[   30.400489] audit: type=1800 audit(1556232639.831:33): pid=6739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0
[   30.435068] audit: type=1800 audit(1556232639.831:34): pid=6739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0
[   30.476073] random: sshd: uninitialized urandom read (32 bytes read)
[   30.797936] audit: type=1400 audit(1556232640.221:35): avc:  denied  { map } for  pid=6913 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
[   30.848520] random: sshd: uninitialized urandom read (32 bytes read)
[   31.474234] random: sshd: uninitialized urandom read (32 bytes read)

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.1.26' (ECDSA) to the list of known hosts.
syzkaller login: [   37.098414] random: sshd: uninitialized urandom read (32 bytes read)
2019/04/25 22:50:46 fuzzer started
[   37.287422] audit: type=1400 audit(1556232646.711:36): avc:  denied  { map } for  pid=6924 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
[   39.144389] random: cc1: uninitialized urandom read (8 bytes read)
2019/04/25 22:50:49 dialing manager at 10.128.0.105:45567
2019/04/25 22:50:49 syscalls: 2434
2019/04/25 22:50:49 code coverage: enabled
2019/04/25 22:50:49 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument
2019/04/25 22:50:49 extra coverage: extra coverage is not supported by the kernel
2019/04/25 22:50:49 setuid sandbox: enabled
2019/04/25 22:50:49 namespace sandbox: enabled
2019/04/25 22:50:49 Android sandbox: /sys/fs/selinux/policy does not exist
2019/04/25 22:50:49 fault injection: enabled
2019/04/25 22:50:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/04/25 22:50:49 net packet injection: enabled
2019/04/25 22:50:49 net device setup: enabled
[   41.485954] random: crng init done
22:52:52 executing program 0:
syz_open_dev$usbmon(0x0, 0x3ac3, 0x400)
recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000000, 0x0, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0)
shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil)
geteuid()
r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x2, 0x10000})

22:52:52 executing program 5:
syz_execute_func(&(0x7f0000000140)="410f01f9c4e1f573d50664ff0941c3c4e2c9975842f045835a000066420fe2e3c4217c294da7d4eef9ccf8")
clone(0x800083102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket$inet6(0xa, 0x20000000000001, 0x9)
clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
clone(0x1ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1000000000)
write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5)
link(&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='./file1\x00')
lsetxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file3\x00', 0x0, 0x0, 0x0, 0x0)

22:52:52 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10)
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0)
gettid()
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
clock_gettime(0x5, &(0x7f0000000100))
openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0)
r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0)
write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f00004e7000)={0x200000002, 0x70, 0xdd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$FOU_CMD_GET(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x18, 0x0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x840}, 0x0)
setxattr$security_smack_transmute(0x0, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x0)
sendfile(r0, r1, 0x0, 0x10000)
getsockname$inet6(r0, 0x0, &(0x7f00000001c0))
socket$inet6(0xa, 0x0, 0x0)
setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0)
setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000400)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98)

22:52:52 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4)
connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='dummy0\x00', 0x10)
sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0)

22:52:52 executing program 3:
recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000000, 0x0, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0)
shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil)
r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x2})

22:52:52 executing program 4:
syz_open_dev$usbmon(0x0, 0x0, 0x0)
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0)
geteuid()
r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x2})

[  162.947047] audit: type=1400 audit(1556232772.371:37): avc:  denied  { map } for  pid=6924 comm="syz-fuzzer" path="/root/syzkaller-shm394209875" dev="sda1" ino=2233 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1
[  162.984190] audit: type=1400 audit(1556232772.411:38): avc:  denied  { map } for  pid=6940 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13807 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1
[  163.850213] IPVS: ftp: loaded support on port[0] = 21
[  164.182818] chnl_net:caif_netlink_parms(): no params data found
[  164.193245] IPVS: ftp: loaded support on port[0] = 21
[  164.219977] bridge0: port 1(bridge_slave_0) entered blocking state
[  164.226731] bridge0: port 1(bridge_slave_0) entered disabled state
[  164.233723] device bridge_slave_0 entered promiscuous mode
[  164.241008] bridge0: port 2(bridge_slave_1) entered blocking state
[  164.247358] bridge0: port 2(bridge_slave_1) entered disabled state
[  164.255470] device bridge_slave_1 entered promiscuous mode
[  164.269335] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  164.278348] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  164.296849] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  164.304519] team0: Port device team_slave_0 added
[  164.313174] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  164.320462] team0: Port device team_slave_1 added
[  164.329726] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  164.338841] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  164.392237] device hsr_slave_0 entered promiscuous mode
[  164.440351] device hsr_slave_1 entered promiscuous mode
[  164.502472] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  164.514854] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  164.537026] bridge0: port 2(bridge_slave_1) entered blocking state
[  164.543486] bridge0: port 2(bridge_slave_1) entered forwarding state
[  164.550512] bridge0: port 1(bridge_slave_0) entered blocking state
[  164.556848] bridge0: port 1(bridge_slave_0) entered forwarding state
[  164.583814] IPVS: ftp: loaded support on port[0] = 21
[  164.612541] chnl_net:caif_netlink_parms(): no params data found
[  164.672107] IPVS: ftp: loaded support on port[0] = 21
[  164.684775] bridge0: port 1(bridge_slave_0) entered blocking state
[  164.691881] bridge0: port 1(bridge_slave_0) entered disabled state
[  164.698789] device bridge_slave_0 entered promiscuous mode
[  164.705749] bridge0: port 2(bridge_slave_1) entered blocking state
[  164.712342] bridge0: port 2(bridge_slave_1) entered disabled state
[  164.719181] device bridge_slave_1 entered promiscuous mode
[  164.740706] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  164.779749] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  164.798148] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  164.805532] team0: Port device team_slave_0 added
[  164.823138] IPVS: ftp: loaded support on port[0] = 21
[  164.847657] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  164.855185] team0: Port device team_slave_1 added
[  164.869098] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  164.879253] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  164.892291] chnl_net:caif_netlink_parms(): no params data found
[  164.972215] device hsr_slave_0 entered promiscuous mode
[  165.010358] device hsr_slave_1 entered promiscuous mode
[  165.050803] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  165.058486] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  165.064746] 8021q: adding VLAN 0 to HW filter on device bond0
[  165.081161] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  165.088069] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  165.119832] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  165.127092] IPVS: ftp: loaded support on port[0] = 21
[  165.127213] 8021q: adding VLAN 0 to HW filter on device team0
[  165.156423] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  165.164797] bridge0: port 1(bridge_slave_0) entered disabled state
[  165.172037] bridge0: port 2(bridge_slave_1) entered disabled state
[  165.180871] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  165.207004] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  165.214168] bridge0: port 1(bridge_slave_0) entered blocking state
[  165.220794] bridge0: port 1(bridge_slave_0) entered disabled state
[  165.227623] device bridge_slave_0 entered promiscuous mode
[  165.235232] bridge0: port 2(bridge_slave_1) entered blocking state
[  165.241749] bridge0: port 2(bridge_slave_1) entered disabled state
[  165.248726] device bridge_slave_1 entered promiscuous mode
[  165.273736] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  165.281601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  165.289360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  165.297253] bridge0: port 1(bridge_slave_0) entered blocking state
[  165.303776] bridge0: port 1(bridge_slave_0) entered forwarding state
[  165.313443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  165.326374] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  165.342663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  165.350585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  165.358215] bridge0: port 2(bridge_slave_1) entered blocking state
[  165.364582] bridge0: port 2(bridge_slave_1) entered forwarding state
[  165.374539] chnl_net:caif_netlink_parms(): no params data found
[  165.383305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  165.397733] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  165.412542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  165.420949] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  165.427944] team0: Port device team_slave_0 added
[  165.434565] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  165.442635] team0: Port device team_slave_1 added
[  165.448135] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  165.458045] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  165.480645] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  165.515231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  165.528493] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  165.626080] device hsr_slave_0 entered promiscuous mode
[  165.680553] device hsr_slave_1 entered promiscuous mode
[  165.754602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  165.762899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  165.772364] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  165.799127] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  165.806426] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  165.813252] bridge0: port 1(bridge_slave_0) entered blocking state
[  165.819642] bridge0: port 1(bridge_slave_0) entered disabled state
[  165.826708] device bridge_slave_0 entered promiscuous mode
[  165.833274] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  165.842408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  165.849942] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  165.859255] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  165.877061] bridge0: port 2(bridge_slave_1) entered blocking state
[  165.885228] bridge0: port 2(bridge_slave_1) entered disabled state
[  165.892516] device bridge_slave_1 entered promiscuous mode
[  165.911968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  165.919387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  165.927621] chnl_net:caif_netlink_parms(): no params data found
[  165.938986] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  165.947091] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  165.956416] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  165.973759] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  165.980875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  165.988302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  165.998348] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  166.004487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  166.058922] chnl_net:caif_netlink_parms(): no params data found
[  166.074297] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  166.084834] team0: Port device team_slave_0 added
[  166.108723] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  166.116549] team0: Port device team_slave_1 added
[  166.138018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  166.145642] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  166.154562] 8021q: adding VLAN 0 to HW filter on device bond0
[  166.165251] bridge0: port 1(bridge_slave_0) entered blocking state
[  166.171695] bridge0: port 1(bridge_slave_0) entered disabled state
[  166.178512] device bridge_slave_0 entered promiscuous mode
[  166.199302] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  166.207067] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  166.218218] bridge0: port 2(bridge_slave_1) entered blocking state
[  166.224896] bridge0: port 2(bridge_slave_1) entered disabled state
[  166.232366] device bridge_slave_1 entered promiscuous mode
[  166.282274] device hsr_slave_0 entered promiscuous mode
[  166.320504] device hsr_slave_1 entered promiscuous mode
[  166.380290] bridge0: port 1(bridge_slave_0) entered blocking state
[  166.386743] bridge0: port 1(bridge_slave_0) entered disabled state
[  166.395990] device bridge_slave_0 entered promiscuous mode
[  166.402845] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  166.413493] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  166.419779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  166.426839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  166.434965] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  166.442969] bridge0: port 2(bridge_slave_1) entered blocking state
[  166.449302] bridge0: port 2(bridge_slave_1) entered disabled state
[  166.457299] device bridge_slave_1 entered promiscuous mode
[  166.463882] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  166.474288] 8021q: adding VLAN 0 to HW filter on device batadv0
[  166.486354] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  166.533285] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  166.542337] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  166.548406] 8021q: adding VLAN 0 to HW filter on device team0
[  166.557378] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  166.565435] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  166.579559] 8021q: adding VLAN 0 to HW filter on device bond0
[  166.592287] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  166.600291] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  166.607332] team0: Port device team_slave_0 added
[  166.613881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  166.621776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  166.629240] bridge0: port 1(bridge_slave_0) entered blocking state
[  166.635760] bridge0: port 1(bridge_slave_0) entered forwarding state
[  166.642867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  166.673415] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  166.681488] team0: Port device team_slave_1 added
[  166.688627] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  166.697217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  166.715130] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  166.728613] team0: Port device team_slave_0 added
[  166.734742] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  166.743683] team0: Port device team_slave_1 added
[  166.748868] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  166.757678] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  166.767115] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  166.775845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  166.787957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  166.796101] bridge0: port 2(bridge_slave_1) entered blocking state
[  166.802471] bridge0: port 2(bridge_slave_1) entered forwarding state
[  166.803552] hrtimer: interrupt took 26688 ns
[  166.813545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  166.825836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  166.836154] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  166.845172] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  166.854022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
22:52:56 executing program 0:
syz_open_dev$usbmon(0x0, 0x3ac3, 0x400)
recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000000, 0x0, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0)
shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil)
geteuid()
r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x2, 0x10000})

[  166.878527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  166.891014] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  166.899785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
22:52:56 executing program 0:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
dup2(r0, r1)

[  166.927273] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  166.939469] 8021q: adding VLAN 0 to HW filter on device team0
[  166.950947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  166.958834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  166.971849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  166.981925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
22:52:56 executing program 0:
perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
capset(&(0x7f0000000000)={0x400019980330}, &(0x7f0000000080))

[  167.043250] device hsr_slave_0 entered promiscuous mode
[  167.080474] device hsr_slave_1 entered promiscuous mode
22:52:56 executing program 0:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000840)=0xd)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00')
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0)
preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)
syz_open_procfs(0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0)
getpid()
ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x4e23, @multicast1}, {0x306, @local}, 0x0, {0x2, 0x4e22, @empty}, 'rose0\x00'})
sync_file_range(0xffffffffffffffff, 0x0, 0x5, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0)
write$FUSE_BMAP(r0, 0x0, 0x0)
write$UHID_CREATE(r0, &(0x7f0000000540)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000440)=""/227, 0xe3, 0x1000, 0x0, 0x80000000, 0x0, 0x9}, 0x120)

[  167.095935] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use)
[  167.121028] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  167.144878] device hsr_slave_0 entered promiscuous mode
[  167.220388] device hsr_slave_1 entered promiscuous mode
[  167.270879] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  167.278654] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  167.294468] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  167.304118] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  167.311930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  167.319548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  167.327470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  167.335321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  167.343304] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  167.351134] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  167.365765] 8021q: adding VLAN 0 to HW filter on device bond0
22:52:56 executing program 0:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000840)=0xd)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00')
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0)
preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)
syz_open_procfs(0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0)
getpid()
ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x4e23, @multicast1}, {0x306, @local}, 0x0, {0x2, 0x4e22, @empty}, 'rose0\x00'})
sync_file_range(0xffffffffffffffff, 0x0, 0x5, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0)
write$FUSE_BMAP(r0, 0x0, 0x0)
write$UHID_CREATE(r0, &(0x7f0000000540)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000440)=""/227, 0xe3, 0x1000, 0x0, 0x80000000, 0x0, 0x9}, 0x120)

[  167.384838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  167.398557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  167.409723] bridge0: port 1(bridge_slave_0) entered blocking state
[  167.416110] bridge0: port 1(bridge_slave_0) entered forwarding state
[  167.501489] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  167.511210] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  167.531072] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  167.542505] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  167.551631] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  167.558108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  167.566569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  167.574485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  167.582484] bridge0: port 2(bridge_slave_1) entered blocking state
[  167.588810] bridge0: port 2(bridge_slave_1) entered forwarding state
[  167.595935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  167.604044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  167.611536] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  167.618802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  167.625889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  167.637015] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
22:52:57 executing program 0:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000840)=0xd)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00')
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0)
preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)
syz_open_procfs(0x0, 0x0)
syz_mount_image$hfsplus(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0)
getpid()
ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000000)={{0x2, 0x4e23, @multicast1}, {0x306, @local}, 0x0, {0x2, 0x4e22, @empty}, 'rose0\x00'})
sync_file_range(0xffffffffffffffff, 0x0, 0x5, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0)
write$FUSE_BMAP(r0, 0x0, 0x0)
write$UHID_CREATE(r0, &(0x7f0000000540)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000440)=""/227, 0xe3, 0x1000, 0x0, 0x80000000, 0x0, 0x9}, 0x120)

[  167.647573] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  167.654432] 8021q: adding VLAN 0 to HW filter on device team0
[  167.661160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  167.676934] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  167.685332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  167.694140] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  167.703438] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  167.728150] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  167.739528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  167.748075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  167.760873] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  167.787891] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  167.803691] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  167.818061] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  167.829698] 8021q: adding VLAN 0 to HW filter on device batadv0
[  167.850330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  167.863664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  167.879615] bridge0: port 1(bridge_slave_0) entered blocking state
[  167.886046] bridge0: port 1(bridge_slave_0) entered forwarding state
[  167.901649] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  167.909522] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  167.923383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  167.933793] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  167.944074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
22:52:57 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
r1 = dup2(r0, r0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, 0x0, &(0x7f0000000200)=0xfe82)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x3c)
fcntl$setstatus(r1, 0x4, 0x2000042803)

