}}}}, 0x0)

[  596.080156] protocol 88fb is buggy, dev hsr_slave_0
[  596.085265] protocol 88fb is buggy, dev hsr_slave_1
[  596.480126] protocol 88fb is buggy, dev hsr_slave_0
[  596.485271] protocol 88fb is buggy, dev hsr_slave_1
13:24:10 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:10 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
setsockopt$inet_tcp_int(r11, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:10 executing program 1:
syz_emit_ethernet(0x9e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x68, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh]}}}}}}}, 0x0)

13:24:10 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x0, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:10 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:10 executing program 1:
syz_emit_ethernet(0x7e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x48, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:10 executing program 1:
syz_emit_ethernet(0x7e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x48, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:10 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x0, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:10 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x0, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:10 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, 0x0)
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

[  596.880124] protocol 88fb is buggy, dev hsr_slave_0
[  596.885248] protocol 88fb is buggy, dev hsr_slave_1
13:24:10 executing program 1:
syz_emit_ethernet(0x7e, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x48, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:10 executing program 1:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x0, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:10 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:10 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:10 executing program 1:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x0, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:10 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:10 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0x0, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:11 executing program 1:
syz_emit_ethernet(0xae, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x78, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x0, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:11 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:11 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:11 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, 0x0)
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:11 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = socket$inet6(0xa, 0x400000000001, 0x0)
r11 = dup(r10)
connect$unix(r11, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:11 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:11 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @ra]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:11 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:11 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:11 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
socket$inet6(0xa, 0x400000000001, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:11 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:11 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0x0, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:11 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:11 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
socket$inet6(0xa, 0x400000000001, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:11 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0))
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:11 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @jumbo, @enc_lim, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:11 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
socket$inet6(0xa, 0x400000000001, 0x0)
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:12 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:12 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = dup(0xffffffffffffffff)
setsockopt$inet_tcp_int(r10, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r10, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:12 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:12 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:12 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = dup(0xffffffffffffffff)
setsockopt$inet_tcp_int(r10, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r10, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:12 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0x0, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2f0000001c000507000000000d2300000200041f01000000fc0003c9130001", 0x1f}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:12 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:12 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x4, [], [@jumbo, @ra, @jumbo, @jumbo, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:12 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:12 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0))
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:12 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:12 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:12 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:12 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r9, 0x0)
r10 = dup(0xffffffffffffffff)
setsockopt$inet_tcp_int(r10, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r10, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  600.240127] net_ratelimit: 14 callbacks suppressed
[  600.240133] protocol 88fb is buggy, dev hsr_slave_0
[  600.250240] protocol 88fb is buggy, dev hsr_slave_1
13:24:13 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="5f454c44065b05007311e6e11adb0024711bff2cebca7da1968e234c4d3d8e20db74ab218ea49d12b8b5e42a082564894c92b49de70be624558128bd680db19db769d72bf973a5bfdb715093d18108242e74ad2f00b39609dbf3a57a945c5cbd7b8258824e92918acaf74ae7f424d440e1bee19cc477c72b29e7d003409f3274ca0a60285738d8e1bc84a0ab7d4421cf5872786b5c4c6b14505876b16f7bdcd84f18de10661fb3a0852e14ce491a42db4c5735ea6aa6ec95a82b8435d60f4268c3aebc870bb2c27dbe3ef5f021175d994ec4831811c7b0f0d7dfe3af92878b78073db713c2803cac5483ec88eafc639728b40baaffe0363040321e1984dcf0ac32a6c3cf"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
socketpair(0x7, 0x4, 0x0, &(0x7f0000000100))
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:13 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:13 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r9 = socket$inet6(0xa, 0x400000000001, 0x0)
r10 = dup(r9)
setsockopt$inet_tcp_int(r10, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r10, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:13 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, 0x0, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:13 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, 0x0, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:13 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0))
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:13 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @ra, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  600.396532] selinux_nlmsg_perm: 1442 callbacks suppressed
[  600.396542] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16445 comm=syz-executor.5
[  600.416759] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16445 comm=syz-executor.5
13:24:13 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  600.443865] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16445 comm=syz-executor.5
[  600.475570] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16445 comm=syz-executor.5
[  600.496179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16445 comm=syz-executor.5
[  600.515334] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16455 comm=syz-executor.0
[  600.524560] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16445 comm=syz-executor.5
13:24:13 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r8, 0x0)
r9 = socket$inet6(0xa, 0x400000000001, 0x0)
r10 = dup(r9)
setsockopt$inet_tcp_int(r10, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r10, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:13 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  600.544218] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16455 comm=syz-executor.0
[  600.578894] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16445 comm=syz-executor.5
[  600.600695] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16455 comm=syz-executor.0
13:24:13 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@jumbo, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  600.650374] protocol 88fb is buggy, dev hsr_slave_0
[  600.655926] protocol 88fb is buggy, dev hsr_slave_1
13:24:14 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

[  601.040121] protocol 88fb is buggy, dev hsr_slave_0
[  601.045256] protocol 88fb is buggy, dev hsr_slave_1
13:24:14 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_spread_slab\x00', 0x2, 0x0)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:14 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:14 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
r8 = socket$inet6(0xa, 0x400000000001, 0x0)
r9 = dup(r8)
setsockopt$inet_tcp_int(r9, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r9, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:14 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, 0x0, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:14 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, 0x0, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:14 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:14 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = socket$inet6(0xa, 0x400000000001, 0x0)
r9 = dup(r8)
setsockopt$inet_tcp_int(r9, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r9, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:14 executing program 1:
syz_emit_ethernet(0xa6, &(0x7f0000000080)={@link_local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'f`Q', 0x70, 0x3a, 0x86ddffff, @initdev={0xfe, 0x88, [0xa0], 0x0, 0x0}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x608], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast1, [@dstopts={0x3, 0x3, [], [@ra, @jumbo, @jumbo, @enc_lim, @ra, @jumbo]}, @srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}, 0x0)

13:24:14 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, <r7=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0)
r8 = socket$inet6(0xa, 0x400000000001, 0x0)
r9 = dup(r8)
setsockopt$inet_tcp_int(r9, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r9, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:14 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r4, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r4, 0x8040451b, &(0x7f00000005c0)=""/230)
r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r5, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100)=<r6=>0x0)
r7 = socket$netlink(0x10, 0x3, 0x0)
r8 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r9}]]}}}]}, 0x38}}, 0x0)
r10 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000a, 0x81012, r10, 0x0)
r11 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r11, 0x0)
r12 = socket$inet6(0xa, 0x400000000001, 0x0)
r13 = dup(r12)
setsockopt$inet_tcp_int(r13, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
setsockopt$inet_tcp_int(r13, 0x6, 0x18, &(0x7f00000001c0), 0x4)
connect$unix(r13, &(0x7f0000000400)=@abs, 0x6e)
r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8')
r15 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/')
sendfile(r14, r15, 0x0, 0x1)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
r16 = eventfd2(0x3, 0x800)
io_submit(r6, 0x9, &(0x7f0000000fc0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x200, r7, &(0x7f0000000780)="96f9ca3610f73fee70b99d28662e1449f38efd7312657f48bd17428a21b39c588a63d2a5c6edc5ef0f2aa9ad0d74bdfb83cdf57a75fd5a289728d7458757268fe89751c94f5d5abe746a0a352164863d32cb6f03647d76dc71de0e866df1cbd04beb918a721f5dd19370d4d91acf20ae522360f9213fe8646bece14f2c24e00436c3b382d2860d9aeb7e280ea9d5d6d7", 0x90, 0x6, 0x0, 0x3, r10}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x8001, 0xffffffffffffffff, &(0x7f0000000400)="6bd33a5e3ca8e106fe5344aa9f8528ab077cc6d443835793f916b66c284c7fb8f43b45c50cfacfdc06a11a6559bdc9", 0x2f, 0x5, 0x0, 0x0, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x3, r11, &(0x7f0000000840)="098f65ab9e6cafae538f18b8dcee8ec0eeed4837f37f477d98149d427476d8dfa9a201ae2e48292910adfbc02c0d99af972a042f67b35f377e0180e8254e12648f52c38ed83c166f6968633b61caf1760bff06f4ba81272cda6cc7af2a74553e19ac8cbddd9e36df7be098a14a9ed2e858a59a7312554e67d38a83e97106dab08bec607b8ce0dd972be18b8ee5c5b44cb6f5ca8ce5378fab72fc1ff575c8e245337c38266c360ebce68d625fca672fefdcbca8d528", 0xb5, 0x81, 0x0, 0x0, r13}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x6, 0x3ff, 0xffffffffffffffff, &(0x7f0000000980)="5666fa2feacfe87641954a70e7fed284f09ab2f0137784a13235e0e70b3307de0cb6176c68914bdc7cfd797ea7ac9b01053d9d5b1de70bc06dfe7f3ec0ab9b6aacfab9cf398909c59d51a10b4eb7bbe66a3e67500aa0a4379310680bca4242e7ff92c03e2316e616dfdaac6a8b4cecfcb7fd6578c87fa9c9efa4d7e01c285f9667adc74342c35675de6e6ac3f45a416f569e58b1649e3b355ab2f003a8d10690ae90b69a3670c45e0aeca5143d7dd095f78a7c57b302b3", 0xb7, 0x0, 0x0, 0x0, r4}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000b80)="4259c3040cfcf200b46f4480bbd633014706e255b26a662b4b63df168f17f500a0ad0e5bf4fe03eebe7fa6afc73e9d4f4c0cde71cabcd3742979898be03d7f9ad78646bb4dda9a16b09c8bcb0194dd7e2080c2f98da361a1de11e5cb748f1888775132c1f9ce67237802fd92160faeb112cab72a92f99002388c3e4ae624aa83b3416c7b119492098039b29c4e9e905f0e13c64205fdc2e2a79f5165d0813c61c057ede4f82c262ee60301e7d5c59c3d27c2c79862c33b1c91abf5fdf98e441bc933eb5224a87c60305a18b02c830e2d7a0e3970985e944d0f920f412d5a2cc82fa1ca59567a668de492bac0a31ee6a3406f7e0993baa8e8", 0xf8, 0x3522}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x7, 0x8, 0xffffffffffffffff, &(0x7f0000000c80)="3102cc9fc6d472cef729b9033a5a3bd4b8f0816de1ed690106c78c83efd5021d8a9e397901e83fee785d9b75510df2223017231fe02dd836ddc0f72654d9cb56b8ba84887419dc56e111b7e8f2718261d28ea7ce1862b2baad0de1dbf1a9a8e8efe85a27ebce70fa67b6ab917dc3c2868f1dacbd21f722375a7380d49848f8e5488aab9dff424bc1d7b3c33a008bcfa88fc21e62692628d6bceee97316ec5e9029023c5d", 0xa4, 0x3, 0x0, 0x0, r16}, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x7, 0x9, r16, &(0x7f0000000d40)="79b89df67ce9a1b8fc922c3f68c61389e3647ac45c6232020661441f4eadcf270646e58b692a7c72a0d0a4f79544f866c0852752d74d5cf28e76e13797a6c5532c3b0ce4e22fae871eae78", 0x4b, 0xd3, 0x0, 0x1}, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x20, 0xffffffffffffffff, &(0x7f0000000e00)="3a885cb9030837a909bdc8da5484a3999654c54b43ce684dd41a419865ad8d01e7d02483024c676e6d86e641b658adf9e951e3268113b80306494df1410e9c037ae47fd2611b8cbf630bf247084a02e1966a4fe1b3846f100e2366581714130a272d0c9122c126ed4aa1159c1db68bf35a2f78dd7b1cfe3c77471968132709d3", 0x80}, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x4, 0x1000, r3, &(0x7f0000000ec0)="aecaf9ec3b28aef66bf4d4cb91c6dc12d907cb862afe6eaab89f6873f0572da0cb2bafb3ddedf5aa1c8ca40bd3c0c32cb772753eda793bb192adf35c957f02a596edc2c3da3c7d287f6f27a4dc588dc600a5c04e294f6f5f9f28ef4a149b499edcc7c0606597f6bcce689669ca9a3b96e18b638a1182dfc50f18d60a6f7e670502ff1195", 0x84, 0x3f, 0x0, 0x1}])