[  167.951485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  167.959321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  167.967328] bridge0: port 2(bridge_slave_1) entered blocking state
[  167.973787] bridge0: port 2(bridge_slave_1) entered forwarding state
[  167.982556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  167.991056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  168.001322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  168.019031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  168.028935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  168.037336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  168.047269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  168.062169] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  168.091242] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  168.097260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  168.109444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  168.121258] 8021q: adding VLAN 0 to HW filter on device bond0
[  168.129479] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  168.142761] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  168.158636] 8021q: adding VLAN 0 to HW filter on device bond0
[  168.172036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  168.191039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  168.201793] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  168.211026] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  168.217094] 8021q: adding VLAN 0 to HW filter on device team0
[  168.225499] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  168.232693] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  168.239870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  168.247049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  168.254218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  168.263072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  168.270695] bridge0: port 1(bridge_slave_0) entered blocking state
[  168.277057] bridge0: port 1(bridge_slave_0) entered forwarding state
[  168.284364] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  168.299537] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  168.315964] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  168.325764] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  168.343194] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  168.359810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  168.380460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  168.388828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  168.397466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  168.406314] bridge0: port 2(bridge_slave_1) entered blocking state
[  168.412703] bridge0: port 2(bridge_slave_1) entered forwarding state
[  168.426916] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  168.438114] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  168.447312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  168.455124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  168.463201] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  168.472927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  168.481030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  168.488687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  168.503337] 8021q: adding VLAN 0 to HW filter on device batadv0
[  168.511541] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  168.517670] 8021q: adding VLAN 0 to HW filter on device team0
[  168.529831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  168.541094] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  168.555963] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  168.567351] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  168.575894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  168.585334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  168.593794] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  168.601869] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  168.611555] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  168.621849] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  168.632489] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  168.643683] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
22:52:58 executing program 5:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000001c0), 0x4)

[  168.664064] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  168.671317] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  168.687979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  168.695813] bridge0: port 1(bridge_slave_0) entered blocking state
[  168.702224] bridge0: port 1(bridge_slave_0) entered forwarding state
[  168.709212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  168.717532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  168.725138] bridge0: port 2(bridge_slave_1) entered blocking state
[  168.731479] bridge0: port 2(bridge_slave_1) entered forwarding state
[  168.738378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  168.746387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  168.753944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  168.763760] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  168.773946] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  168.782194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  168.789233] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  168.796556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  168.804948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  168.812796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  168.821121] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  168.838337] 8021q: adding VLAN 0 to HW filter on device batadv0
[  168.849509] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  168.860196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  168.878620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  168.889533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  168.908108] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  168.915875] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  168.923766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  168.934678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  168.942669] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  168.950691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  168.958690] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  168.966869] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  168.980539] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  168.989979] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  169.000809] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  169.006824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  169.013726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  169.022090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  169.029389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  169.037247] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  169.046739] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  169.060551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  169.084269] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  169.105611] audit: type=1800 audit(1556232778.521:39): pid=7065 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=16528 res=0
[  169.112442] 8021q: adding VLAN 0 to HW filter on device batadv0
[  169.147877] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  169.160258] 8021q: adding VLAN 0 to HW filter on device batadv0
[  169.173861] audit: type=1804 audit(1556232778.561:40): pid=7067 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir222781970/syzkaller.ZJZGNt/0/file0" dev="sda1" ino=16528 res=1
[  169.912568] audit: type=1804 audit(1556232779.341:41): pid=7080 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir222781970/syzkaller.ZJZGNt/0/file0" dev="sda1" ino=16528 res=1
22:52:59 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
mknod(0x0, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
listen(r0, 0x8)
r1 = socket$inet6_sctp(0xa, 0x5, 0x84)
ioctl$SNDRV_CTL_IOCTL_POWER_STATE(0xffffffffffffffff, 0x800455d1, 0x0)
r2 = accept4(r0, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
ioctl$VIDIOC_SUBDEV_S_CROP(0xffffffffffffffff, 0xc038563c, 0x0)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xfffffffffffffffe}, 0x98)

[  169.997748] syz-executor.1 (7065) used greatest stack depth: 24400 bytes left
22:52:59 executing program 2:
r0 = socket$inet(0x10, 0x10000000003, 0x9)
r1 = dup2(r0, r0)
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f00000000c0)="24000000fa0307041dfffdd46fa2830020200a0009ed0300001d85680c1ba3a20400ff7e280000005304ffffba16a0aa1c0009b356da5a80d18b6e06e9fd62662455a4df49d05343793cec4c", 0x4c}], 0x1}, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0)

22:52:59 executing program 5:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000840)=0xd)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00')
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x7)
preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)
r1 = syz_open_procfs(0x0, 0x0)
arch_prctl$ARCH_SET_GS(0x1001, 0x7fffffff)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in=@multicast1, @in=@empty}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8)
setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0)
getpid()
sched_getparam(0x0, &(0x7f00000001c0))
sync_file_range(0xffffffffffffffff, 0x0, 0x5, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0)
write$FUSE_BMAP(r0, 0x0, 0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)

[  170.358873] audit: type=1107 audit(1556232779.781:42): pid=7101 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='V�Z�ыn��bf$U��I�SCy<�L'
22:52:59 executing program 3:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]})
r0 = accept$unix(0xffffffffffffffff, 0x0, 0x0)
ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0)

22:52:59 executing program 1:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0)

22:52:59 executing program 4:
creat(&(0x7f0000000000)='./file0\x00', 0x0)
clone(0x180000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000))

22:52:59 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00')
pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="a2", 0x1}], 0x1, 0x0)

22:52:59 executing program 2:
syz_execute_func(&(0x7f0000000140)="410f01f9c4e1f573d50664ff0941c3c4e2c9975842f045835a000066420fe2e3c4217c294da7d4eef9ccf8")
clone(0x800083102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socket$inet6(0xa, 0x0, 0x0)
clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
clone(0x1ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0x3f553e5)
link(&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='./file1\x00')
setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file2\x00', 0x0, 0x0, 0x0, 0x0)

[  170.422152] audit: type=1107 audit(1556232779.791:43): pid=7101 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 msg='V�Z�ыn��bf$U��I�SCy<�L'
22:52:59 executing program 0:
syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f")
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/loop-control\x00', 0x0, 0x0)
r1 = dup(r0)
ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x4c81, 0xfffffffffffffffe)

22:53:00 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c)
ppoll(&(0x7f0000000000)=[{r0, 0x41a}], 0x1, 0x0, 0x0, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c)
sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0)

22:53:00 executing program 1:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000840))
syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)

22:53:00 executing program 3:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x100000003)
ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, &(0x7f0000000140)={0xfffffffffffffffb}, 0x8)

22:53:00 executing program 5:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x8, &(0x7f0000000840)=0xd)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00')
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x7)
preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)
r1 = syz_open_procfs(0x0, 0x0)
arch_prctl$ARCH_SET_GS(0x1001, 0x7fffffff)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in=@multicast1, @in=@empty}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8)
setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0)
getpid()
sched_getparam(0x0, &(0x7f00000001c0))
sync_file_range(0xffffffffffffffff, 0x0, 0x5, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0)
write$FUSE_BMAP(r0, 0x0, 0x0)
fcntl$setown(0xffffffffffffffff, 0x8, 0x0)

22:53:00 executing program 0:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00')
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x7)
preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)
syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_open_procfs(0x0, 0x0)
sync_file_range(0xffffffffffffffff, 0x0, 0x5, 0x0)

[  170.905237] hfsplus: unable to find HFS+ superblock
[  170.984275] hfsplus: unable to find HFS+ superblock
[  171.036106] hfsplus: unable to find HFS+ superblock
22:53:00 executing program 2:
clone(0x13102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x40000008, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
tkill(r0, 0xd)
ptrace$cont(0x18, r0, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x3, 0x37})
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x21, r0, 0x0, 0x0)

22:53:00 executing program 1:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
read(r0, &(0x7f0000000000)=""/11, 0xb)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0))
r1 = socket$inet6(0xa, 0x1, 0x0)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c)
ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0)
clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
recvmmsg(r1, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)=""/135, 0x87}], 0x1}}], 0x1, 0x0, 0x0)
ioctl$KDMKTONE(r0, 0x4b30, 0x0)
r2 = fcntl$dupfd(r1, 0x0, r0)
read(r1, &(0x7f0000000240)=""/185, 0xb9)
shutdown(r2, 0x0)

22:53:00 executing program 0:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0)
ioctl$TCSETS(r0, 0x5412, 0x0)

22:53:00 executing program 2:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1c00d, 0x0)

22:53:00 executing program 0:
clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4)
clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
r1 = dup2(r0, r0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2)
syz_execute_func(&(0x7f0000000080)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f43cd08")
setsockopt$inet6_mreq(r0, 0x29, 0x15, 0x0, 0x321)
ioctl$sock_SIOCGIFCONF(r1, 0x8912, 0x0)

22:53:00 executing program 0:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='loginuid\x00')
sendfile(r0, r0, 0x0, 0x40000fffd)
write$P9_RREAD(r0, 0x0, 0x0)

22:53:00 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000300)={0x8, 0x17, 0x0, {0x193, './file0'}}, 0x81)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)

22:53:00 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c)
ppoll(&(0x7f0000000000)=[{r0, 0x41a}], 0x1, 0x0, 0x0, 0x0)
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c)
sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0)

22:53:00 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}})
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
write(0xffffffffffffffff, 0x0, 0x0)
dup3(r0, r1, 0x0)

22:53:01 executing program 3:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="28000000150003000000000000000000020000fe13000200fe800000000000000000000000000000d503731171d638f6b455436c29b604295375523abf9963fb6156e4edb36352c271a897fe226f8c288e6351ce2e472b93"], 0x1}}, 0x0)

22:53:01 executing program 0:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0)
fallocate(r0, 0x0, 0x0, 0xfff)

22:53:01 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x41de}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0)
fallocate(r0, 0x0, 0x0, 0xfff)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

22:53:01 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}})
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
write(0xffffffffffffffff, 0x0, 0x0)
dup3(r0, r1, 0x0)

[  171.730320] audit: type=1400 audit(1556232781.151:44): avc:  denied  { create } for  pid=7246 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  171.758006] audit: type=1400 audit(1556232781.161:45): avc:  denied  { write } for  pid=7246 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
22:53:01 executing program 1:
syz_execute_func(&(0x7f00000000c0)="f2aa64ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f")
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0)
r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109)
dup2(r0, r1)
clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = dup2(r2, r2)
syz_genetlink_get_family_id$tipc(0x0)
sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0)

22:53:01 executing program 3:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0)
fallocate(r0, 0x0, 0x40000, 0xfff)
ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c)

22:53:01 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}})
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
write(0xffffffffffffffff, 0x0, 0x0)
dup3(r0, r1, 0x0)

22:53:01 executing program 5:
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
chdir(&(0x7f0000000180)='./file0\x00')
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x41de}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0)
fallocate(r0, 0x0, 0x0, 0xfff)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

22:53:01 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x28, 0x15, 0x3, 0x0, 0x0, {0x2}, [@typed={0x14, 0x2, @ipv6=@dev}]}, 0x28}}, 0x0)

22:53:01 executing program 0:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)

[  172.182226] audit: type=1400 audit(1556232781.611:46): avc:  denied  { read } for  pid=7286 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  172.239558] hfsplus: unable to find HFS+ superblock
22:53:01 executing program 4:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00')
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0)
preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)
syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = syz_open_procfs(0x0, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x4e23, @multicast1}, {0x306, @local}, 0x42, {0x2, 0x4e22, @empty}, 'rose0\x00'})
sched_getparam(0x0, &(0x7f00000001c0))
sync_file_range(0xffffffffffffffff, 0x0, 0x5, 0x0)
write$UHID_CREATE(r0, &(0x7f0000000540)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000440)=""/227, 0xe3, 0x1000, 0x0, 0x80000000, 0x10000, 0x9}, 0x120)

22:53:01 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}})
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
write(0xffffffffffffffff, 0x0, 0x0)
dup3(r0, r1, 0x0)

22:53:01 executing program 5:
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
pread64(0xffffffffffffffff, 0x0, 0x0, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]})
flock(r0, 0x0)

22:53:01 executing program 3:
syz_execute_func(&(0x7f0000000140)="410f01f9c4e1f573d50664ff0941c3c4e2c9975842f045835a000066420fe2e3c4217c294da7d4eef9ccf8")
clone(0x800083102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0)
ioctl$IOC_PR_RELEASE(r0, 0x401070ca, 0x0)
socket$inet6(0xa, 0x20000000000005, 0xd)
clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
clone(0x1ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5)
link(&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='./file1\x00')
setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file2\x00', 0x0, &(0x7f00000001c0)='y\x00', 0x2, 0x0)

22:53:01 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:01 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}})
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

[  172.392849] hfsplus: unable to find HFS+ superblock
22:53:01 executing program 0:

[  172.447959] hfsplus: unable to find HFS+ superblock
22:53:01 executing program 5:

22:53:01 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}})
dup3(r0, r1, 0x0)

22:53:01 executing program 0:

22:53:02 executing program 4:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00')
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, 0x0)
preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000)
syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
r1 = syz_open_procfs(0x0, 0x0)
ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000000)={{0x2, 0x4e23, @multicast1}, {0x306, @local}, 0x42, {0x2, 0x4e22, @empty}, 'rose0\x00'})
sched_getparam(0x0, &(0x7f00000001c0))
sync_file_range(0xffffffffffffffff, 0x0, 0x5, 0x0)
write$UHID_CREATE(r0, &(0x7f0000000540)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000440)=""/227, 0xe3, 0x1000, 0x0, 0x80000000, 0x10000, 0x9}, 0x120)

22:53:02 executing program 5:

22:53:02 executing program 0:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0)

22:53:02 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}})
dup3(r0, r1, 0x0)

22:53:02 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

[  172.842664] hfsplus: unable to find HFS+ superblock
22:53:02 executing program 3:

22:53:02 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb)
r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
socket$rds(0x15, 0x5, 0x0)
ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, 0x0)
openat$vcs(0xffffffffffffff9c, 0x0, 0x101240, 0x0)
ioctl$TIOCLINUX7(r0, 0x541c, 0x0)
r1 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
listen(r1, 0x8)
r2 = socket$inet6_sctp(0xa, 0x5, 0x84)
r3 = accept4(r1, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, 0x0)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xfffffffffffffffe}, 0x98)

22:53:02 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x0, @local}})
dup3(r0, r1, 0x0)

22:53:02 executing program 0:

22:53:02 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:02 executing program 4:

22:53:02 executing program 3:

22:53:02 executing program 4:

22:53:02 executing program 0:

22:53:02 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:02 executing program 3:

22:53:02 executing program 4:

22:53:02 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:02 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb)
r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
socket$rds(0x15, 0x5, 0x0)
ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, 0x0)
openat$vcs(0xffffffffffffff9c, 0x0, 0x101240, 0x0)
ioctl$TIOCLINUX7(r0, 0x541c, 0x0)
r1 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
listen(r1, 0x8)
r2 = socket$inet6_sctp(0xa, 0x5, 0x84)
r3 = accept4(r1, 0x0, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, 0x0)
setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xfffffffffffffffe}, 0x98)

22:53:02 executing program 0:

22:53:02 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, 0xffffffffffffffff, 0x0)

22:53:02 executing program 4:

22:53:02 executing program 3:

22:53:02 executing program 1:
syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:02 executing program 3:

22:53:02 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, 0xffffffffffffffff, 0x0)

22:53:02 executing program 0:

22:53:02 executing program 4:

22:53:02 executing program 1:
syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:02 executing program 0:

22:53:02 executing program 5:

22:53:02 executing program 4:

22:53:02 executing program 3:

22:53:02 executing program 0:

22:53:02 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, 0xffffffffffffffff, 0x0)

22:53:03 executing program 3:

22:53:03 executing program 5:

22:53:03 executing program 0:

22:53:03 executing program 4:

22:53:03 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:03 executing program 1:
syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:03 executing program 3:

22:53:03 executing program 5:

22:53:03 executing program 0:

22:53:03 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:03 executing program 4:

22:53:03 executing program 3:

22:53:03 executing program 5:

22:53:03 executing program 0:

22:53:03 executing program 5:

22:53:03 executing program 4:

22:53:03 executing program 3:

22:53:03 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:03 executing program 0:

22:53:03 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:03 executing program 5:

22:53:03 executing program 4:

22:53:03 executing program 3:
syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x2000)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fchmod(r0, 0x40)
prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0)

22:53:03 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)

22:53:03 executing program 0:

22:53:03 executing program 4:

22:53:03 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:03 executing program 2:
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(0xffffffffffffffff, r0, 0x0)

22:53:03 executing program 4:

22:53:03 executing program 0:

22:53:03 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:03 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="285474dae6badf3a960eca58356ed2eb9b", 0x11)

22:53:03 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="285474dae6badf3a960eca58356ed2eb9bff7c50d235e03ccaeeaead96af75edc5ce6eff1c40d53295", 0x29)

22:53:03 executing program 2:
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(0xffffffffffffffff, r0, 0x0)

22:53:03 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:03 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:03 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:03 executing program 2:
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(0xffffffffffffffff, r0, 0x0)

22:53:03 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:03 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:03 executing program 4:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='3:2'], 0x3)

22:53:03 executing program 5:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30)

22:53:03 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:03 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d03, 0x1]})
munmap(&(0x7f0000000000/0x3000)=nil, 0x3000)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

22:53:03 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:03 executing program 4:
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0)
mkdir(0x0, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[])
read(0xffffffffffffffff, 0x0, 0x0)
openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000070107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

22:53:03 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:03 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:03 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:03 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  174.495659] audit: type=1400 audit(1556232783.921:47): avc:  denied  { create } for  pid=7592 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
22:53:04 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:04 executing program 4:
ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0)
mkdir(0x0, 0x0)
mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[])
read(0xffffffffffffffff, 0x0, 0x0)
openat(0xffffffffffffffff, 0x0, 0x0, 0x0)
getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000070107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

22:53:04 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

[  174.545671] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details.
[  174.557124] audit: type=1400 audit(1556232783.921:48): avc:  denied  { write } for  pid=7592 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1
22:53:04 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$TUNSETLINK(r0, 0x400454cd, 0x337)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')

22:53:04 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x1c00d, 0x0)

22:53:04 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:04 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:04 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:04 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ptmx\x00', 0x0, 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000480)={0x1b9}, 0x0, 0x0)

[  174.787550] device nr0 entered promiscuous mode
22:53:04 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:04 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x1c00d, 0x0)

22:53:04 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:04 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:04 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:04 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

[  174.941446] device nr0 entered promiscuous mode
22:53:04 executing program 5:
r0 = socket(0x1e, 0x4, 0x0)
setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10)
recvmmsg(r0, &(0x7f0000000cc0)=[{{&(0x7f0000000200)=@caif, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)=""/206, 0xce}], 0x1, &(0x7f0000000400)=""/134, 0x86}}], 0x1, 0x0, 0x0)

22:53:04 executing program 4:
socket$nl_netfilter(0x10, 0x3, 0xc)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='fdinfo/4\x00')
dup(0xffffffffffffffff)
ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, 0x0)
restart_syscall()

22:53:04 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:04 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x1c00d, 0x0)

22:53:04 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:04 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:04 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:04 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:04 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:04 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x1c00d, 0x0)

22:53:04 executing program 4:
unshare(0x600)
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0)

22:53:04 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, 0x0)
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:05 executing program 5:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
perf_event_open(&(0x7f0000000040)={0x0, 0xdaa823007210dea6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x1f004})
openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

22:53:05 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:05 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0)

22:53:05 executing program 4:
r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0)
r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x101080, 0x0)
write(r0, &(0x7f0000000600)="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", 0x200)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r0, r1, 0x0, 0x666d)

22:53:05 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, 0x0)
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:05 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x1c00d, 0x0)

22:53:05 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:05 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, 0x0)
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:05 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0)

[  175.969681] audit: type=1800 audit(1556232785.391:49): pid=7732 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16601 res=0
[  175.998227] audit: type=1804 audit(1556232785.421:50): pid=7736 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir605694819/syzkaller.hSpGYx/25/file0" dev="sda1" ino=16601 res=1
22:53:05 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x1c00d, 0x0)

22:53:05 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:05 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0)

22:53:05 executing program 5:
r0 = userfaultfd(0x0)
ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040))
ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1})
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0)

22:53:05 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000))
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:05 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:06 executing program 4:
r0 = userfaultfd(0x0)
ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x40})
r1 = epoll_create1(0x0)
ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1})
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0)
dup3(r1, r0, 0x0)

22:53:06 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x1c00d, 0x0)

22:53:06 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:06 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000))
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:06 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:06 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:06 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:06 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000))
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:06 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  176.649403] device nr0 entered promiscuous mode
22:53:06 executing program 4:
socketpair(0x0, 0x0, 0x0, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700)

22:53:06 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:06 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x1c00d, 0x0)

22:53:06 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

[  176.743564] device nr0 entered promiscuous mode
22:53:06 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:06 executing program 3:
bind$bt_sco(0xffffffffffffffff, &(0x7f0000000000), 0x8)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, 0x0)

22:53:06 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:06 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:06 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x1c00d, 0x0)

22:53:06 executing program 3:
bind$bt_sco(0xffffffffffffffff, &(0x7f0000000000), 0x8)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, 0x0)

22:53:06 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  176.979222] device nr0 entered promiscuous mode
22:53:06 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

[  177.072361] audit: type=1804 audit(1556232786.501:51): pid=7815 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir605694819/syzkaller.hSpGYx/27/memory.events" dev="sda1" ino=16607 res=1
22:53:06 executing program 4:
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff15f, 0x0, 0x0, 0x2, 0x0)
lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x0)
ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000300)={0x400, 0x4, 0x5cbb, 0x34, 0xfffffffffffff283, 0x3f})
getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0)
write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0)
geteuid()
getgid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getegid()
stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40))
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, r0, 0x8, r2, 0x0)
syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0)

22:53:06 executing program 3:
bind$bt_sco(0xffffffffffffffff, &(0x7f0000000000), 0x8)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, 0x0)

22:53:06 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:06 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x1c00d, 0x0)

22:53:06 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:06 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

[  177.165568] audit: type=1800 audit(1556232786.501:52): pid=7815 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="memory.events" dev="sda1" ino=16607 res=0
22:53:06 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(0xffffffffffffffff, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:06 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:06 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  177.253405] device nr0 entered promiscuous mode
22:53:06 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:06 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)}], 0x1c00d, 0x0)

22:53:06 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:06 executing program 4:
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
gettid()
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff15f, 0x0, 0x0, 0x0, 0x0)
lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x0)
ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000300)={0x400, 0x4, 0x0, 0x34, 0xfffffffffffff283, 0x3f})
getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200)=""/67, &(0x7f00000000c0)=0x43)
write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0)
getgid()
getegid()
stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40))
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0)

22:53:06 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(0xffffffffffffffff, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:06 executing program 0:
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:06 executing program 4:
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff15f, 0x0, 0x0, 0x2, 0x0)
lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x0)
ioctl$EVIOCSABS3F(r2, 0x401845ff, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0)
write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0)
geteuid()
getgid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getegid()
stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40))
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, r0, 0x8, 0xffffffffffffffff, 0x0)
syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0)

22:53:06 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:06 executing program 0:
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  177.440973] device nr0 entered promiscuous mode
22:53:06 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(0xffffffffffffffff, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:06 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)}], 0x1c00d, 0x0)

22:53:07 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
socket$kcm(0x29, 0x5, 0x0)
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:07 executing program 0:
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:07 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, 0x0, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:07 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:07 executing program 0:
syz_open_dev$media(0x0, 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:07 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)}], 0x1c00d, 0x0)

22:53:07 executing program 0:
syz_open_dev$media(0x0, 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  177.689468] FAT-fs (loop4): bogus number of reserved sectors
[  177.717422] FAT-fs (loop4): Can't find a valid FAT filesystem
22:53:07 executing program 4:
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff15f, 0x0, 0x0, 0x2, 0x0)
lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x0)
ioctl$EVIOCSABS3F(r2, 0x401845ff, 0x0)
getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0)
write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0)
geteuid()
getgid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getegid()
stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40))
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, r0, 0x8, 0xffffffffffffffff, 0x0)
syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0)

22:53:07 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:07 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e", 0x8}], 0x1c00d, 0x0)

22:53:07 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, 0x0, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:07 executing program 0:
syz_open_dev$media(0x0, 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  177.951795] FAT-fs (loop4): bogus number of reserved sectors
[  177.962632] FAT-fs (loop4): Can't find a valid FAT filesystem
22:53:07 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
socket$kcm(0x29, 0x5, 0x0)
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:07 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, 0x0, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:07 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:07 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:07 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e", 0x8}], 0x1c00d, 0x0)

22:53:07 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
exit(0x0)
pselect6(0xc, &(0x7f0000000000)={0xb}, 0x0, 0x0, 0x0, 0x0)

22:53:07 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:07 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:07 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:08 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e", 0x8}], 0x1c00d, 0x0)

22:53:08 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:08 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:08 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
socket$kcm(0x29, 0x5, 0x0)
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:08 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:08 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(0x0, 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:08 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400", 0xc}], 0x1c00d, 0x0)

22:53:08 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:08 executing program 4:
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
gettid()
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff15f, 0x0, 0x0, 0x0, 0x0)
lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x0)
ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000300)={0x400, 0x4, 0x5cbb, 0x34, 0xfffffffffffff283, 0x3f})
getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0)
getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200)=""/67, &(0x7f00000000c0)=0x43)
write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0)
geteuid()
getgid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getegid()
stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40))
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0)

22:53:08 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:08 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(0x0, 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:08 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:08 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400", 0xc}], 0x1c00d, 0x0)

22:53:08 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:09 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

[  179.502361] FAT-fs (loop4): bogus number of reserved sectors
[  179.533715] FAT-fs (loop4): Can't find a valid FAT filesystem
[  179.658962] FAT-fs (loop4): bogus number of reserved sectors
[  179.666161] FAT-fs (loop4): Can't find a valid FAT filesystem
22:53:09 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(0x0, 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:09 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:09 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400", 0xc}], 0x1c00d, 0x0)

22:53:09 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:09 executing program 4:
clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
gettid()
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff15f, 0x0, 0x0, 0x0, 0x0)
lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x0)
ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000300)={0x400, 0x4, 0x5cbb, 0x34, 0xfffffffffffff283, 0x3f})
getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0)
getsockopt$netlink(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000200)=""/67, &(0x7f00000000c0)=0x43)
write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0)
geteuid()
getgid()
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
getegid()
stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40))
getgid()
sendmsg$unix(0xffffffffffffffff, 0x0, 0x0)
syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0)

22:53:09 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:09 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:09 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:09 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:09 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e666174000204", 0xe}], 0x1c00d, 0x0)

22:53:09 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:09 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:09 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:09 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0)
dup3(r0, r1, 0x0)

[  180.387055] FAT-fs (loop4): bogus number of reserved sectors
[  180.411513] FAT-fs (loop4): Can't find a valid FAT filesystem
22:53:09 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e666174000204", 0xe}], 0x1c00d, 0x0)

22:53:09 executing program 4:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x0, {0x1, 0x3, 0x6}}, 0x14)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(0x0)
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:09 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0)
dup3(r0, r1, 0x0)

[  180.749219] overlayfs: './file0' not a directory
22:53:10 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:10 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:10 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:10 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e666174000204", 0xe}], 0x1c00d, 0x0)

22:53:10 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0)
dup3(r0, r1, 0x0)

22:53:10 executing program 4:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x0, {0x1, 0x3, 0x6}}, 0x14)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(0x0)
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:10 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:10 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:10 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x0, 0x0)

22:53:10 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:10 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:10 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x0, 0x0)

[  181.270441] FAT-fs (loop1): bogus number of FAT structure
[  181.276250] FAT-fs (loop1): Can't find a valid FAT filesystem
[  181.404997] FAT-fs (loop1): bogus number of FAT structure
[  181.410807] FAT-fs (loop1): Can't find a valid FAT filesystem
22:53:11 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:11 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, 0x0)
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:11 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20)
dup3(r0, r1, 0x0)

22:53:11 executing program 1:
syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="e33c906d6b66732e66617400020401", 0xf}], 0x0, 0x0)

22:53:11 executing program 4:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x0, {0x1, 0x3, 0x6}}, 0x14)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(0x0)
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:11 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:11 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, 0x0)
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:11 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20)
dup3(r0, r1, 0x0)

[  182.053637] FAT-fs (loop1): bogus number of FAT structure
[  182.063053] FAT-fs (loop1): Can't find a valid FAT filesystem
22:53:11 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, 0x0)
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:11 executing program 1:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x0, {0x1, 0x3, 0x6}}, 0x14)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(0x0)
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:11 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20)
dup3(r0, r1, 0x0)

22:53:11 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040))
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:12 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:12 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20)
dup3(r0, r1, 0x0)

22:53:12 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040))
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:12 executing program 1:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x0, {0x1, 0x3, 0x6}}, 0x14)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(0x0)
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:12 executing program 4:
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080))
recvmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x2)

22:53:12 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:12 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(0xffffffffffffffff, r1, 0x0)

22:53:12 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040))
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:12 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c12")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:12 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:12 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(0xffffffffffffffff, r1, 0x0)

22:53:12 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c12")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:12 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(0xffffffffffffffff, r1, 0x0)

22:53:12 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:12 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, 0xffffffffffffffff, 0x0)

22:53:12 executing program 1:
socket$bt_rfcomm(0x1f, 0x0, 0x3)
setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x63, 0x2)
ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
lseek(r2, 0x20400000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
chmod(0x0, 0x0)
ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, 0x0)
write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f)
setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x0, 0x0, 0x40, 0x6, 0x55d}, 0xc)
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000658000/0x3000)=nil)
openat$nullb(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nullb0\x00', 0x80000, 0x0)
madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8)

22:53:13 executing program 4:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x2, {0x1, 0x3, 0x6}}, 0x14)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
setxattr(0x0, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:13 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c12")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:13 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, 0xffffffffffffffff, 0x0)

22:53:13 executing program 5:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r0 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(0xffffffffffffffff, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:13 executing program 1:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, 0x0, 0x0)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:13 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:13 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319b")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:13 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x2}}, 0x20)
dup3(r0, 0xffffffffffffffff, 0x0)

22:53:13 executing program 5:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r0 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(0xffffffffffffffff, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:13 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319b")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:13 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319b")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:13 executing program 5:
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r0 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(0xffffffffffffffff, &(0x7f0000000040)=""/56, 0x3, 0x0)

[  184.101747] overlayfs: './file0' not a directory
22:53:13 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd0")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:13 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x72, 0xa, 0xffe5}}, &(0x7f0000000180)='GPL\x00', 0x200000010001, 0xc3, &(0x7f0000000300)=""/195}, 0x48)

22:53:13 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:13 executing program 4:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x2, {0x1, 0x3, 0x6}}, 0x14)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
setxattr(0x0, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:13 executing program 1:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, 0x0, 0x0)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

[  184.124979] overlayfs: './file0' not a directory
22:53:14 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:14 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd0")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:14 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:14 executing program 2:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x2, {0x1, 0x3, 0x6}}, 0x14)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
setxattr(0x0, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:14 executing program 4:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x2, {0x1, 0x3, 0x6}}, 0x14)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
setxattr(0x0, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:14 executing program 1:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, 0x0, 0x0)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:14 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd0")
setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, 0x0, 0x0)

22:53:14 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:14 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
fcntl$dupfd(r0, 0x0, r0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0)

22:53:14 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
fcntl$dupfd(r0, 0x0, r0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0)

22:53:14 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:14 executing program 3:
r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
bind$bt_sco(r0, &(0x7f0000000000), 0x8)
fcntl$dupfd(r0, 0x0, r0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0)

22:53:14 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:14 executing program 3:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x2, {0x1, 0x3, 0x6}}, 0x14)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
setxattr(0x0, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:14 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:14 executing program 1:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, 0x0, 0x0)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:14 executing program 2:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, 0x0, 0x0)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:14 executing program 4:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, 0x0, 0x0)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = getpid()
fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r1, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:15 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:15 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:15 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:15 executing program 1:
r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x4c, 0x0, &(0x7f00000001c0)=[@increfs, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000100)=[0x28]}}], 0x0, 0x0, 0x0})

22:53:15 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10)
connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10)
mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x32, 0xffffffffffffffff, 0x0)
getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000001ac0))
setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4)
setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000240)=0x1, 0x4)
sendto$unix(r0, &(0x7f0000000040), 0xfd1b, 0x4004800, 0x0, 0x0)
connect(r0, &(0x7f0000000280)=@nl=@unspec, 0x80)

22:53:15 executing program 4:
unshare(0x400)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
splice(r0, 0x0, r0, 0x0, 0x8, 0x0)

[  185.856432] binder: 8429:8430 IncRefs 0 refcount change on invalid ref 0 ret -22
[  185.865381] binder: 8429:8430 transaction failed 29189/-22, size 0-8 line 2802
[  185.875318] binder: undelivered TRANSACTION_ERROR: 29189
22:53:15 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, 0x0, 0x0, 0x0)

22:53:15 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffc1f, &(0x7f0000000040)={&(0x7f0000000200)={0x1c, 0x16, 0x4100000000401, 0x0, 0x0, {0xa}, [@nested={0x8, 0x0, [@typed={0x4, 0x2, @binary}]}]}, 0x1c}}, 0x0)

22:53:15 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:15 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$inet_int(r0, 0x0, 0x13, 0x0, &(0x7f0000000080))

22:53:15 executing program 4:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002880)=ANY=[@ANYBLOB="1400000042000501000003cd67ad07d0b2750000"], 0x1}}, 0x0)