13:24:14 executing program 1:
r0 = socket$unix(0x1, 0x2, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f0000000200)=@ethtool_cmd={0x40}})

[  601.440128] protocol 88fb is buggy, dev hsr_slave_0
[  601.440305] protocol 88fb is buggy, dev hsr_slave_0
[  601.445273] protocol 88fb is buggy, dev hsr_slave_1
[  601.450421] protocol 88fb is buggy, dev hsr_slave_1
13:24:14 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
r6 = socket$inet6(0xa, 0x400000000001, 0x0)
r7 = dup(r6)
setsockopt$inet_tcp_int(r7, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r7, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:15 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:15 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x80000)
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x7, 0x4)
ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000240)={'batadv0\x00', 0x0})
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0a0000b7060000000000811e64030000000000450404000100000017040003f1535c27c97e4e43c2a2ea5a670001000a00b7040000000100006a0af2fe"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x70)
ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = inotify_init()
r6 = socket(0xa, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000800)={{0x1, 0x0, @reserved="70fc87012a4a6b307ff34035f4fc90d66f7533905fb3c6d2f186cfa14366c757"}, 0x58, [], "e2991dc4a112f48e9e5adaaaf5605d7c3f8f77aed50c2e2a5eafc27073cfa1b516eaf45b567b91816adbd7078cf406168921163ea99d97b8f27a616a2a1fb3846a92f764f03e4dab33cdf67fba5f839ff46e0674c3adafb2"})
r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0)
ioctl$EVIOCGKEYCODE(r7, 0x80084504, &(0x7f00000008c0)=""/224)
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r8, 0x29, 0x40000000013, 0x0, 0x0)
inotify_add_watch(r5, &(0x7f00000002c0)='./file0\x00', 0x2000203)
write(r3, &(0x7f0000000600)="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", 0x200)
sendfile(r3, r4, 0x0, 0x7fffffa7)
r9 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, 0x0)
io_submit(0x0, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x1, 0x0, r9, &(0x7f0000000000), 0x377140be6b5ef4c7}])

13:24:15 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, 0x0, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:15 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
r6 = socket$inet6(0xa, 0x400000000001, 0x0)
r7 = dup(r6)
setsockopt$inet_tcp_int(r7, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r7, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:15 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, 0x0, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:15 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

[  602.144231] audit: type=1800 audit(1572960255.440:491): pid=16527 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="loop1" ino=111 res=0
[  602.207554] audit: type=1804 audit(1572960255.440:492): pid=16527 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir713790555/syzkaller.OjLdni/82/file0/file0" dev="loop1" ino=111 res=1
13:24:15 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
socket$netlink(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14)
r6 = socket$inet6(0xa, 0x400000000001, 0x0)
r7 = dup(r6)
setsockopt$inet_tcp_int(r7, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r7, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  602.236873] audit: type=1800 audit(1572960255.440:493): pid=16527 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="loop1" ino=111 res=0
[  602.240887] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  602.281274] FAT-fs (loop1): Filesystem has been set read-only
[  602.288676] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17)
13:24:15 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
r6 = socket(0x10, 0x803, 0x0)
sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r7 = socket$inet6(0xa, 0x400000000001, 0x0)
r8 = dup(r7)
setsockopt$inet_tcp_int(r8, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r8, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:15 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x80000)
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x7, 0x4)
ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000240)={'batadv0\x00', 0x0})
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0a0000b7060000000000811e64030000000000450404000100000017040003f1535c27c97e4e43c2a2ea5a670001000a00b7040000000100006a0af2fe"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x70)
ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = inotify_init()
r6 = socket(0xa, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000800)={{0x1, 0x0, @reserved="70fc87012a4a6b307ff34035f4fc90d66f7533905fb3c6d2f186cfa14366c757"}, 0x58, [], "e2991dc4a112f48e9e5adaaaf5605d7c3f8f77aed50c2e2a5eafc27073cfa1b516eaf45b567b91816adbd7078cf406168921163ea99d97b8f27a616a2a1fb3846a92f764f03e4dab33cdf67fba5f839ff46e0674c3adafb2"})
r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0)
ioctl$EVIOCGKEYCODE(r7, 0x80084504, &(0x7f00000008c0)=""/224)
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r8, 0x29, 0x40000000013, 0x0, 0x0)
inotify_add_watch(r5, &(0x7f00000002c0)='./file0\x00', 0x2000203)
write(r3, &(0x7f0000000600)="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", 0x200)
sendfile(r3, r4, 0x0, 0x7fffffa7)
r9 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, 0x0)
io_submit(0x0, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x1, 0x0, r9, &(0x7f0000000000), 0x377140be6b5ef4c7}])