22:53:15 executing program 2:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
r1 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0)
socket$kcm(0x29, 0x0, 0x0)
r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
r3 = socket$kcm(0x2b, 0x1, 0x0)
socket$kcm(0x10, 0x3, 0x10)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
perf_event_open$cgroup(0x0, r0, 0x4, 0xffffffffffffff9c, 0x0)
r4 = socket$kcm(0xa, 0x5, 0x0)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x5}, 0xffffffffffffff0e)
ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890b, &(0x7f0000000000))
socketpair(0x3, 0x6, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r2)
ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x890c, &(0x7f0000000000))

22:53:15 executing program 4:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081aee4050cecce4cb9040a485e510befccdf7f3e9cf0758ef900e1cf38ebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0)

22:53:15 executing program 3:
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0)
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$kcm(0xa, 0x5, 0x0)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x5}, 0xffffffffffffff0e)
ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000))
ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890c, &(0x7f0000000000))

22:53:15 executing program 1:
bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x20002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x7f00]}, 0x2c)
bpf$MAP_CREATE(0x0, 0x0, 0x0)

22:53:15 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, 0x0, 0x0, 0x0)

22:53:15 executing program 2:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x3ff, 0x0, 0x1}, 0x3c)
bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000540)={r0, &(0x7f0000000480), 0x0}, 0x18)

22:53:15 executing program 3:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)={0x0, 0x1, [@link_local]})
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
r0 = socket$kcm(0x10, 0x4000000003, 0x10)
sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002b00672de45ae087185082cf0124b0eba06ec44109410000000a00180000000000008d0051894dd65b2f", 0x2e}], 0x1}, 0x0)

22:53:15 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:15 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, 0x0, 0x0, 0x0)

22:53:16 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0)
perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x2000)

22:53:16 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
write$binfmt_elf64(r1, 0x0, 0x0)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sockfs\x00', 0x0, 0x0)

22:53:16 executing program 2:
perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f00000001c0), 0x0}, 0x18)
ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0xc05c6104, 0x0)
ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0)

[  186.589678] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'.
22:53:16 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140), 0x0, 0x0)

22:53:16 executing program 4:
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f00000003c0)="62cc4895769941610ba150f880b029de5fe1", 0x0}, 0x18)
finit_module(0xffffffffffffffff, &(0x7f0000000240)='memory.events\x00', 0x3)
ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140)=0xe74a, 0x4)
r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000003780)='memory.events\x00', 0x7a05, 0x1700)
ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000037c0)=ANY=[@ANYBLOB])
ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x5})
ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x6f1f, 0x8001})
write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6)
recvmmsg(r1, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000400)=""/122, 0x7a}, {&(0x7f0000000540)=""/148, 0x94}, {&(0x7f0000000600)=""/242, 0xf2}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f0000000700)=""/243, 0xf3}, {&(0x7f0000000980)=""/103, 0x67}], 0x7, &(0x7f0000000b80)=""/120, 0x78}, 0x5}, {{&(0x7f0000000c00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000c80)=""/72, 0x48}, {&(0x7f0000000d00)=""/181, 0xb5}, {&(0x7f0000000300)=""/10, 0xa}, {&(0x7f0000000dc0)=""/220, 0xdc}, {&(0x7f0000000fc0)=""/119, 0x77}, {0x0}], 0x6}, 0xdd4}, {{&(0x7f0000001300)=@ax25={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @null, @bcast, @null]}, 0x80, &(0x7f0000001580)=[{0x0}, {&(0x7f0000001480)=""/98, 0x62}, {&(0x7f0000001500)=""/90, 0x5a}], 0x3, &(0x7f00000015c0)=""/186, 0xba}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/155, 0x9b}], 0x1, &(0x7f0000001800)=""/40, 0x28}, 0x7ff}, {{&(0x7f0000001840)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b80)=[{&(0x7f00000018c0)=""/134, 0x86}, {&(0x7f0000001980)=""/177, 0xb1}, {&(0x7f0000001a40)=""/195, 0xc3}, {&(0x7f0000001b40)=""/13, 0xd}], 0x4, &(0x7f0000001bc0)=""/128, 0x80}, 0xfffffffffffffffa}, {{&(0x7f0000001c40)=@hci, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001cc0)=""/116, 0x74}], 0x1, &(0x7f0000001d80)=""/38, 0x26}}, {{&(0x7f0000001dc0)=@alg, 0x80, &(0x7f0000003200)=[{&(0x7f0000001e40)=""/41, 0x29}, {&(0x7f0000001f80)=""/50, 0x32}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/61, 0x3d}, {0x0}, {&(0x7f0000003100)=""/242, 0xf2}], 0x6, &(0x7f0000003280)=""/242, 0xf2}, 0x6}, {{0x0, 0x0, &(0x7f0000003440)=[{&(0x7f0000003380)=""/141, 0x8d}], 0x1, &(0x7f0000003480)=""/102, 0x66}, 0x8}], 0x8, 0x0, 0x0)
finit_module(0xffffffffffffffff, &(0x7f0000003840)='memory.events\x00', 0x1)

[  186.644781] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'.
22:53:16 executing program 1:
r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0)
write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='sockfs\x00', 0x0, 0x0)

22:53:16 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:16 executing program 3:
r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0)
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x5426)
open(&(0x7f0000000080)='./bus\x00', 0x200, 0x0)

22:53:16 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140), 0x0, 0x0)

22:53:16 executing program 2:
request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0)

22:53:16 executing program 3:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180))
r1 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380), 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0})
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000003c80)={0x0, 0x0, 0x2080})
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d})
r4 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r4, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r4, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x800)
r5 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r5, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60)
mq_timedsend(r5, &(0x7f0000000080), 0x0, 0x0, 0x0)
mq_timedreceive(r5, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r6, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73ba2b1c")

22:53:16 executing program 0:
syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x0, 0x0)
epoll_create1(0x0)
socket$nl_route(0x10, 0x3, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x0, 0x0)
pipe2(&(0x7f0000000100), 0x0)
unshare(0x400)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140), 0x0, 0x0)

22:53:16 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180))
r1 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380), 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0})
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000003c80)={0x0, 0x0, 0x2080})
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0)
r4 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r4, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r4, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x800)
r5 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r5, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60)
mq_timedsend(r5, &(0x7f0000000080), 0x0, 0x0, 0x0)
mq_timedreceive(r5, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73ba2b1c")

22:53:16 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:16 executing program 0:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
stat(0x0, &(0x7f00000015c0))
r0 = memfd_create(&(0x7f0000000140)='proc}GPLeth0^wlan0#:\x00', 0x0)
clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
socket$netlink(0x10, 0x3, 0xe)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
wait4(0x0, 0x0, 0x0, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400001000)
tkill(r1, 0x20)

22:53:16 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:16 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180))
r1 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380), 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0})
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000003c80)={0x0, 0x0, 0x2080})
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0)
r4 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r4, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r4, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x800)
r5 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r5, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60)
mq_timedsend(r5, &(0x7f0000000080), 0x0, 0x0, 0x0)
mq_timedreceive(r5, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73ba2b1c")

22:53:16 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000380), 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d})
r2 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r1, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r2, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r2, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x0)
r3 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r3, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73")

22:53:16 executing program 3:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180))
r1 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380), 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0})
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000003c80)={0x0, 0x0, 0x2080})
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d})
r4 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r4, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r4, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x800)
r5 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r5, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60)
mq_timedsend(r5, &(0x7f0000000080), 0x0, 0x0, 0x0)
mq_timedreceive(r5, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r6, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73ba2b1c")

22:53:16 executing program 4:
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f00000003c0)="62cc4895769941610ba150f880b029de5fe1", 0x0}, 0x18)
finit_module(0xffffffffffffffff, &(0x7f0000000240)='memory.events\x00', 0x3)
ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140)=0xe74a, 0x4)
r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x802)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000003780)='memory.events\x00', 0x7a05, 0x1700)
ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000037c0)=ANY=[@ANYBLOB])
ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x8, 0x5})
ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x6f1f, 0x8001})
write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6)
recvmmsg(r1, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000280)=""/102, 0x66}, {&(0x7f0000000400)=""/122, 0x7a}, {&(0x7f0000000540)=""/148, 0x94}, {&(0x7f0000000600)=""/242, 0xf2}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f0000000700)=""/243, 0xf3}, {&(0x7f0000000980)=""/103, 0x67}], 0x7, &(0x7f0000000b80)=""/120, 0x78}, 0x5}, {{&(0x7f0000000c00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000c80)=""/72, 0x48}, {&(0x7f0000000d00)=""/181, 0xb5}, {&(0x7f0000000300)=""/10, 0xa}, {&(0x7f0000000dc0)=""/220, 0xdc}, {&(0x7f0000000fc0)=""/119, 0x77}, {0x0}], 0x6}, 0xdd4}, {{&(0x7f0000001300)=@ax25={{0x3, @default}, [@remote, @rose, @remote, @remote, @default, @null, @bcast, @null]}, 0x80, &(0x7f0000001580)=[{0x0}, {&(0x7f0000001480)=""/98, 0x62}, {&(0x7f0000001500)=""/90, 0x5a}], 0x3, &(0x7f00000015c0)=""/186, 0xba}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)=""/155, 0x9b}], 0x1, &(0x7f0000001800)=""/40, 0x28}, 0x7ff}, {{&(0x7f0000001840)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001b80)=[{&(0x7f00000018c0)=""/134, 0x86}, {&(0x7f0000001980)=""/177, 0xb1}, {&(0x7f0000001a40)=""/195, 0xc3}, {&(0x7f0000001b40)=""/13, 0xd}], 0x4, &(0x7f0000001bc0)=""/128, 0x80}, 0xfffffffffffffffa}, {{&(0x7f0000001c40)=@hci, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001cc0)=""/116, 0x74}], 0x1, &(0x7f0000001d80)=""/38, 0x26}}, {{&(0x7f0000001dc0)=@alg, 0x80, &(0x7f0000003200)=[{&(0x7f0000001e40)=""/41, 0x29}, {&(0x7f0000001f80)=""/50, 0x32}, {&(0x7f0000001fc0)=""/4096, 0x1000}, {&(0x7f0000002fc0)=""/61, 0x3d}, {0x0}, {&(0x7f0000003100)=""/242, 0xf2}], 0x6, &(0x7f0000003280)=""/242, 0xf2}, 0x6}, {{0x0, 0x0, &(0x7f0000003440)=[{&(0x7f0000003380)=""/141, 0x8d}], 0x1, &(0x7f0000003480)=""/102, 0x66}, 0x8}], 0x8, 0x0, 0x0)
finit_module(0xffffffffffffffff, &(0x7f0000003840)='memory.events\x00', 0x1)

22:53:16 executing program 0:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180))
r1 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380), 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0})
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000003c80)={0x0, 0x0, 0x2080})
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d})
r4 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r4, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r4, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x800)
r5 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r5, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60)
mq_timedsend(r5, &(0x7f0000000080), 0x0, 0x0, 0x0)
mq_timedreceive(r5, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r6, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73ba2b1c")

22:53:16 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180))
r1 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380), 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0})
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000003c80)={0x0, 0x0, 0x2080})
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0)
r4 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r4, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r4, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x800)
r5 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r5, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60)
mq_timedsend(r5, &(0x7f0000000080), 0x0, 0x0, 0x0)
mq_timedreceive(r5, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73ba2b1c")

22:53:16 executing program 3:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180))
r1 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380), 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0})
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000003c80)={0x0, 0x0, 0x2080})
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d})
r4 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r4, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r4, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x800)
r5 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r5, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60)
mq_timedsend(r5, &(0x7f0000000080), 0x0, 0x0, 0x0)
mq_timedreceive(r5, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r6, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73ba2b1c")

22:53:16 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180))
r1 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380), 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0})
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000003c80)={0x0, 0x0, 0x2080})
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0)
r4 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r4, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r4, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x800)
r5 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r5, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60)
mq_timedsend(r5, &(0x7f0000000080), 0x0, 0x0, 0x0)
mq_timedreceive(r5, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73ba2b1c")

22:53:16 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0)
perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$FUSE_DIRENTPLUS(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ca"], 0x1)
mmap(&(0x7f0000004000/0x4000)=nil, 0xc07000, 0x0, 0x32, 0xffffffffffffffff, 0x0)

22:53:16 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000380), 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d})
r2 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r1, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r2, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r2, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x0)
r3 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r3, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73")

22:53:16 executing program 2:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x2, {0x1}}, 0x14)
r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = getpid()
fsetxattr$security_evm(r1, 0x0, 0x0, 0x0, 0x0)
setxattr(0x0, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r2, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')

[  187.701369] overlayfs: './file0' not a directory
22:53:17 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:17 executing program 3:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180))
r1 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000380), 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
r3 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0})
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000003c80)={0x0, 0x0, 0x2080})
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d})
r4 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r2, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r4, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r4, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x800)
r5 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r5, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60)
mq_timedsend(r5, &(0x7f0000000080), 0x0, 0x0, 0x0)
mq_timedreceive(r5, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
r6 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r6, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73ba2b1c")

22:53:17 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000380), 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d})
r2 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r1, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r2, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r2, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x0)
r3 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r3, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73")

22:53:17 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
socket$inet6(0xa, 0x5, 0x0)
socket$nl_xfrm(0x10, 0x3, 0x6)
openat$pfkey(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/net/pfkey\x00', 0x0, 0x0)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0)
select(0x40, &(0x7f0000000080)={0x6}, 0x0, &(0x7f0000000540)={0x80, 0x8, 0x3, 0xfffffffffffffff8, 0x9, 0x3, 0x61c, 0x9}, &(0x7f0000000580)={0x77359400})

22:53:17 executing program 4:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = memfd_create(&(0x7f0000000140)='proc}GPLeth0^wlan0#:\x00', 0x0)
clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x2000)=nil)
socket$netlink(0x10, 0x3, 0xe)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
wait4(0x0, 0x0, 0x0, 0x0)
execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400001000)
tkill(r1, 0x20)

22:53:17 executing program 2:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
write$P9_RMKDIR(r0, &(0x7f0000000200)={0x14, 0x49, 0x2, {0x1}}, 0x14)
r1 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = getpid()
fsetxattr$security_evm(r1, 0x0, 0x0, 0x0, 0x0)
setxattr(0x0, 0x0, 0x0, 0x0, 0x0)
sched_setscheduler(r2, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')

22:53:17 executing program 1:
socketpair$unix(0x1, 0x2, 0x0, 0x0)
r0 = socket$inet6(0xa, 0x3, 0x6)
ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200))
openat$tun(0xffffffffffffff9c, 0x0, 0xff, 0x0)
getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000380), 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006)
syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0}, &(0x7f0000000300)}, 0xa0)
ioctl$KVM_GET_NESTED_STATE(0xffffffffffffffff, 0xc080aebe, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d})
r2 = socket(0x40000000015, 0x5, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10)
ioctl$int_in(r1, 0x541d, &(0x7f00000003c0)=0xb)
setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, 0x0, 0x246)
sendto$inet(r2, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0)
accept4$unix(r2, &(0x7f0000000440), &(0x7f0000000140)=0xfffffffffffffeee, 0x0)
r3 = mq_open(&(0x7f000084dff0)='.seli\x00\x00\x00\x00elinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x2, 0x1, 0x5, 0x200000000000})
mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122)
ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0)
mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r3, &(0x7f0000000080)=""/24, 0x18, 0x0, 0x0)
ioctl(0xffffffffffffffff, 0x20, &(0x7f00000000c0)="341d8573eee9a9eb46657e74e84017502da2183d59ef73")

22:53:17 executing program 3:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x7a00, 0x0)
r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000180), 0xd8)

22:53:17 executing program 1:
r0 = add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$search(0x4, r0, &(0x7f0000000840)='asymmetric\x00', 0x0, 0x0)

22:53:17 executing program 3:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x7a00, 0x0)
r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000180), 0xd8)

22:53:17 executing program 1:
bind$alg(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x1f, 0x0, 0x0, 0x210080, 0x0)

22:53:17 executing program 2:

[  188.222083] FAT-fs (loop1): bogus number of reserved sectors
[  188.228123] FAT-fs (loop1): Can't find a valid FAT filesystem
[  188.302347] FAT-fs (loop1): bogus number of reserved sectors
[  188.317849] FAT-fs (loop1): Can't find a valid FAT filesystem
22:53:18 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:18 executing program 3:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x7a00, 0x0)
r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000180), 0xd8)

22:53:18 executing program 1:
r0 = add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$search(0x15, r0, 0x0, 0x0, 0x0)

22:53:18 executing program 0:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000100)={0x2, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x4, 0x0, 0x1000000000000000, @in={0x2, 0x0, @multicast1=0xe0000002}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0)

22:53:20 executing program 4:
r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0)
perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="62322b32b253d7ea95e1806359bc322925625dc0ed3089d6b38bc80e583586afc8ede5d828539bfcf18cddb2e9cbe1f9bd052b118eacfa4a69c25f0e50f169c975f89c71a2c495ef83abdc777a59d392f17e9f8712f03721b4c16b8839c793bfcfd30102663dab99fe1a5de3"], 0x6c)
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2d, 'memory'}, {0x2d, 'memory'}, {0x2f, 'io'}, {0x2d, 'rdma'}]}, 0x1a)
mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0)

22:53:20 executing program 2:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000100)={0x2, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x1000000000000000, @in={0x2, 0x0, @multicast1=0xe0000002}}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0)

22:53:20 executing program 1:
r0 = add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f0000000800)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb)
keyctl$search(0x15, r0, 0x0, 0x0, 0x0)

22:53:20 executing program 3:
mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff)
mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x7a00, 0x0)
r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000180), 0xd8)

22:53:20 executing program 0:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
stat(&(0x7f0000000980)='./file1\x00', 0x0)

22:53:20 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:20 executing program 3:

22:53:20 executing program 1:

22:53:20 executing program 1:

22:53:20 executing program 3:

22:53:20 executing program 4:

22:53:20 executing program 2:

22:53:20 executing program 1:

22:53:20 executing program 3:

22:53:20 executing program 4:

22:53:20 executing program 2:

22:53:20 executing program 0:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
stat(&(0x7f0000000980)='./file1\x00', 0x0)

[  191.347498] overlayfs: './file0' not a directory
22:53:21 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:21 executing program 3:

22:53:21 executing program 1:

22:53:21 executing program 2:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0)
fchdir(r0)
r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0)
r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0)
ftruncate(r2, 0x2081fc)
r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0)
fcntl$setstatus(r3, 0x4, 0x40400)
write$FUSE_WRITE(r3, &(0x7f0000000080)={0x18}, 0x18)
fcntl$setstatus(r1, 0x4, 0x6100)
write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e)
ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612)

22:53:21 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070")
r1 = socket(0x10, 0x80002, 0xa)
sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x1dd, &(0x7f0000000100)}], 0xf9b40bd5bccab9, 0x0)

22:53:21 executing program 0:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
stat(&(0x7f0000000980)='./file1\x00', 0x0)

22:53:21 executing program 3:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
stat(&(0x7f0000000980)='./file1\x00', 0x0)

22:53:21 executing program 1:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
stat(&(0x7f0000000980)='./file1\x00', 0x0)

[  191.904773] audit: type=1400 audit(1556232801.321:53): avc:  denied  { create } for  pid=8729 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1
22:53:21 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2}}}, 0x1b7)
setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x30, &(0x7f0000678f70)={0x2, {{0x2, 0x0, @multicast2}}}, 0x356f)

22:53:21 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000001ec0)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(hmac(sha256-generic))\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0)
r1 = accept4(r0, 0x0, 0x0, 0x0)
sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x8000)
accept$inet6(r1, 0x0, 0x0)

[  191.995489] audit: type=1400 audit(1556232801.361:54): avc:  denied  { write } for  pid=8729 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1
22:53:21 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c)
setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x101000000000001, 0x4)
connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c)

22:53:21 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070")
connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10)

22:53:22 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:22 executing program 4:
bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x100000000000000a, 0x2, 0x408000000004, 0x1}, 0x3c)
bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c)
bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c)

22:53:22 executing program 2:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132})
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132})
r2 = socket$kcm(0x29, 0x2, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="ff038aa174036ed7e08f93dd86dd60df806100052bf17b4cf775b88fae83b35adbc974dc5f2bfe80000000000000a2c8c1cf22741f26"], 0x36)

22:53:22 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='3:2\t'], 0x4)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

22:53:22 executing program 1:
perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0xa, 0x5, 0x0)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x5}, 0xffffffffffffff0e)
ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000))

22:53:22 executing program 3:
recvmsg(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@pppoe, 0x80, 0x0}, 0x0)
r0 = socket$kcm(0x11, 0x3, 0x0)
setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000001640), 0x4)
sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x104, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000002c0)}, 0x0)

22:53:22 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x28, 0x1, 0x0, &(0x7f0000000000))
ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080))
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x7fff)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0)

22:53:22 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x2001})
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x38, 0x0)

[  192.862122] device nr0 entered promiscuous mode
22:53:22 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200, 0x0)
prctl$PR_SET_SECUREBITS(0x1c, 0x1c)
recvfrom$ax25(r0, &(0x7f0000000100)=""/254, 0xfe, 0x40010001, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @rose]}, 0x48)
openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x400)

22:53:22 executing program 4:
r0 = memfd_create(&(0x7f0000000200)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0)
r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0)
r2 = dup2(r1, r0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'})
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x402c5342, &(0x7f0000000440)={0x0, 0x4a010000, 0x1f00, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01]})

[  192.968846] device nr0 entered promiscuous mode
22:53:22 executing program 1:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x28, 0x1, 0x0, &(0x7f0000000000))
ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080))
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x7fff)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0)

[  192.993791] device nr0 entered promiscuous mode
22:53:22 executing program 4:
perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2)
ioctl$IOC_PR_PREEMPT(r0, 0xc0386105, &(0x7f0000000080))

[  193.029311] device nr0 entered promiscuous mode
22:53:23 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0)
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:23 executing program 3:
r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2)
ioctl$IOC_PR_PREEMPT(r0, 0x805c6103, &(0x7f0000000080))

22:53:23 executing program 1:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700)

22:53:23 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080)=0x5, 0x4)
setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4)
setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x4)
connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c)
sendto$inet6(r1, &(0x7f00000000c0)='\x00', 0x1, 0x200400d4, 0x0, 0x0)

22:53:23 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x2001})
bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, &(0x7f0000000040)=""/56, 0x38, 0x0)

22:53:23 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55", 0x10)
r1 = accept$alg(r0, 0x0, 0x0)
sendto(r1, &(0x7f0000000000)='\x00', 0x1, 0x0, 0x0, 0x0)

22:53:23 executing program 3:
r0 = socket$inet6(0xa, 0x2000000080803, 0x1)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc)
dup3(r1, r0, 0x0)
getsockname(r0, 0x0, &(0x7f0000000280))

22:53:23 executing program 4:
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0)

[  193.738924] device nr0 entered promiscuous mode
22:53:23 executing program 3:
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfbffffff, 0x2}]}, 0x38}}, 0x0)

22:53:23 executing program 0:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_percpu_user\x00', 0x0, 0x0)
ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000280)={0x0, 0x2d5, 0x7, [], &(0x7f0000000240)=0x7})
setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4)
ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000000c0))
connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10)
syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x80, 0x10100)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='eql\x00', 0x10)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x803, 0x4)
sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0)

22:53:23 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:23 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f0000000180)='notify_on_release\x00', 0x2, 0x0)
sendfile(r1, r1, 0x0, 0x88001)

[  193.928882] audit: type=1804 audit(1556232803.351:55): pid=8840 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir222781970/syzkaller.ZJZGNt/70/memory.events" dev="sda1" ino=16802 res=1
[  193.996904] audit: type=1800 audit(1556232803.351:56): pid=8840 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=16802 res=0
[  194.084099] audit: type=1804 audit(1556232803.511:57): pid=8840 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir222781970/syzkaller.ZJZGNt/70/memory.events" dev="sda1" ino=16802 res=1
[  194.115178] audit: type=1800 audit(1556232803.511:58): pid=8840 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=16802 res=0
22:53:24 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0)
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:24 executing program 3:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:24 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:24 executing program 0:
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuacct.usage_percpu_user\x00', 0x0, 0x0)
ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000280)={0x0, 0x2d5, 0x7, [], &(0x7f0000000240)=0x7})
setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4)
ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000000c0))
connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10)
syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x80, 0x10100)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='eql\x00', 0x10)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x803, 0x4)
sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0)

22:53:24 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x4b564d03, 0x1]})
ioctl$KVM_RUN(r2, 0xae80, 0x0)

22:53:24 executing program 2:
r0 = socket$inet6(0xa, 0x802, 0x0)
sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x2}, 0x1c)

22:53:24 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:24 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
capset(&(0x7f0000000040), 0x0)
setpriority(0x2, 0x0, 0x0)

22:53:24 executing program 1:

22:53:24 executing program 1:

22:53:24 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:24 executing program 2:

[  194.933176] overlayfs: './file0' not a directory
22:53:24 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0)
pread64(r0, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:24 executing program 1:

22:53:24 executing program 2:

22:53:24 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:24 executing program 3:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:24 executing program 0:
mkdir(&(0x7f0000000700)='./file1\x00', 0x0)
sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x8080)
syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
creat(&(0x7f0000000280)='./file1/file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = getpid()
sched_setscheduler(r0, 0x5, &(0x7f0000000040))
mkdir(&(0x7f00000003c0)='./file0\x00', 0x0)
mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1'])
chdir(&(0x7f0000000380)='./file0\x00')
setxattr$security_selinux(0x0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:fixed_disk_device_t:s0\x00', 0x29, 0x0)
link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00')
stat(&(0x7f0000000980)='./file1\x00', &(0x7f00000009c0))

22:53:24 executing program 2:

22:53:24 executing program 1:

22:53:24 executing program 2:

22:53:24 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:25 executing program 1:

22:53:25 executing program 2:

22:53:25 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(0xffffffffffffffff, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:25 executing program 2:

22:53:25 executing program 1:

22:53:25 executing program 3:

22:53:25 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:25 executing program 0:

22:53:25 executing program 2:

22:53:25 executing program 1:

[  196.384209] device nr0 entered promiscuous mode
22:53:25 executing program 3:

22:53:25 executing program 0:

22:53:25 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(0xffffffffffffffff, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:25 executing program 1:

22:53:25 executing program 2:

22:53:25 executing program 0:

22:53:25 executing program 3:

22:53:26 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:26 executing program 1:

[  196.548283] device nr0 entered promiscuous mode
22:53:26 executing program 2:

22:53:26 executing program 0:

22:53:26 executing program 3:

22:53:26 executing program 1:

22:53:26 executing program 2:

22:53:26 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(0xffffffffffffffff, &(0x7f0000000040)=""/56, 0x3, 0x0)

22:53:26 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:26 executing program 1:

22:53:26 executing program 3:

22:53:26 executing program 2:

22:53:26 executing program 0:

22:53:26 executing program 2:

22:53:26 executing program 0:

22:53:26 executing program 2:

22:53:26 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:26 executing program 1:

22:53:26 executing program 3:
syz_genetlink_get_family_id$tipc2(&(0x7f0000001440)='TIPCv2\x00')
pipe(&(0x7f0000000300)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4)
bind$inet(r2, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10)
ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001400)=<r3=>0x0)
ptrace$setsig(0x4203, r3, 0x3, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10)
setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000)=0x3, 0x4)
write$binfmt_elf64(r2, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x10219)
shutdown(r2, 0x1)
fsync(r2)
getdents(r1, &(0x7f00000000c0)=""/104, 0x68)
recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100)
fcntl$getown(0xffffffffffffffff, 0x9)
write(r1, &(0x7f00000001c0), 0xfffffef3)
ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c)
writev(0xffffffffffffffff, &(0x7f0000001ac0), 0x0)
poll(&(0x7f0000000040)=[{}, {r2}, {r2}, {0xffffffffffffffff, 0x40}], 0x4, 0x0)
getpgid(0xffffffffffffffff)
write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0)
prctl$PR_SET_PDEATHSIG(0x1, 0x2a)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3)
setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0)
ioctl$RTC_WIE_OFF(r1, 0x7010)

[  196.790970] device nr0 entered promiscuous mode
22:53:26 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, 0x0, 0x0, 0x0)

22:53:26 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x4000)

22:53:26 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000000)={0x2000ec3})
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000002a000/0x18000)=nil, 0x0, 0xfffffffffffffe49, 0x0, 0x0, 0xfed1)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x80000003f, 0x0, 0x0, 0x0, 0x0, 0x1ff}})
ioctl$KVM_RUN(r2, 0xae80, 0x0)

22:53:26 executing program 1:
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair(0x17, 0x0, 0x1000, &(0x7f0000000000))
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x7c, 0xc48, {"4658bb091422ec9c4fc3a163a1548fc5ac392d2a117203e78f1a463f573124d7f455018b2cdee0c18ab23053ec03d6d34591aadb1979fcf48b12d91d6c86c77af98cc77ee0f0d5d401fc6d23db0a7a326181bd1952be4606793cee8f59025e54e73ecea2"}}, {0x0, "2eb2803e2d4e14196161b25230f3cc729027e1989bdc2177c71f38f96ef3db"}}, 0x0, 0x9d}, 0x20)
ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'vlan0\x00'})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700)

22:53:26 executing program 0:
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0xf4ffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000480000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0)

22:53:26 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:26 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  197.017474] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  197.035489] device nr0 entered promiscuous mode
22:53:26 executing program 2:

[  197.063103] EXT4-fs (loop0): group descriptors corrupted!
[  197.099253] *** Guest State ***
22:53:26 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, 0x0, 0x0, 0x0)

22:53:26 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  197.114372] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7
22:53:26 executing program 2:
clone(0x200, 0x0, 0x0, 0x0, 0x0)
symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00')
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
read(r0, &(0x7f00000003c0)=""/11, 0xfffffec2)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180))
r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109)
r2 = dup2(r0, r1)
execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0)
open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0)
clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0)
ioctl$sock_inet_SIOCSARP(r2, 0x8955, 0x0)

[  197.158176] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock
[  197.189873] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
[  197.199426] EXT4-fs (loop0): group descriptors corrupted!
22:53:26 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  197.252726] CR3 = 0x00000000fffbc000
[  197.267024] device nr0 entered promiscuous mode
[  197.277131] RSP = 0x0000000000002000  RIP = 0x0000000000000000
[  197.283826] RFLAGS=0x00010002         DR7 = 0x0000000000000400
[  197.289907] Sysenter RSP=0000000000000f80 CS:RIP=0050:0000000000002810
22:53:26 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x0, 0x2, 0x0, 0xffefffffffffffff}})
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)

[  197.297431] CS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  197.305798] DS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  197.305817] SS:   sel=0x0000, attr=0x08081, limit=0x00000000, base=0x0000000000000000
[  197.305828] ES:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  197.305886] FS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  197.305898] GS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  197.305906] GDTR:                           limit=0x00000000, base=0x0000000000000000
[  197.305919] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  197.305927] IDTR:                           limit=0x00000000, base=0x0000000000000000
[  197.305938] TR:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  197.305946] EFER =     0x0000000000000000  PAT = 0x0007040600070406
[  197.305953] DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
[  197.305959] Interruptibility = 00000000  ActivityState = 00000000
[  197.305962] *** Host State ***
22:53:26 executing program 0:
clock_adjtime(0x0, &(0x7f0000000180)={0x73db})

[  197.305970] RIP = 0xffffffff8117477a  RSP = 0xffff88805c89f998
[  197.305986] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
[  197.305993] FSBase=00007f71bf46e700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000
[  197.306001] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000
[  197.306011] CR0=0000000080050033 CR3=0000000096e82000 CR4=00000000001426f0
[  197.306021] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff86201910
[  197.306029] EFER = 0x0000000000000d01  PAT = 0x0407050600070106
[  197.306032] *** Control State ***
[  197.306038] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000ca
[  197.306043] EntryControls=0000d1ff ExitControls=002fefff
[  197.306052] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000
[  197.399245] VMEntry: intr_info=8000030c errcode=00000000 ilen=00000000
[  197.435799] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001
[  197.448318]         reason=80000021 qualification=0000000000000000
[  197.462369] IDTVectoring: info=00000000 errcode=00000000
[  197.502516] TSC Offset = 0xffffff93c08831c8
[  197.512169] EPT pointer = 0x000000009265e01e
22:53:27 executing program 3:
socketpair(0x0, 0x0, 0x0, 0x0)
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpu.weight.nice\x00', 0x2, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x17, 0x0, 0x1000, &(0x7f0000000000))
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700)

[  197.576528] audit: type=1804 audit(1556232807.001:59): pid=9026 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir222781970/syzkaller.ZJZGNt/84/memory.events" dev="sda1" ino=16769 res=1
[  197.608037] audit: type=1800 audit(1556232807.001:60): pid=9026 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=16769 res=0
22:53:27 executing program 1:
bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair(0x17, 0x0, 0x1000, &(0x7f0000000000))
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a)
write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x7c, 0xc48, {"4658bb091422ec9c4fc3a163a1548fc5ac392d2a117203e78f1a463f573124d7f455018b2cdee0c18ab23053ec03d6d34591aadb1979fcf48b12d91d6c86c77af98cc77ee0f0d5d401fc6d23db0a7a326181bd1952be4606793cee8f59025e54e73ecea2"}}, {0x0, "2eb2803e2d4e14196161b25230f3cc729027e1989bdc2177c71f38f96ef3db"}}, 0x0, 0x9d}, 0x20)
ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'vlan0\x00'})
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700)