13:24:15 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r6 = socket$inet6(0xa, 0x400000000001, 0x0)
r7 = dup(r6)
setsockopt$inet_tcp_int(r7, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r7, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  602.528028] audit: type=1800 audit(1572960255.820:494): pid=16555 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="loop1" ino=113 res=0
[  602.595127] audit: type=1804 audit(1572960255.830:495): pid=16555 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir713790555/syzkaller.OjLdni/83/file0/file0" dev="loop1" ino=113 res=1
13:24:15 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
socket(0x10, 0x803, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r6 = socket$inet6(0xa, 0x400000000001, 0x0)
r7 = dup(r6)
setsockopt$inet_tcp_int(r7, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r7, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  602.637737] audit: type=1800 audit(1572960255.830:496): pid=16555 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="loop1" ino=113 res=0
[  602.652258] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  602.671561] FAT-fs (loop1): Filesystem has been set read-only
[  602.679818] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17)
13:24:16 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x80000)
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x7, 0x4)
ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000240)={'batadv0\x00', 0x0})
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0a0000b7060000000000811e64030000000000450404000100000017040003f1535c27c97e4e43c2a2ea5a670001000a00b7040000000100006a0af2fe"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x70)
ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = inotify_init()
r6 = socket(0xa, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000800)={{0x1, 0x0, @reserved="70fc87012a4a6b307ff34035f4fc90d66f7533905fb3c6d2f186cfa14366c757"}, 0x58, [], "e2991dc4a112f48e9e5adaaaf5605d7c3f8f77aed50c2e2a5eafc27073cfa1b516eaf45b567b91816adbd7078cf406168921163ea99d97b8f27a616a2a1fb3846a92f764f03e4dab33cdf67fba5f839ff46e0674c3adafb2"})
r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0)
ioctl$EVIOCGKEYCODE(r7, 0x80084504, &(0x7f00000008c0)=""/224)
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r8, 0x29, 0x40000000013, 0x0, 0x0)
inotify_add_watch(r5, &(0x7f00000002c0)='./file0\x00', 0x2000203)
write(r3, &(0x7f0000000600)="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", 0x200)
sendfile(r3, r4, 0x0, 0x7fffffa7)
r9 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, 0x0)
io_submit(0x0, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x1, 0x0, r9, &(0x7f0000000000), 0x377140be6b5ef4c7}])

[  602.895456] audit: type=1800 audit(1572960256.190:497): pid=16570 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="loop1" ino=115 res=0
[  603.017802] audit: type=1804 audit(1572960256.190:498): pid=16570 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir713790555/syzkaller.OjLdni/84/file0/file0" dev="loop1" ino=115 res=1
[  603.023952] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17)
13:24:16 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:16 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
r5 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r6 = socket$inet6(0xa, 0x400000000001, 0x0)
r7 = dup(r6)
setsockopt$inet_tcp_int(r7, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r7, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:16 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0), 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:16 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:16 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

[  603.063076] FAT-fs (loop1): Filesystem has been set read-only
[  603.065142] audit: type=1800 audit(1572960256.190:499): pid=16570 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="loop1" ino=115 res=0
[  603.072333] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF
13:24:16 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x80000)
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x7, 0x4)
ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000240)={'batadv0\x00', 0x0})
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0a0000b7060000000000811e64030000000000450404000100000017040003f1535c27c97e4e43c2a2ea5a670001000a00b7040000000100006a0af2fe"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x70)
ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = inotify_init()
r6 = socket(0xa, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000800)={{0x1, 0x0, @reserved="70fc87012a4a6b307ff34035f4fc90d66f7533905fb3c6d2f186cfa14366c757"}, 0x58, [], "e2991dc4a112f48e9e5adaaaf5605d7c3f8f77aed50c2e2a5eafc27073cfa1b516eaf45b567b91816adbd7078cf406168921163ea99d97b8f27a616a2a1fb3846a92f764f03e4dab33cdf67fba5f839ff46e0674c3adafb2"})
r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0)
ioctl$EVIOCGKEYCODE(r7, 0x80084504, &(0x7f00000008c0)=""/224)
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r8, 0x29, 0x40000000013, 0x0, 0x0)
inotify_add_watch(r5, &(0x7f00000002c0)='./file0\x00', 0x2000203)
write(r3, &(0x7f0000000600)="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", 0x200)
sendfile(r3, r4, 0x0, 0x7fffffa7)
r9 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, 0x0)
io_submit(0x0, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x1, 0x0, r9, &(0x7f0000000000), 0x377140be6b5ef4c7}])

13:24:16 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:16 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:16 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
io_setup(0x3, &(0x7f0000000100))
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  603.341566] audit: type=1800 audit(1572960256.640:500): pid=16598 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="loop1" ino=117 res=0
13:24:16 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
r5 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r6 = socket$inet6(0xa, 0x400000000001, 0x0)
r7 = dup(r6)
setsockopt$inet_tcp_int(r7, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r7, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  603.516213] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  603.532456] FAT-fs (loop1): Filesystem has been set read-only
[  603.559233] FAT-fs (loop1): error, fat_free_clusters: deleting FAT entry beyond EOF
13:24:16 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
r5 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r6 = socket$inet6(0xa, 0x400000000001, 0x0)
r7 = dup(r6)
setsockopt$inet_tcp_int(r7, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r7, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:16 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x80000)
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x7, 0x4)
ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000240)={'batadv0\x00', 0x0})
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0a0000b7060000000000811e64030000000000450404000100000017040003f1535c27c97e4e43c2a2ea5a670001000a00b7040000000100006a0af2fe"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x70)
ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = inotify_init()
r6 = socket(0xa, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000800)={{0x1, 0x0, @reserved="70fc87012a4a6b307ff34035f4fc90d66f7533905fb3c6d2f186cfa14366c757"}, 0x58, [], "e2991dc4a112f48e9e5adaaaf5605d7c3f8f77aed50c2e2a5eafc27073cfa1b516eaf45b567b91816adbd7078cf406168921163ea99d97b8f27a616a2a1fb3846a92f764f03e4dab33cdf67fba5f839ff46e0674c3adafb2"})
r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0)
ioctl$EVIOCGKEYCODE(r7, 0x80084504, &(0x7f00000008c0)=""/224)
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r8, 0x29, 0x40000000013, 0x0, 0x0)
inotify_add_watch(r5, &(0x7f00000002c0)='./file0\x00', 0x2000203)
write(r3, &(0x7f0000000600)="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", 0x200)
sendfile(r3, r4, 0x0, 0x7fffffa7)
r9 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, 0x0)
io_submit(0x0, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x1, 0x0, r9, &(0x7f0000000000), 0x377140be6b5ef4c7}])

[  603.913787] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  603.924100] FAT-fs (loop1): Filesystem has been set read-only
[  603.938781] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17)
13:24:17 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:17 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
fcntl$setstatus(r4, 0x4, 0x44000)
r5 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r6 = socket$inet6(0xa, 0x400000000001, 0x0)
r7 = dup(r6)
setsockopt$inet_tcp_int(r7, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r7, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:17 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:17 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:17 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0), 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:17 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x80000)
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x7, 0x4)
ioctl$sock_SIOCETHTOOL(r0, 0x8931, &(0x7f0000000240)={'batadv0\x00', 0x0})
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0a0000b7060000000000811e64030000000000450404000100000017040003f1535c27c97e4e43c2a2ea5a670001000a00b7040000000100006a0af2fe"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x70)
ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x1000014, 0x0)
sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0)
r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0xca00, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = inotify_init()
r6 = socket(0xa, 0x2, 0x0)
getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f0000000800)={{0x1, 0x0, @reserved="70fc87012a4a6b307ff34035f4fc90d66f7533905fb3c6d2f186cfa14366c757"}, 0x58, [], "e2991dc4a112f48e9e5adaaaf5605d7c3f8f77aed50c2e2a5eafc27073cfa1b516eaf45b567b91816adbd7078cf406168921163ea99d97b8f27a616a2a1fb3846a92f764f03e4dab33cdf67fba5f839ff46e0674c3adafb2"})
r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101000, 0x0)
ioctl$EVIOCGKEYCODE(r7, 0x80084504, &(0x7f00000008c0)=""/224)
r8 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mreq(r8, 0x29, 0x40000000013, 0x0, 0x0)
inotify_add_watch(r5, &(0x7f00000002c0)='./file0\x00', 0x2000203)
write(r3, &(0x7f0000000600)="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", 0x200)
sendfile(r3, r4, 0x0, 0x7fffffa7)
r9 = creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, 0x0)
io_submit(0x0, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x200000000000000, 0x6, 0x80000000000000, 0x1, 0x0, r9, &(0x7f0000000000), 0x377140be6b5ef4c7}])

13:24:17 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:17 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:17 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
io_setup(0x3, &(0x7f0000000100))
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  604.370935] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  604.384923] FAT-fs (loop1): Filesystem has been set read-only
[  604.400540] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17)
13:24:17 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x81, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x40, 0x1ff}, 0x0, 0x0, r0, 0x0)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$kcm(0xa, 0x5, 0x0)
ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8983, &(0x7f0000000000)={r1})
bpf$OBJ_GET_PROG(0x7, 0x0, 0x0)
socket$kcm(0x29, 0x2, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x4800, 0x0)
ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000001680))
r4 = getpid()
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x201, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x40000}, r4, 0x0, 0xffffffffffffffff, 0x2)
openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0)
r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
close(r5)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\x01\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\xe4B\xcf\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef\xf2P\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\xf4\x10\xdc\x89j\xbb\xb4\r\xe6\xb7\xad\xfai\xc7@\xd7%\x8dSQ\xc6\x9c\xf7|\a\xae\x8f\xd2\xa9/\xb7)u\x9f_ac\xdf is\xbb\x93\xdc\xcfs/\xd3\xbeN\x98%\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\xb4]X\xba(\xfa\xe4\xd6\x82b\xa4\xb8~\xb0\xd9\xaf\xf0[+\"b\x9e}\x93\xf1CZ\"W\x0eB\x9bOI\xc4}[\xcc\xbf\xa2\x0f\xa8\x0f\xec\xa3\x87( \x99\xb0?4\xb9wH\xcf\xe9\x18x\xb4\x96\xbbyG\x96P\x8e\n.\x12@\xb5\xce\xfa0\x15`\xf6n\xbd\x1b\xc4b\xa6%\x82\xd3~\x18Q\xee6\x1bH?h\x14F\xca\xeejX\xed\x9fi\xb5\xbc\xb8\xca\xa1\xb1Z\xc4\xf6U\xfd:\xa7m\xd4\xd8eFr0\xa9;s\x0f\xb1Pz\x81x\xa4\xbc\xb2\xf5e\xae\xac;7Y\xf2N\xcc\xb8\xdb\xe4\x89\x8c\v\x8d\x93y\xda\x8a\xedVv\xb2\x89\xe3\x84V)HP7\xfb\xa8\xb7&\x1b\xba\x8a\xe5F\x02\xc2\x0e\xde\xa1{\xff8B3\x1a\a\xf2\x04-\x18\xe8|@\x9e\xee\x1b\xa3b#l\xf8RO\xc2\x9c\x16\x81\xbf\x8d\xb7\"\xc0\xd7\x80\x84&\xe3\x92\t3\xd7\x85\xe1\a\xefM\xbb\xf0\xf8d6\xa4\x19\x00'/444, 0x2761, 0x0)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40000)
gettid()

13:24:17 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
io_setup(0x3, &(0x7f0000000100))
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:17 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
io_setup(0x3, &(0x7f0000000100))
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:18 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:18 executing program 1:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000240)={'nat\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88)

13:24:18 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:18 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0), 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:18 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:18 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:18 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb03532ff2e3335100d5812fb4f77dcbd7a9b3cffd7a7c0c92465e5f9cc839639013a54121aaba9d7ae45b0051a1221af2772a9567bb821942ce72590f1bf41d20d4c000000279bd612811df1fcea94a96d58db92af7f", 0x85}], 0x4, 0x8)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

13:24:18 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:18 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:18 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:18 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:18 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
ioctl$EVIOCGSW(r3, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r5 = socket$inet6(0xa, 0x400000000001, 0x0)
r6 = dup(r5)
setsockopt$inet_tcp_int(r6, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r6, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  605.360190] net_ratelimit: 16 callbacks suppressed
[  605.360195] protocol 88fb is buggy, dev hsr_slave_0
[  605.365315] protocol 88fb is buggy, dev hsr_slave_1
[  605.407120] selinux_nlmsg_perm: 8526 callbacks suppressed
[  605.407129] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16697 comm=syz-executor.0
[  605.426737] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16697 comm=syz-executor.0
[  605.439981] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16697 comm=syz-executor.0
[  605.453698] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16697 comm=syz-executor.0
[  605.466888] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16697 comm=syz-executor.0
[  605.480515] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16697 comm=syz-executor.0
[  605.493629] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16697 comm=syz-executor.0
[  605.506944] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16697 comm=syz-executor.0
[  605.519942] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16697 comm=syz-executor.0
[  605.533075] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16697 comm=syz-executor.0
[  605.600116] protocol 88fb is buggy, dev hsr_slave_0
[  605.600127] protocol 88fb is buggy, dev hsr_slave_0
[  605.600163] protocol 88fb is buggy, dev hsr_slave_1
[  605.605252] protocol 88fb is buggy, dev hsr_slave_1
13:24:19 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:19 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:19 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:19 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:19 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:19 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  606.490117] protocol 88fb is buggy, dev hsr_slave_0
[  606.495227] protocol 88fb is buggy, dev hsr_slave_1
13:24:21 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb03532ff2e3335100d5812fb4f77dcbd7a9b3cffd7a7c0c92465e5f9cc839639013a54121aaba9d7ae45b0", 0x5a}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