22:53:27 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x6)
ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x6)
write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x12, 0x10000000000403e, {0x8, 0x0, 0x3ffffffffffffd, 0x0, 0x803e0000}}, 0x30)
mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000180)={{0x0, 0x2, 0x0, 0xffefffffffffffff}})

22:53:27 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
pread64(r0, 0x0, 0x0, 0x0)

22:53:27 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  197.820129] audit: type=1804 audit(1556232807.241:61): pid=9013 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir222781970/syzkaller.ZJZGNt/84/memory.events" dev="sda1" ino=16769 res=1
[  197.877311] device nr0 entered promiscuous mode
22:53:27 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  197.950739] audit: type=1800 audit(1556232807.241:62): pid=9013 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=16769 res=0
22:53:27 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x6)
ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)=0x6)
write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000000)={0x30, 0x12, 0x10000000000403e, {0x8, 0x0, 0x3ffffffffffffd, 0x0, 0x803e0000}}, 0x30)
mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000180)={{0x0, 0x2, 0x0, 0xffefffffffffffff}})

22:53:27 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0x0, 0x2}})

22:53:27 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x15}}, 0x0, 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)

22:53:27 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:27 executing program 2:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
exit_group(0x0)
unshare(0x40040000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x0)

22:53:27 executing program 0:
clone(0x802102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x38)
ptrace$cont(0x18, r0, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x4000, 0x0, 0xaa})
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x9, r0, 0x0, 0x0)

[  198.426501] audit: type=1804 audit(1556232807.851:63): pid=9077 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir222781970/syzkaller.ZJZGNt/85/memory.events" dev="sda1" ino=16838 res=1
[  198.473614] audit: type=1800 audit(1556232807.851:64): pid=9077 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=16838 res=0
[  198.583240] audit: type=1804 audit(1556232808.011:65): pid=9064 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir298713364/syzkaller.5qOVqv/105/memory.events" dev="sda1" ino=16674 res=1
[  198.611288] audit: type=1800 audit(1556232808.011:66): pid=9064 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="memory.events" dev="sda1" ino=16674 res=0
[  198.635208] audit: type=1804 audit(1556232808.011:67): pid=9121 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir298713364/syzkaller.5qOVqv/105/memory.events" dev="sda1" ino=16674 res=1
22:53:28 executing program 3:
r0 = socket$unix(0x1, 0x3, 0x0)
r1 = socket$unix(0x1, 0x10000000000002, 0x0)
syz_emit_ethernet(0x1, &(0x7f0000015e15)=ANY=[@ANYBLOB="ffffffff"], 0x0)
bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8)
connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8)
recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x4000054, 0x2002, 0x0)
write$binfmt_script(r0, 0x0, 0x0)

22:53:28 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:28 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0)
sysinfo(&(0x7f00000007c0)=""/154)
ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)})

22:53:28 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0)
sysinfo(&(0x7f00000007c0)=""/154)
ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)})
fcntl$getflags(0xffffffffffffffff, 0x0)

22:53:28 executing program 1:
sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0)
sysinfo(&(0x7f00000007c0)=""/154)
ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0)
ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)})
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)

[  198.663479] audit: type=1800 audit(1556232808.011:68): pid=9121 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="memory.events" dev="sda1" ino=16674 res=0
22:53:28 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:28 executing program 1:
sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0)
sysinfo(&(0x7f00000007c0)=""/154)
ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, 0x0)
ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)})
fcntl$getownex(0xffffffffffffffff, 0x10, 0x0)

22:53:28 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0)
sysinfo(&(0x7f00000007c0)=""/154)
ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)})
fcntl$getflags(0xffffffffffffffff, 0x0)

22:53:28 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0)
sysinfo(&(0x7f00000007c0)=""/154)
ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)})
fcntl$getflags(0xffffffffffffffff, 0x0)

22:53:28 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0)
sysinfo(&(0x7f00000007c0)=""/154)
ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)})
fcntl$getflags(0xffffffffffffffff, 0x0)

[  199.020607] IPVS: ftp: loaded support on port[0] = 21
22:53:28 executing program 2:
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x55}}, 0x0, 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)

22:53:28 executing program 3:
socket$bt_rfcomm(0x1f, 0x3, 0x3)
setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000000)=0x63, 0x2)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
write$FUSE_BMAP(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x5}}, 0x18)
r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
lseek(r2, 0x20400000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
chmod(&(0x7f0000000200)='./file0\x00', 0x1)
ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000280))
write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f)
setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x1f, 0x1, 0x40, 0x6, 0x55d}, 0xc)
ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000640)=0x1000)
setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000002c0)=0x8, 0x4)
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000658000/0x3000)=nil)
openat$nullb(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nullb0\x00', 0x80000, 0x0)
madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8)

22:53:28 executing program 1:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_CLOCK(0xffffffffffffffff, 0x4030ae7b, &(0x7f0000000000)={0x2000ec3})
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000002a000/0x18000)=nil, 0x0, 0xfffffffffffffe49, 0x0, 0x0, 0xfed1)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl(0xffffffffffffffff, 0x0, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000002c0)={{}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4, 0x80000003f, 0x0, 0x1}})
ioctl$KVM_RUN(r2, 0xae80, 0x0)

22:53:28 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:28 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0)
sysinfo(&(0x7f00000007c0)=""/154)
ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)})
fcntl$getflags(0xffffffffffffffff, 0x0)

22:53:28 executing program 4:
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:28 executing program 4:
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:28 executing program 2:
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x63, 0x2)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
write$FUSE_BMAP(r1, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x5}}, 0x18)
r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
lseek(r3, 0x20400000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
chmod(&(0x7f0000000200)='./file0\x00', 0x1)
ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000280))
write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f)
setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x1f, 0x1, 0x40, 0x6, 0x55d}, 0xc)
getsockname$unix(r3, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000640)=0x1000)
setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000002c0)=0x8, 0x4)
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000658000/0x3000)=nil)
openat$nullb(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nullb0\x00', 0x80000, 0x0)
madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8)

[  199.424228] device nr0 entered promiscuous mode
22:53:28 executing program 0:

[  199.466621] *** Guest State ***
[  199.490748] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7
22:53:28 executing program 0:

[  199.532958] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
[  199.567282] CR3 = 0x00000000fffbc000
[  199.577388] RSP = 0x0000000000002000  RIP = 0x0000000000000000
22:53:29 executing program 0:

22:53:29 executing program 4:
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:29 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

[  199.587950] RFLAGS=0x00010002         DR7 = 0x0000000000000400
[  199.601398] Sysenter RSP=0000000000000f80 CS:RIP=0050:0000000000002810
22:53:29 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
lseek(r1, 0x20400000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f)
madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8)

[  199.655794] CS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  199.681111] DS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  199.718413] device nr0 entered promiscuous mode
[  199.728113] SS:   sel=0x0000, attr=0x04085, limit=0x00000000, base=0x0000000000000000
[  199.767126] ES:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  199.785789] FS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  199.805802] GS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  199.842853] GDTR:                           limit=0x00000000, base=0x0000000000000000
[  199.861613] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  199.870648] IDTR:                           limit=0x00000000, base=0x0000000000000000
[  199.878832] TR:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  199.887853] EFER =     0x0000000000000000  PAT = 0x0007040600070406
[  199.897790] DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
[  199.906232] Interruptibility = 00000000  ActivityState = 00000000
[  199.912688] *** Host State ***
[  199.916038] RIP = 0xffffffff8117477a  RSP = 0xffff888063497998
[  199.922476] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
[  199.929044] FSBase=00007f7c419a8700 GSBase=ffff8880aef00000 TRBase=fffffe0000034000
[  199.940460] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000
[  199.946525] CR0=0000000080050033 CR3=0000000080041000 CR4=00000000001426e0
[  199.953917] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff86201910
[  199.966110] EFER = 0x0000000000000d01  PAT = 0x0407050600070106
[  199.974723] *** Control State ***
[  199.980796] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000ca
[  199.987580] EntryControls=0000d1ff ExitControls=002fefff
[  199.999663] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000
[  200.014403] VMEntry: intr_info=8000030d errcode=00000000 ilen=00000000
[  200.027570] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001
[  200.039508]         reason=80000021 qualification=0000000000000000
22:53:29 executing program 1:

22:53:29 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:29 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(0x0, 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:29 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:29 executing program 3:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a)
write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600)

22:53:29 executing program 2:
r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x2, 0xfa0e, {0x0}}, 0xb)

[  200.046086] IDTVectoring: info=00000000 errcode=00000000
[  200.051688] TSC Offset = 0xffffff927a6433fc
[  200.056089] EPT pointer = 0x000000008fc5801e
22:53:29 executing program 1:

[  200.144034] device nr0 entered promiscuous mode
22:53:29 executing program 1:

[  200.169901] device nr0 entered promiscuous mode
22:53:29 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(0x0, 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:29 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:29 executing program 1:

22:53:29 executing program 1:

22:53:29 executing program 0:

22:53:29 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(0x0, 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

[  200.319453] device nr0 entered promiscuous mode
22:53:29 executing program 1:

22:53:29 executing program 0:

22:53:30 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(0x0, 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:30 executing program 2:

22:53:30 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
socket$kcm(0x29, 0x5, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:30 executing program 1:

22:53:30 executing program 0:

22:53:30 executing program 3:

22:53:30 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(0x0, 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:30 executing program 0:

22:53:30 executing program 3:

22:53:30 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(0x0, 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:30 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
socket$kcm(0x29, 0x5, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:30 executing program 2:

22:53:30 executing program 1:

22:53:30 executing program 3:

22:53:30 executing program 0:

22:53:30 executing program 2:

22:53:30 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, 0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:30 executing program 1:

22:53:30 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
socket$kcm(0x29, 0x5, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:30 executing program 3:

22:53:30 executing program 0:

22:53:30 executing program 2:

22:53:30 executing program 3:

22:53:30 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, 0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:30 executing program 1:

22:53:30 executing program 0:

22:53:30 executing program 2:

22:53:30 executing program 3:

22:53:30 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:30 executing program 2:

22:53:30 executing program 3:

22:53:30 executing program 1:

22:53:30 executing program 0:

22:53:30 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, 0x0)
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:30 executing program 0:

22:53:30 executing program 2:

22:53:30 executing program 3:

22:53:31 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:31 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:31 executing program 1:

22:53:31 executing program 3:

22:53:31 executing program 0:

22:53:31 executing program 2:

22:53:31 executing program 0:

22:53:31 executing program 3:

22:53:31 executing program 1:

22:53:31 executing program 0:

22:53:31 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:31 executing program 3:

22:53:31 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:31 executing program 2:

22:53:31 executing program 1:

22:53:31 executing program 3:

22:53:31 executing program 0:

22:53:31 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:31 executing program 1:

22:53:31 executing program 0:

22:53:31 executing program 3:

22:53:32 executing program 0:

22:53:32 executing program 2:

22:53:32 executing program 1:

[  202.610328] device nr0 entered promiscuous mode
22:53:32 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:32 executing program 3:

22:53:32 executing program 2:

22:53:32 executing program 0:

22:53:32 executing program 1:

22:53:32 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:33 executing program 0:

22:53:33 executing program 3:

22:53:33 executing program 2:

22:53:33 executing program 1:

[  203.564458] device nr0 entered promiscuous mode
22:53:33 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:33 executing program 3:

[  203.709053] device nr0 entered promiscuous mode
22:53:33 executing program 0:

22:53:33 executing program 1:

22:53:33 executing program 2:

22:53:33 executing program 3:
setresgid(0x0, 0xee00, 0x0)
getegid()
setgroups(0x1, &(0x7f0000000180)=[0x0])
setresuid(0x0, 0xfffe, 0xffffffffffffffff)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff)

22:53:33 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:33 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:33 executing program 0:
r0 = inotify_init()
r1 = open(&(0x7f0000000040)='./file0\x00', 0x400200c2, 0x0)
inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000082)
write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18}, 0x18)
write(r1, &(0x7f0000000180)='P', 0x1)

22:53:33 executing program 2:

22:53:33 executing program 1:

22:53:34 executing program 3:

[  204.578030] device nr0 entered promiscuous mode
22:53:34 executing program 1:

22:53:34 executing program 2:
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0)

22:53:34 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:34 executing program 3:
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x63, 0x2)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
lseek(r3, 0x20400000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
chmod(&(0x7f0000000200)='./file0\x00', 0x1)
ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000280))
write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f)
setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x1f, 0x1, 0x40, 0x6, 0x55d}, 0xc)
getsockname$unix(r3, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000640))
setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000002c0)=0x8, 0x4)
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000658000/0x3000)=nil)
openat$nullb(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8)

22:53:34 executing program 0:
r0 = socket(0xa, 0x1, 0x0)
setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108)

22:53:34 executing program 1:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(cipher_null)\x00'}, 0x58)

[  204.705308] device nr0 entered promiscuous mode
22:53:34 executing program 2:
ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xe01f0303, 0x0, &(0x7f0000000200))

22:53:34 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:34 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:34 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:34 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070")
r1 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0xffffff80, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff02}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0)

22:53:34 executing program 3:
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x63, 0x2)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
lseek(r3, 0x20400000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
chmod(&(0x7f0000000200)='./file0\x00', 0x1)
ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000280))
write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f)
setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x1f, 0x1, 0x40, 0x6, 0x55d}, 0xc)
getsockname$unix(r3, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000640))
setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000002c0)=0x8, 0x4)
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000658000/0x3000)=nil)
openat$nullb(0xffffffffffffff9c, 0x0, 0x80000, 0x0)
madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8)

[  205.478631] device nr0 entered promiscuous mode
[  205.529249] device nr0 entered promiscuous mode
22:53:35 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:35 executing program 2:
ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xe01f0303, 0x0, &(0x7f0000000200))

[  205.618850] device nr0 entered promiscuous mode
22:53:35 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:35 executing program 0:
socket$bt_rfcomm(0x1f, 0x3, 0x3)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
write$FUSE_BMAP(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x5}}, 0x18)
r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
lseek(r2, 0x20400000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
chmod(&(0x7f0000000200)='./file0\x00', 0x1)
ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000280))
write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f)
setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x1f, 0x1, 0x40, 0x6, 0x55d}, 0xc)
getsockname$unix(r2, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000640)=0x1000)
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000658000/0x3000)=nil)
madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8)

22:53:35 executing program 3:
r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0)
r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r0, &(0x7f0000000600)="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", 0x200)
ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000100)={0x2, 0x8000000000000, @local}, 0x10)
getpid()
sendfile(r0, r1, 0x0, 0x666d)

22:53:35 executing program 1:
mlockall(0x1)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c1261319bd070")

22:53:35 executing program 2:
ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xe01f0303, 0x0, &(0x7f0000000200))

[  205.805663] audit: type=1800 audit(1556232815.231:69): pid=9505 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=16887 res=0
22:53:35 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

[  205.940676] audit: type=1804 audit(1556232815.271:70): pid=9510 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir298713364/syzkaller.5qOVqv/130/file0" dev="sda1" ino=16887 res=1
22:53:35 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000000), 0x4)

22:53:35 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0)

22:53:35 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r0 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:35 executing program 2:
syz_execute_func(&(0x7f00000003c0)="410f01f964ff090f01d941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dccc4a180c6d100")
r0 = socket$inet6(0xa, 0x3, 0x20000000000ff)
connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c)
connect$inet6(r0, &(0x7f0000000200), 0x1c)
r1 = fcntl$dupfd(r0, 0x0, r0)
writev(r1, &(0x7f0000000080)=[{&(0x7f0000000240)="f2", 0x1}], 0x1)

22:53:35 executing program 0:
socket$bt_rfcomm(0x1f, 0x3, 0x3)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
write$FUSE_BMAP(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x5}}, 0x18)
r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
lseek(r2, 0x20400000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
chmod(&(0x7f0000000200)='./file0\x00', 0x1)
ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000280))
write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f)
setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x1f, 0x1, 0x40, 0x6, 0x55d}, 0xc)
getsockname$unix(r2, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000640)=0x1000)
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000658000/0x3000)=nil)
madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8)

22:53:35 executing program 1:
socket$bt_rfcomm(0x1f, 0x3, 0x3)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
write$FUSE_BMAP(r0, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x5}}, 0x18)
r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
lseek(r2, 0x20400000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
chmod(&(0x7f0000000200)='./file0\x00', 0x1)
ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000280))
write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f)
setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x1f, 0x1, 0x40, 0x6, 0x55d}, 0xc)
getsockname$unix(r2, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000640)=0x1000)
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000658000/0x3000)=nil)
madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8)

22:53:35 executing program 2:
prctl$PR_SET_MM_MAP(0x23, 0xf, &(0x7f0000000140)={&(0x7f0000ff2000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000001000/0x2000)=nil, &(0x7f0000008000/0xa000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000005000/0x1000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000fef000/0x11000)=nil, &(0x7f0000001000/0x1000)=nil, &(0x7f0000010000/0x3000)=nil, 0x0}, 0x68)

22:53:35 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r0 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:36 executing program 2:
r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0)
ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80044df9, &(0x7f0000000080))

22:53:36 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r0 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:36 executing program 0:
syz_emit_ethernet(0x2a, &(0x7f0000359fd5)={@link_local={0x1, 0x80, 0xc2, 0x400000000000000, 0x43050000}, @empty=[0x1c008848, 0x0, 0x14, 0x0, 0x0, 0x8847000000000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0)

22:53:36 executing program 3:
timer_create(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0)

22:53:36 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070")
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4)
setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000240)='ip6gretap0\x00', 0x10)
connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10)
setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x6, 0x7f}, 0x14)
setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f000000cbc0), 0x4)
sendto(r1, &(0x7f0000001400)="d0", 0x1, 0x0, 0x0, 0x0)
sendto(r1, &(0x7f00000000c0)="06", 0x1, 0x0, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0)
close(r1)

[  206.748497] audit: type=1326 audit(1556232816.171:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9571 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0x0
22:53:36 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, 0x0, 0x0, 0x0)

22:53:36 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:36 executing program 0:
r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
keyctl$update(0x2, r0, &(0x7f0000000440)="c0", 0x1)
syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x0)

22:53:36 executing program 2:
futex(&(0x7f0000000180)=0x2, 0x8b, 0x2, &(0x7f00000001c0)={0x0, 0x989680}, 0x0, 0x0)

22:53:36 executing program 1:
perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x1, 0x0, 0x10001, 0x8000, 0x0, 0x2b, 0x2002, 0x1, 0x9, 0x40, 0xbb, 0x2, 0x9, 0x5fd, 0xff, 0xa55, 0x1000, 0x9, 0x308a, 0xfffffffffffffffc, 0x2, 0x5, 0xa4b, 0x1, 0x10000, 0x41e, 0x2, 0x1, 0xffff, 0xfff, 0xffff, 0x7, 0x4, 0x8001, 0xfffffffffffffffe, 0xca, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240)}, 0xc000, 0xfab, 0x3f, 0x4, 0x8, 0x1, 0x1}, 0x0, 0x3, 0xffffffffffffff9c, 0xb)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='memory.events\x00', 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x2a5050ea)
recvmsg(0xffffffffffffffff, 0x0, 0x10000)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000780), 0x0, 0x1000000000}, 0x20)
openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0)
r2 = socket$kcm(0x29, 0x5, 0x0)
ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40002, 0x0)
write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:36 executing program 2:
r0 = socket$inet6(0xa, 0x1, 0x8010000000000084)
bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @empty}, 0x1c)
connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c)
setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, 0x8008000000056}, 0x98)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")

22:53:36 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = getpid()
perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x200, 0x80000000, 0x1, 0x2, 0x0, 0xff, 0x0, 0x4, 0x1, 0x0, 0xe5, 0x10001, 0x7, 0xff, 0x5, 0x8, 0x8001, 0x0, 0x8, 0x2, 0x6, 0x9, 0x0, 0x1ff, 0x800, 0x0, 0x80000001, 0x0, 0x2, 0x5, 0x80000000, 0x7, 0xec5, 0x800, 0x6, 0x8, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0x3}, 0x2, 0x8, 0x9, 0x7, 0x4, 0x3, 0x7}, r2, 0xd, r1, 0x2)
setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0xffff}, 0x8)
move_pages(0x0, 0x18f, &(0x7f0000000140), 0x0, &(0x7f00000002c0), 0x0)
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @loopback}, {0x20000000304, @broadcast}, 0x0, {0x2, 0x0, @empty}, 'ip6gre0\x00'})

[  207.372485] device nr0 entered promiscuous mode
[  207.392481] device nr0 entered promiscuous mode
[  207.561202] audit: type=1326 audit(1556232816.991:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9571 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0x0
22:53:37 executing program 3:
perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x1, 0x0, 0x10001, 0x8000, 0x0, 0x2b, 0x2002, 0x1, 0x9, 0x40, 0xbb, 0x2, 0x9, 0x5fd, 0xff, 0xa55, 0x1000, 0x9, 0x308a, 0xfffffffffffffffc, 0x2, 0x5, 0xa4b, 0x1, 0x10000, 0x41e, 0x2, 0x1, 0xffff, 0xfff, 0xffff, 0x7, 0x4, 0x8001, 0xfffffffffffffffe, 0xca, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240)}, 0xc000, 0xfab, 0x3f, 0x4, 0x8, 0x1, 0x1}, 0x0, 0x3, 0xffffffffffffff9c, 0xb)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='memory.events\x00', 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x2a5050ea)
recvmsg(0xffffffffffffffff, 0x0, 0x10000)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000780), 0x0, 0x1000000000}, 0x20)
openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0)
r2 = socket$kcm(0x29, 0x5, 0x0)
ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40002, 0x0)
write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:37 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, 0x0, 0x0, 0x0)

22:53:37 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:37 executing program 1:
perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x1, 0x0, 0x10001, 0x8000, 0x0, 0x2b, 0x2002, 0x1, 0x9, 0x40, 0xbb, 0x2, 0x9, 0x5fd, 0xff, 0xa55, 0x1000, 0x9, 0x308a, 0xfffffffffffffffc, 0x2, 0x5, 0xa4b, 0x1, 0x10000, 0x41e, 0x2, 0x1, 0xffff, 0xfff, 0xffff, 0x7, 0x4, 0x8001, 0xfffffffffffffffe, 0xca, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240)}, 0xc000, 0xfab, 0x3f, 0x4, 0x8, 0x1, 0x1}, 0x0, 0x3, 0xffffffffffffff9c, 0xb)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='memory.events\x00', 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x2a5050ea)
recvmsg(0xffffffffffffffff, 0x0, 0x10000)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000780), 0x0, 0x1000000000}, 0x20)
openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0)
r2 = socket$kcm(0x29, 0x5, 0x0)
ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40002, 0x0)
write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:37 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = getpid()
perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x200, 0x80000000, 0x1, 0x2, 0x0, 0xff, 0x0, 0x4, 0x1, 0x0, 0xe5, 0x10001, 0x7, 0xff, 0x5, 0x8, 0x8001, 0x0, 0x8, 0x2, 0x6, 0x9, 0x0, 0x1ff, 0x800, 0x0, 0x80000001, 0x0, 0x2, 0x5, 0x80000000, 0x7, 0xec5, 0x800, 0x6, 0x8, 0x0, 0x0, 0x6, @perf_config_ext={0x9, 0x3}, 0x2, 0x8, 0x9, 0x7, 0x4, 0x3, 0x7}, r2, 0xd, r1, 0x2)
setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x0, 0xffff}, 0x8)
move_pages(0x0, 0x18f, &(0x7f0000000140), 0x0, &(0x7f00000002c0), 0x0)
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @loopback}, {0x20000000304, @broadcast}, 0x0, {0x2, 0x0, @empty}, 'ip6gre0\x00'})

22:53:37 executing program 2:
perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x1, 0x0, 0x10001, 0x8000, 0x0, 0x2b, 0x2002, 0x1, 0x9, 0x40, 0xbb, 0x2, 0x9, 0x5fd, 0xff, 0xa55, 0x1000, 0x9, 0x308a, 0xfffffffffffffffc, 0x2, 0x5, 0xa4b, 0x1, 0x10000, 0x41e, 0x2, 0x1, 0xffff, 0xfff, 0xffff, 0x7, 0x4, 0x8001, 0xfffffffffffffffe, 0xca, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240)}, 0xc000, 0xfab, 0x3f, 0x4, 0x8, 0x1, 0x1}, 0x0, 0x3, 0xffffffffffffff9c, 0xb)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='memory.events\x00', 0x0, 0x0)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x2a5050ea)
recvmsg(0xffffffffffffffff, 0x0, 0x10000)
bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000780), 0x0, 0x1000000000}, 0x20)
openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0)
r2 = socket$kcm(0x29, 0x5, 0x0)
ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40002, 0x0)
write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:37 executing program 0:
r0 = socket(0x10, 0x400000000080803, 0x0)
write(r0, &(0x7f0000000080)="240000001a0025f00485bc04fef7001d0a0b49ffed090000000028000800030001000000", 0x24)

22:53:37 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, 0x0, 0x0, 0x0)

22:53:37 executing program 0:
clone(0x2302001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x1000000018)
ptrace$cont(0x18, r0, 0x0, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x7, 0xca})
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x1f, r0, 0x0, 0x0)

[  207.795942] device nr0 entered promiscuous mode
[  207.809189] device nr0 entered promiscuous mode
[  207.821057] device nr0 entered promiscuous mode
[  207.842433] device nr0 entered promiscuous mode
22:53:37 executing program 2:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x800000000050000}]})
r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
ioctl$sock_FIOSETOWN(r0, 0x8901, 0x0)

22:53:37 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140), 0x0, 0x0)

22:53:37 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7)
ioctl$KVM_NMI(r2, 0xae9a)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)

22:53:37 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x78, 0x0, [0x4b564d02, 0x3, 0xc1]})

22:53:37 executing program 1:
connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000080)={0xf0003})
setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0)

[  208.089764] kvm: emulating exchange as write
[  208.130011] kvm [9659]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0
22:53:37 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140), 0x0, 0x0)

22:53:37 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:37 executing program 2:
r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3)
setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x63, 0x2)
openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$CAPI_GET_FLAGS(0xffffffffffffffff, 0x80044323, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
write$FUSE_BMAP(r1, &(0x7f0000000380)={0x18, 0x0, 0x4, {0x5}}, 0x18)
r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00')
lseek(r3, 0x20400000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4)
chmod(&(0x7f0000000200)='./file0\x00', 0x1)
ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000280))
write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x2000008f)
setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x1f, 0x1, 0x40, 0x6, 0x55d}, 0xc)
getsockname$unix(r3, &(0x7f00000000c0), &(0x7f0000000140)=0x6e)
ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000640)=0x1000)
setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000002c0)=0x8, 0x4)
mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000658000/0x3000)=nil)
openat$nullb(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nullb0\x00', 0x80000, 0x0)

22:53:37 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x80000018000})
syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff53, 0x0, 0x0, 0x0)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="21f0ee1a213b944f6c317df3f3"], 0x1)
syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0)

22:53:37 executing program 1:
connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000080)={0xf0003})
setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0)

22:53:37 executing program 0:
r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
keyctl$update(0x2, r0, &(0x7f0000000440)="c0", 0x1)
syz_open_dev$vcsa(0x0, 0x0, 0xae4fc)

22:53:37 executing program 4:
socket$nl_route(0x10, 0x3, 0x0)
memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0)
inotify_init()
syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0)
epoll_create1(0x0)
syz_open_procfs(0x0, &(0x7f0000000500)='mounts\x00')
pselect6(0x40, &(0x7f0000000000)={0x3}, 0x0, &(0x7f0000000140), 0x0, 0x0)

[  208.298724] device nr0 entered promiscuous mode
22:53:37 executing program 2:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0)
read(r0, &(0x7f0000000040)=""/11, 0xb)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100))
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000140)=0x100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c)
r2 = dup2(r1, r1)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64)
syz_execute_func(&(0x7f00000000c0)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d87312660fd2323e0f1110d4b842419dcccc")
ioctl$TCGETA(r2, 0x5405, &(0x7f0000000000))
fremovexattr(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="740800000052a1e406"])
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f00000003c0), 0x4)
dup2(r0, r2)
ioctl$EVIOCSREP(r2, 0x40084503, 0x0)

22:53:37 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:37 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070")
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x40000000, 0x0)
fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000080), 0x1, 0x1)
r1 = getpid()
ppoll(0x0, 0x0, 0x0, 0x0, 0x0)
ptrace(0x4206, r1)
tkill(r1, 0x9)

22:53:37 executing program 1:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$kcm(0x10, 0x0, 0x10)
sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)

22:53:37 executing program 4:
setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140), 0x4)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000003780)='memory.events\x00', 0x7a05, 0x1700)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5})
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x6f1f, 0x8001})
write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6)

22:53:37 executing program 0:
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0)
write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000080)={0x18}, 0x18)

[  208.484122] device nr0 entered promiscuous mode
22:53:38 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:38 executing program 0:
openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0)
r0 = socket$kcm(0xa, 0x100000000005, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x1000000e1)
ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)={r0})

[  208.786838] device nr0 entered promiscuous mode
22:53:38 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0)
syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x4840)

22:53:38 executing program 1:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0)
openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000440)='cgroup.type\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2})
r1 = socket$kcm(0x2b, 0x1, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4)
ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000000c0))
close(r0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)

22:53:38 executing program 0:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0)
read(r0, &(0x7f0000000040)=""/11, 0xb)
ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100))
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000140)=0x100000001, 0x4)
connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c)
r2 = dup2(r1, r1)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f00000003c0), 0x4)
dup2(r0, r2)
ioctl$EVIOCSREP(r2, 0x40084503, 0x0)

22:53:38 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

[  209.178517] device nr0 entered promiscuous mode
22:53:38 executing program 2:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x80000018000})
syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff53, 0x0, 0x0, 0x0)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="21f0ee1a213b944f6c317d"], 0x1)
syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9)

22:53:38 executing program 4:
setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140), 0x4)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000003780)='memory.events\x00', 0x7a05, 0x1700)
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5})
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x6f1f, 0x8001})
write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6)

22:53:38 executing program 3:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000500)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xf7\xe9#\x00'})
connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10)
ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @broadcast}, 0x5, {0x2, 0x0, @local}, 'vlan0\x00'})

22:53:38 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:38 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:38 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070")
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000002c0))

22:53:38 executing program 1:
perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x10, 0x802, 0x0)
sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="240000002a0007021dfffd946fa2830020200a00050000000003fffff00000000000ff7e", 0x24}], 0x1}, 0x0)

22:53:39 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, 0x0)

22:53:39 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:39 executing program 4:
fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0)
r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00')
clock_nanosleep(0x6, 0x1, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0)
openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x22000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = inotify_init()
write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0)
inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe)
r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
fcntl$setown(r0, 0x8, 0x0)
socket$inet6(0xa, 0x80000, 0x3ff)
dup2(r2, r1)
syz_genetlink_get_family_id$team(0x0)

22:53:39 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000))
openat$cgroup_ro(r0, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xe01f0303, 0x0, &(0x7f0000000200))

22:53:39 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:39 executing program 1:
r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x0, 0x0)
r1 = dup(r0)
ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000100))

22:53:39 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0)
ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0)
dup3(r0, r1, 0x80000)
sendmsg$key(0xffffffffffffffff, 0x0, 0x0)

22:53:39 executing program 4:
fsetxattr(0xffffffffffffffff, &(0x7f0000000180)=@known='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0)
r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00')
clock_nanosleep(0x6, 0x1, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0)
openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x22000, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = inotify_init()
write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0)
inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe)
r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0)
fcntl$setown(r0, 0x8, 0x0)
socket$inet6(0xa, 0x80000, 0x3ff)
dup2(r2, r1)
syz_genetlink_get_family_id$team(0x0)

22:53:39 executing program 2:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x80000018000})
syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff53, 0x0, 0x0, 0x0)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="21f0ee1a213b944f6c317d"], 0x1)
syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9)

[  210.065889] device nr0 entered promiscuous mode
22:53:39 executing program 4:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',group_id=', @ANYRESDEC=0x0])
read$FUSE(r0, &(0x7f0000000540), 0x1000)
write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0x0, 0x1}, 0x50)
mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0)
read$FUSE(r0, &(0x7f00000020c0), 0x1000)
write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}}}, 0x90)
openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0xc0002, 0x135)

22:53:39 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

22:53:39 executing program 3:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0)
r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r0, r1, 0x0, 0x666d)

22:53:39 executing program 4:
r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0)
ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80044dfb, &(0x7f0000000080))

[  210.291958] device nr0 entered promiscuous mode
[  210.307728] audit: type=1800 audit(1556232819.731:73): pid=9840 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.3" name="file0" dev="sda1" ino=16913 res=0
22:53:39 executing program 1:
r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
openat$cgroup_int(r0, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x1a0}])