13:24:21 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sync_file_range(0xffffffffffffffff, 0x1, 0x6, 0x2)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:21 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:21 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:21 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:21 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="5f454c44065b05007311e6e11adb0024711bff2cebca7da1968e234c4d3d8e20db74ab218ea49d12b8b5e42a082564894c92b49de70be624558128bd680db19db769d72bf973a5bfdb715093d18108242e74ad2f00b39609dbf3a57a945c5cbd7b8258824e92918acaf74ae7f424d440e1bee19cc477c72b29e7d003409f3274ca0a60285738d8e1bc84a0ab7d4421cf5872786b5c4c6b14505876b16f7bdcd84f18de10661fb3a0852e14ce491a42db4c5735ea6aa6ec95a82b8435d60f4268c3aebc870bb2c27dbe3ef5f021175d994ec4831811c7b0f0d7dfe3af92878b78073db713c2803cac5483ec88eafc639728b40baaffe0363040321e1984dcf0ac32a6c3cf"], 0xa)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

13:24:21 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:21 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:21 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:21 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:21 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:21 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setxattr$security_ima(0x0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000001000)=ANY=[@ANYBLOB="0400041d5cb1857610dd172fc791dbc37770b6cfb26704698eb3b5a589d2fa1e7ca95c40722ad9a16961c9dff2d2d8df5601b15bd43422c07e871cf9856a63d4855dcd4a369d124522104007e8f46f775099ceeb20255c371fb202c3970e0acf26cce0d0e605a3c58221f0a061241988742da733beeab49c48c0c6"], 0x6, 0x0)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  608.560113] protocol 88fb is buggy, dev hsr_slave_0
[  608.565284] protocol 88fb is buggy, dev hsr_slave_1
13:24:24 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:24 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb03532ff2e3335100d5812fb4f77dcbd7a9b3cff", 0x43}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

13:24:24 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:24 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:24 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:24 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
close(r3)
r4 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff})
r7 = fcntl$dupfd(r6, 0x0, r5)
ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, r3, 0x0, 0x80000001, 0x0)

[  611.134444] selinux_nlmsg_perm: 5704 callbacks suppressed
[  611.134455] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=23302 sclass=netlink_tcpdiag_socket pig=16820 comm=syz-executor.0
[  611.135911] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16810 comm=syz-executor.5
[  611.142015] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16820 comm=syz-executor.0
[  611.154326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16810 comm=syz-executor.5
[  611.172228] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16820 comm=syz-executor.0
[  611.185038] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16810 comm=syz-executor.5
[  611.214876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16810 comm=syz-executor.5
13:24:24 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  611.222158] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16820 comm=syz-executor.0
[  611.243814] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16820 comm=syz-executor.0
[  611.247859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16810 comm=syz-executor.5
13:24:24 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:24 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  611.440121] protocol 88fb is buggy, dev hsr_slave_0
[  611.446150] protocol 88fb is buggy, dev hsr_slave_1
13:24:24 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:24 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  611.600232] protocol 88fb is buggy, dev hsr_slave_0
[  611.605400] protocol 88fb is buggy, dev hsr_slave_1
13:24:25 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:25 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

[  611.840172] protocol 88fb is buggy, dev hsr_slave_0
[  611.845568] protocol 88fb is buggy, dev hsr_slave_1
[  611.850123] protocol 88fb is buggy, dev hsr_slave_0
[  611.856273] protocol 88fb is buggy, dev hsr_slave_1
13:24:27 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000002, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653a8990785365b40aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb03532ff2e3335100d5812fb4f77dcbd7a9b3cff", 0x43}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

13:24:27 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:27 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:27 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10")
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:27 executing program 0:
socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
close(r2)
r3 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0)

13:24:27 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:27 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:27 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:27 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, 0x0, 0x0)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:27 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:27 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:27 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  614.800117] protocol 88fb is buggy, dev hsr_slave_0
[  614.805246] protocol 88fb is buggy, dev hsr_slave_1
13:24:30 executing program 1:
r0 = socket$unix(0x1, 0x1, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1_to_bridge\x00', &(0x7f00000001c0)=@ethtool_sset_info={0x37, 0x0, 0x2d79}})

13:24:30 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:30 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(0x0)
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:30 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:30 executing program 0:
socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa)
close(r2)
r3 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0)

13:24:30 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, 0x0, 0x0)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:30 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:30 executing program 1:
r0 = socket$inet6(0xa, 0x1, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4)

[  617.237958] selinux_nlmsg_perm: 3989 callbacks suppressed
[  617.237970] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16919 comm=syz-executor.0
[  617.256799] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16912 comm=syz-executor.5
[  617.277681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16912 comm=syz-executor.5
[  617.280424] protocol 88fb is buggy, dev hsr_slave_0
[  617.292437] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16919 comm=syz-executor.0
[  617.296262] protocol 88fb is buggy, dev hsr_slave_1
[  617.308993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16912 comm=syz-executor.5
[  617.326189] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16919 comm=syz-executor.0
13:24:30 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r2, &(0x7f0000000300), &(0x7f0000000340)}, 0x2a0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r3 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r4 = socket$inet6(0xa, 0x400000000001, 0x0)
r5 = dup(r4)
setsockopt$inet_tcp_int(r5, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r5, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  617.339078] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16912 comm=syz-executor.5
[  617.354541] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16919 comm=syz-executor.0
[  617.367372] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=16912 comm=syz-executor.5
13:24:30 executing program 1:

[  617.381049] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=16919 comm=syz-executor.0
13:24:30 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x0, 0x3, 0x1}, 0x2c)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r3 = socket$inet6(0xa, 0x400000000001, 0x0)
r4 = dup(r3)
setsockopt$inet_tcp_int(r4, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r4, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:30 executing program 1:

13:24:30 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r3 = socket$inet6(0xa, 0x400000000001, 0x0)
r4 = dup(r3)
setsockopt$inet_tcp_int(r4, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r4, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:30 executing program 1:

[  617.680130] protocol 88fb is buggy, dev hsr_slave_0
[  617.685305] protocol 88fb is buggy, dev hsr_slave_1
[  617.840154] protocol 88fb is buggy, dev hsr_slave_0
[  617.845277] protocol 88fb is buggy, dev hsr_slave_1
13:24:31 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(0x0)
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:31 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:31 executing program 0:
socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="5f454c44065b05007311e6e11adb0024711bff2cebca7da1968e234c4d3d8e20db74ab218ea49d12b8b5e42a082564894c92b49de70be624558128bd680db19db769d72bf973a5bfdb715093d18108242e74ad2f00b39609dbf3a57a945c5cbd7b8258824e92918acaf74ae7f424d440e1bee19cc477c72b29e7d003409f3274ca0a60285738d8e1bc84a0ab7d4421cf5872786b5c4c6b14505876b16f7bdcd84f18de10661fb3a0852e14ce491a42db4c5735ea6aa6ec95a82b8435d60f4268c3aebc870bb2c27dbe3ef5f021175d994ec4831811c7b0f0d7dfe3af92878b78073db713c2803cac5483ec88eafc639728b40baaffe0363040321e1984dcf0ac32a6c3cf"], 0xa)
close(r2)
r3 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0)

13:24:31 executing program 1:

13:24:31 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
r1 = dup(r0)
write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r3 = socket$inet6(0xa, 0x400000000001, 0x0)
r4 = dup(r3)
setsockopt$inet_tcp_int(r4, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r4, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:31 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, 0x0, 0x0)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:31 executing program 1:

13:24:31 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
dup(r0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r2 = socket$inet6(0xa, 0x400000000001, 0x0)
r3 = dup(r2)
setsockopt$inet_tcp_int(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r3, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:31 executing program 1:

13:24:31 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
dup(r0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r2 = socket$inet6(0xa, 0x400000000001, 0x0)
r3 = dup(r2)
setsockopt$inet_tcp_int(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r3, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:31 executing program 1:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='reno\x00', 0x1b1)
sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27)

13:24:31 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
dup(r0)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r2 = socket$inet6(0xa, 0x400000000001, 0x0)
r3 = dup(r2)
setsockopt$inet_tcp_int(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r3, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:32 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
r4 = syz_genetlink_get_family_id$ipvs(0x0)
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x105, 0x0, 0x0, {0xf}}, 0x14}}, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:32 executing program 1:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xef, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)

13:24:32 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="5f454c44065b05007311e6e11adb0024711bff2cebca7da1968e234c4d3d8e20db74ab218ea49d12b8b5e42a082564894c92b49de70be624558128bd680db19db769d72bf973a5bfdb715093d18108242e74ad2f00b39609dbf3a57a945c5cbd7b8258824e92918acaf74ae7f424d440e1bee19cc477c72b29e7d003409f3274ca0a60285738d8e1bc84a0ab7d4421cf5872786b5c4c6b14505876b16f7bdcd84f18de10661fb3a0852e14ce491a42db4c5735ea6aa6ec95a82b8435d60f4268c3aebc870bb2c27dbe3ef5f021175d994ec4831811c7b0f0d7dfe3af92878b78073db713c2803cac5483ec88eafc639728b40baaffe0363040321e1984dcf0ac32a6c3cf"], 0xa)
close(0xffffffffffffffff)
r3 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0)

13:24:32 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240), 0x0)
write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r2, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:32 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:32 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

13:24:32 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240), 0x0)
write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r2, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  618.960118] protocol 88fb is buggy, dev hsr_slave_0
[  618.965306] protocol 88fb is buggy, dev hsr_slave_1
13:24:32 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
pipe2$9p(&(0x7f0000000240), 0x0)
write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r2, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:32 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
unshare(0x6020100)

13:24:32 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
getpid()
write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r2, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:32 executing program 1:

13:24:32 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r2, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  619.360161] protocol 88fb is buggy, dev hsr_slave_0
[  619.365492] protocol 88fb is buggy, dev hsr_slave_1
13:24:32 executing program 4:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$nl_generic(0x10, 0x3, 0x10)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071")
syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

13:24:32 executing program 1:
r0 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c)
connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c)
getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), 0x0)
setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0xfffc, 0x0, 0x95}, 0x98)
ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000240)={0x7, 0x0, @ioapic={0x0, 0x0, 0x0, 0x2, 0x0, [{0x4, 0x6, 0x81, [], 0x91}, {0x0, 0x0, 0x6}, {0x40, 0x0, 0x7, [], 0x3}, {0x0, 0x0, 0x7}, {0x0, 0xb, 0x0, [], 0xc5}, {0x23}, {0x12, 0x0, 0x3f}, {0x1, 0x3, 0x4}, {0x7}, {0x4, 0x0, 0x3f, [], 0x6}, {0x1, 0x7}, {0x4, 0x8, 0x1}, {0x3, 0x8, 0x0, [], 0x6a}, {0x1, 0xfd, 0x6, [], 0x20}, {0x0, 0x0, 0x2}, {0x0, 0x3f, 0x1, [], 0x9}, {0x3, 0x0, 0x0, [], 0x20}, {0x8, 0xfe, 0x2, [], 0x5d}, {0xc6, 0x81, 0x9, [], 0x6}, {0x8, 0xff, 0x0, [], 0x7}, {0x0, 0xc0, 0x7, [], 0x2c}, {0x0, 0x0, 0x2}, {0x81, 0x0, 0x40, [], 0xdb}, {0x81, 0x1f, 0x1, [], 0x1}]}})

[  619.792306] BUG: unable to handle kernel NULL pointer dereference at           (null)
[  619.800994] IP:           (null)
[  619.804401] PGD 65e81067 P4D 65e81067 PUD 8f619067 PMD 0 
[  619.809979] Oops: 0010 [#1] PREEMPT SMP KASAN
[  619.814476] Modules linked in:
[  619.817676] CPU: 1 PID: 17044 Comm: syz-executor.1 Not tainted 4.14.151 #0
[  619.820397] kobject: 'loop0' (ffff8880a491af60): kobject_uevent_env
13:24:33 executing program 0:
r0 = socket$packet(0x11, 0x3, 0x300)
pipe(&(0x7f0000000280)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040)=0x6, 0x4)
writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1)
write$binfmt_elf64(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="5f454c44065b05007311e6e11adb0024711bff2cebca7da1968e234c4d3d8e20db74ab218ea49d12b8b5e42a082564894c92b49de70be624558128bd680db19db769d72bf973a5bfdb715093d18108242e74ad2f00b39609dbf3a57a945c5cbd7b8258824e92918acaf74ae7f424d440e1bee19cc477c72b29e7d003409f3274ca0a60285738d8e1bc84a0ab7d4421cf5872786b5c4c6b14505876b16f7bdcd84f18de10661fb3a0852e14ce491a42db4c5735ea6aa6ec95a82b8435d60f4268c3aebc870bb2c27dbe3ef5f021175d994ec4831811c7b0f0d7dfe3af92878b78073db713c2803cac5483ec88eafc639728b40baaffe0363040321e1984dcf0ac32a6c3cf"], 0xa)
close(0xffffffffffffffff)
r3 = socket$netlink(0x10, 0x3, 0x4)
getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
r6 = fcntl$dupfd(r5, 0x0, r4)
ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0)

13:24:33 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001}, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r2, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

13:24:33 executing program 5:
pipe(&(0x7f00000002c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$netlink(0x10, 0x3, 0x0)
splice(r0, 0x0, r2, 0x0, 0xffff, 0x0)
sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x0)
write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88)

13:24:33 executing program 2:
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x80000000000001, 0x32, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c)
write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc)
read(r0, &(0x7f0000000140)=""/165, 0x1000000eb)

[  619.825327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  619.825334] task: ffff888096a1a700 task.stack: ffff888068e68000
[  619.825340] RIP: 0010:          (null)
[  619.825345] RSP: 0018:ffff888068e6fd48 EFLAGS: 00010246
[  619.825355] RAX: dffffc0000000000 RBX: ffffffff88151060 RCX: ffffc90011c8c000
[  619.825364] RDX: 1ffffffff102a223 RSI: 0000000000000000 RDI: ffff888091bc6800
[  619.834222] kobject: 'loop0' (ffff8880a491af60): fill_kobj_path: path = '/devices/virtual/block/loop0'
13:24:33 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r2, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  619.844303] RBP: ffff888068e6fd68 R08: 0000000000000001 R09: ffff888096a1afa0
[  619.844309] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888091bc6800
[  619.844315] R13: ffff888091bc680e R14: 000000000000001c R15: 0000000000000002
[  619.844321] FS:  00007f1a01e21700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000
[  619.844325] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  619.844330] CR2: 0000000000000000 CR3: 00000000970c2000 CR4: 00000000001406e0
13:24:33 executing program 3:
write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137)
mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='\xb9p\x0e', 0x80000, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0)
mknod$loop(&(0x7f00000003c0)='./file0/file0\x00', 0x400, 0x1)
setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2)
setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm], 0x1)
getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f00000001c0)=""/103, 0x0)
ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000005c0)=""/230)
creat(&(0x7f0000000000)='./bus\x00', 0x0)
io_setup(0x3, &(0x7f0000000100))
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3}]]}}}]}, 0x38}}, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
r2 = dup(r1)
setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$unix(r2, &(0x7f0000000400)=@abs, 0x6e)
sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0)

[  619.844337] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  619.844341] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  619.844345] Call Trace:
[  619.844359]  inet_autobind+0xae/0x180
[  619.844368]  inet_dgram_connect+0x136/0x1e0
[  619.844379]  SYSC_connect+0x1f6/0x2d0
[  619.902144] kobject: 'loop3' (ffff8880a49fea60): kobject_uevent_env
[  619.903049]  ? SYSC_bind+0x220/0x220
[  619.917653] kobject: 'loop3' (ffff8880a49fea60): fill_kobj_path: path = '/devices/virtual/block/loop3'
[  619.921458]  ? nsecs_to_jiffies+0x30/0x30
[  619.921470]  ? SyS_clock_gettime+0xf8/0x180
[  619.921480]  SyS_connect+0x24/0x30
[  619.921486]  ? SyS_accept+0x30/0x30
[  619.921495]  do_syscall_64+0x1e8/0x640
[  619.921502]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  619.921514]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  619.921520] RIP: 0033:0x45a219
[  619.921525] RSP: 002b:00007f1a01e20c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  619.921534] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219
[  619.921539] RDX: 000000000000001c RSI: 0000000020000200 RDI: 0000000000000003
[  619.921543] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000
[  619.921548] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a01e216d4
[  619.921553] R13: 00000000004c09aa R14: 00000000004d3358 R15: 00000000ffffffff
[  619.921560] Code:  Bad RIP value.
[  619.921584] RIP:           (null) RSP: ffff888068e6fd48
[  619.921587] CR2: 0000000000000000
[  619.922891] ---[ end trace 5d83d08b743635be ]---
[  619.966907] kobject: 'loop3' (ffff8880a49fea60): kobject_uevent_env
[  619.969200] Kernel panic - not syncing: Fatal exception
[  619.979742] kobject: 'loop3' (ffff8880a49fea60): fill_kobj_path: path = '/devices/virtual/block/loop3'
[  619.991216] Kernel Offset: disabled
[  620.112162] Rebooting in 86400 seconds..