22:53:39 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

[  210.442868] audit: type=1804 audit(1556232819.731:74): pid=9840 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir298713364/syzkaller.5qOVqv/139/file0" dev="sda1" ino=16913 res=1
[  210.501169] device nr0 entered promiscuous mode
22:53:39 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000))
openat$cgroup_ro(r0, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xe01f0303, 0x0, &(0x7f0000000200))

22:53:39 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0)
read(r0, &(0x7f00000000c0)=""/8, 0x10f)
ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc))
read(r0, 0x0, 0x0)
r1 = syz_open_pts(r0, 0x0)
dup2(r0, r1)

22:53:39 executing program 2:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x80000018000})
syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff53, 0x0, 0x0, 0x0)
setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="21f0ee1a213b944f6c317d"], 0x1)
syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9)

22:53:40 executing program 5:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000240)=0x1)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

[  210.575157] Dev loop1: unable to read RDB block 1
[  210.588002]  loop1: unable to read partition table
[  210.594432] loop1: partition table beyond EOD, truncated
[  210.600134] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
22:53:40 executing program 4:

22:53:40 executing program 3:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0)
r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
write(r0, &(0x7f0000000600)="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", 0x200)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendfile(r0, r1, 0x0, 0x666d)

[  210.958274] syz-executor.3 (9840) used greatest stack depth: 23904 bytes left
[  428.002011] INFO: task syz-executor.0:6946 blocked for more than 140 seconds.
[  428.009563]       Not tainted 4.14.113 #3
[  428.014302] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  428.022865] syz-executor.0  D24992  6946      1 0x00000004
[  428.028658] Call Trace:
[  428.031293]  __schedule+0x7be/0x1cf0
[  428.035007]  ? __mutex_lock+0x737/0x1470
[  428.039050]  ? pci_mmcfg_check_reserved+0x150/0x150
[  428.044106]  schedule+0x92/0x1c0
[  428.047472]  schedule_preempt_disabled+0x13/0x20
[  428.052325]  __mutex_lock+0x73c/0x1470
[  428.056203]  ? blkdev_reread_part+0x1f/0x40
[  428.060577]  ? mutex_trylock+0x1c0/0x1c0
[  428.064628]  ? _raw_spin_unlock_irqrestore+0xa4/0xe0
[  428.069891]  ? __wake_up_common_lock+0xe3/0x160
[  428.074650]  ? _raw_spin_unlock_irqrestore+0x6b/0xe0
[  428.079752]  mutex_lock_nested+0x16/0x20
[  428.084049]  ? mutex_lock_nested+0x16/0x20
[  428.088273]  blkdev_reread_part+0x1f/0x40
[  428.092461]  loop_reread_partitions+0x7c/0x90
[  428.097209]  loop_clr_fd+0x844/0xae0
[  428.100962]  lo_ioctl+0x8d0/0x1c70
[  428.104496]  ? loop_probe+0x160/0x160
[  428.108279]  blkdev_ioctl+0x983/0x1880
[  428.112255]  ? blkpg_ioctl+0x980/0x980
[  428.116152]  ? __might_sleep+0x93/0xb0
[  428.120096]  block_ioctl+0xde/0x120
[  428.123721]  ? blkdev_fallocate+0x3b0/0x3b0
[  428.128031]  do_vfs_ioctl+0x7b9/0x1070
[  428.131970]  ? selinux_file_mprotect+0x5d0/0x5d0
[  428.136721]  ? ioctl_preallocate+0x1c0/0x1c0
[  428.141151]  ? putname+0xe0/0x120
[  428.144590]  ? do_sys_open+0x221/0x430
[  428.148458]  ? security_file_ioctl+0x83/0xc0
[  428.153339]  ? security_file_ioctl+0x8f/0xc0
[  428.157744]  SyS_ioctl+0x8f/0xc0
[  428.161173]  ? do_vfs_ioctl+0x1070/0x1070
[  428.165307]  do_syscall_64+0x1eb/0x630
[  428.169193]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  428.174085]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  428.179375] RIP: 0033:0x458c17
[  428.182591] RSP: 002b:00007ffd6efbd9b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  428.190302] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c17
[  428.197551] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003
[  428.204870] RBP: 000000000000014a R08: 0000000000000000 R09: 000000000000000a
[  428.212167] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000
[  428.219679] R13: 00007ffd6efbd9f0 R14: 0000000000033473 R15: 00007ffd6efbda00
[  428.227030] INFO: task syz-executor.5:6947 blocked for more than 140 seconds.
[  428.234316]       Not tainted 4.14.113 #3
[  428.238440] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  428.246490] syz-executor.5  D24992  6947      1 0x00000004
[  428.252131] Call Trace:
[  428.254712]  __schedule+0x7be/0x1cf0
[  428.258400]  ? __mutex_lock+0x737/0x1470
[  428.262494]  ? pci_mmcfg_check_reserved+0x150/0x150
[  428.267494]  schedule+0x92/0x1c0
[  428.270902]  schedule_preempt_disabled+0x13/0x20
[  428.275865]  __mutex_lock+0x73c/0x1470
[  428.279753]  ? lo_ioctl+0x87/0x1c70
[  428.283812]  ? lock_downgrade+0x6d0/0x6e0
[  428.287943]  ? mutex_trylock+0x1c0/0x1c0
[  428.292030]  ? avc_has_extended_perms+0x8ec/0xe40
[  428.296909]  ? putname+0xdb/0x120
[  428.300405]  ? avc_ss_reset+0x110/0x110
[  428.304365]  ? kasan_slab_free+0x75/0xc0
[  428.308407]  mutex_lock_nested+0x16/0x20
[  428.312492]  ? mutex_lock_nested+0x16/0x20
[  428.316708]  lo_ioctl+0x87/0x1c70
[  428.320189]  ? loop_probe+0x160/0x160
[  428.324121]  blkdev_ioctl+0x983/0x1880
[  428.327988]  ? blkpg_ioctl+0x980/0x980
[  428.331979]  ? __might_sleep+0x93/0xb0
[  428.336054]  block_ioctl+0xde/0x120
[  428.339658]  ? blkdev_fallocate+0x3b0/0x3b0
[  428.344029]  do_vfs_ioctl+0x7b9/0x1070
[  428.347904]  ? selinux_file_mprotect+0x5d0/0x5d0
[  428.352868]  ? ioctl_preallocate+0x1c0/0x1c0
[  428.357265]  ? putname+0xe0/0x120
[  428.360745]  ? do_sys_open+0x221/0x430
[  428.364630]  ? security_file_ioctl+0x83/0xc0
[  428.369196]  ? security_file_ioctl+0x8f/0xc0
[  428.373668]  SyS_ioctl+0x8f/0xc0
[  428.377025]  ? do_vfs_ioctl+0x1070/0x1070
[  428.381270]  do_syscall_64+0x1eb/0x630
[  428.385158]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  428.390011]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  428.395260] RIP: 0033:0x458c17
[  428.398427] RSP: 002b:00007ffc8be4f978 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  428.406252] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c17
[  428.413905] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003
[  428.421217] RBP: 0000000000000101 R08: 0000000000000000 R09: 000000000000000a
[  428.428483] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000
[  428.435788] R13: 00007ffc8be4f9b0 R14: 0000000000033609 R15: 00007ffc8be4f9c0
[  428.443098] INFO: task syz-executor.3:6948 blocked for more than 140 seconds.
[  428.450500]       Not tainted 4.14.113 #3
[  428.454635] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  428.462818] syz-executor.3  D24992  6948      1 0x00000004
[  428.468514] Call Trace:
[  428.471156]  __schedule+0x7be/0x1cf0
[  428.474858]  ? __mutex_lock+0x737/0x1470
[  428.478899]  ? pci_mmcfg_check_reserved+0x150/0x150
[  428.484014]  schedule+0x92/0x1c0
[  428.487422]  schedule_preempt_disabled+0x13/0x20
[  428.492365]  __mutex_lock+0x73c/0x1470
[  428.496248]  ? trace_hardirqs_on+0x10/0x10
[  428.500536]  ? lo_open+0x1d/0xb0
[  428.503902]  ? refcount_inc_not_zero+0x50/0xe0
[  428.508483]  ? mutex_trylock+0x1c0/0x1c0
[  428.512587]  ? find_held_lock+0x35/0x130
[  428.516651]  ? disk_get_part+0x9c/0x140
[  428.520669]  ? lock_downgrade+0x6e0/0x6e0
[  428.524812]  ? loop_unregister_transfer+0x90/0x90
[  428.529670]  mutex_lock_nested+0x16/0x20
[  428.533772]  ? mutex_lock_nested+0x16/0x20
[  428.538002]  lo_open+0x1d/0xb0
[  428.541648]  __blkdev_get+0x2c9/0x1120
[  428.545540]  ? __blkdev_put+0x7f0/0x7f0
[  428.549492]  ? bd_acquire+0x178/0x2c0
[  428.553319]  ? find_held_lock+0x35/0x130
[  428.557374]  blkdev_get+0xa8/0x8e0
[  428.561031]  ? bd_may_claim+0xd0/0xd0
[  428.564833]  ? _raw_spin_unlock+0x2d/0x50
[  428.568970]  blkdev_open+0x1d1/0x260
[  428.572726]  ? security_file_open+0x8f/0x1a0
[  428.577130]  do_dentry_open+0x73e/0xeb0
[  428.581139]  ? bd_acquire+0x2c0/0x2c0
[  428.584934]  vfs_open+0x105/0x230
[  428.588367]  path_openat+0x8bd/0x3f70
[  428.592201]  ? trace_hardirqs_on+0x10/0x10
[  428.596535]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  428.601240]  ? find_held_lock+0x35/0x130
[  428.605295]  ? __alloc_fd+0x1d4/0x4a0
[  428.609086]  do_filp_open+0x18e/0x250
[  428.612921]  ? may_open_dev+0xe0/0xe0
[  428.616726]  ? _raw_spin_unlock+0x2d/0x50
[  428.620919]  ? __alloc_fd+0x1d4/0x4a0
[  428.624770]  do_sys_open+0x2c5/0x430
[  428.628481]  ? filp_open+0x70/0x70
[  428.632227]  SyS_open+0x2d/0x40
[  428.635502]  ? do_sys_open+0x430/0x430
[  428.639519]  do_syscall_64+0x1eb/0x630
[  428.643438]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  428.648279]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  428.653497] RIP: 0033:0x412d20
[  428.656690] RSP: 002b:00007ffd3e631be8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  428.664481] RAX: ffffffffffffffda RBX: 000000000003380c RCX: 0000000000412d20
[  428.672280] RDX: 00007ffd3e631c7a RSI: 0000000000000002 RDI: 00007ffd3e631c70
[  428.679542] RBP: 0000000000000127 R08: 0000000000000000 R09: 000000000000000a
[  428.686844] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000
[  428.694140] R13: 00007ffd3e631c20 R14: 000000000003354e R15: 00007ffd3e631c30
[  428.701473] INFO: task syz-executor.2:6949 blocked for more than 140 seconds.
[  428.708733]       Not tainted 4.14.113 #3
[  428.712900] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  428.720892] syz-executor.2  D25168  6949      1 0x00000004
[  428.726577] Call Trace:
[  428.729169]  __schedule+0x7be/0x1cf0
[  428.732913]  ? __mutex_lock+0x737/0x1470
[  428.737081]  ? pci_mmcfg_check_reserved+0x150/0x150
[  428.742132]  schedule+0x92/0x1c0
[  428.745497]  schedule_preempt_disabled+0x13/0x20
[  428.750296]  __mutex_lock+0x73c/0x1470
[  428.754289]  ? lo_ioctl+0x87/0x1c70
[  428.757898]  ? lock_downgrade+0x6d0/0x6e0
[  428.762083]  ? mutex_trylock+0x1c0/0x1c0
[  428.766147]  ? avc_has_extended_perms+0x8ec/0xe40
[  428.771049]  ? putname+0xdb/0x120
[  428.774500]  ? avc_ss_reset+0x110/0x110
[  428.778625]  ? kasan_slab_free+0x75/0xc0
[  428.782750]  mutex_lock_nested+0x16/0x20
[  428.786814]  ? mutex_lock_nested+0x16/0x20
[  428.791080]  lo_ioctl+0x87/0x1c70
[  428.794526]  ? loop_probe+0x160/0x160
[  428.798471]  blkdev_ioctl+0x983/0x1880
[  428.803111]  ? blkpg_ioctl+0x980/0x980
[  428.807086]  ? __might_sleep+0x93/0xb0
[  428.811010]  block_ioctl+0xde/0x120
[  428.814630]  ? blkdev_fallocate+0x3b0/0x3b0
[  428.818931]  do_vfs_ioctl+0x7b9/0x1070
[  428.822846]  ? selinux_file_mprotect+0x5d0/0x5d0
[  428.827867]  ? ioctl_preallocate+0x1c0/0x1c0
[  428.832317]  ? putname+0xe0/0x120
[  428.835774]  ? do_sys_open+0x221/0x430
[  428.839643]  ? security_file_ioctl+0x83/0xc0
[  428.844075]  ? security_file_ioctl+0x8f/0xc0
[  428.848526]  SyS_ioctl+0x8f/0xc0
[  428.851925]  ? do_vfs_ioctl+0x1070/0x1070
[  428.856068]  do_syscall_64+0x1eb/0x630
[  428.859931]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  428.864876]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  428.870210] RIP: 0033:0x458c17
[  428.873545] RSP: 002b:00007ffec2bf72a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  428.881415] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c17
[  428.888876] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003
[  428.896206] RBP: 0000000000000145 R08: 0000000000000000 R09: 000000000000000a
[  428.903491] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000
[  428.910926] R13: 00007ffec2bf72e0 R14: 0000000000033470 R15: 00007ffec2bf72f0
[  428.918212] INFO: task syz-executor.4:6951 blocked for more than 140 seconds.
[  428.925521]       Not tainted 4.14.113 #3
[  428.929664] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  428.938108] syz-executor.4  D25168  6951      1 0x00000004
[  428.943754] Call Trace:
[  428.946335]  __schedule+0x7be/0x1cf0
[  428.950128]  ? __mutex_lock+0x737/0x1470
[  428.954188]  ? pci_mmcfg_check_reserved+0x150/0x150
[  428.959438]  schedule+0x92/0x1c0
[  428.962870]  schedule_preempt_disabled+0x13/0x20
[  428.967772]  __mutex_lock+0x73c/0x1470
[  428.971698]  ? lo_open+0x1d/0xb0
[  428.975058]  ? refcount_inc_not_zero+0x50/0xe0
[  428.979623]  ? mutex_trylock+0x1c0/0x1c0
[  428.983750]  ? exact_match+0xd/0x20
[  428.987457]  ? kobj_lookup+0x319/0x410
[  428.991373]  ? loop_unregister_transfer+0x90/0x90
[  428.996205]  mutex_lock_nested+0x16/0x20
[  429.000307]  ? mutex_lock_nested+0x16/0x20
[  429.004542]  lo_open+0x1d/0xb0
[  429.007727]  __blkdev_get+0xab1/0x1120
[  429.011656]  ? __blkdev_put+0x7f0/0x7f0
[  429.015623]  ? bd_acquire+0x178/0x2c0
[  429.019406]  ? find_held_lock+0x35/0x130
[  429.023508]  blkdev_get+0xa8/0x8e0
[  429.027045]  ? bd_may_claim+0xd0/0xd0
[  429.030885]  ? _raw_spin_unlock+0x2d/0x50
[  429.035023]  blkdev_open+0x1d1/0x260
[  429.038730]  ? security_file_open+0x8f/0x1a0
[  429.043592]  do_dentry_open+0x73e/0xeb0
[  429.047567]  ? bd_acquire+0x2c0/0x2c0
[  429.051411]  vfs_open+0x105/0x230
[  429.054858]  path_openat+0x8bd/0x3f70
[  429.058643]  ? trace_hardirqs_on+0x10/0x10
[  429.063485]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  429.068154]  ? find_held_lock+0x35/0x130
[  429.072242]  ? __alloc_fd+0x1d4/0x4a0
[  429.076035]  do_filp_open+0x18e/0x250
[  429.079970]  ? may_open_dev+0xe0/0xe0
[  429.083963]  ? _raw_spin_unlock+0x2d/0x50
[  429.088110]  ? __alloc_fd+0x1d4/0x4a0
[  429.091949]  do_sys_open+0x2c5/0x430
[  429.095661]  ? filp_open+0x70/0x70
[  429.099182]  SyS_open+0x2d/0x40
[  429.102506]  ? do_sys_open+0x430/0x430
[  429.106500]  do_syscall_64+0x1eb/0x630
[  429.110429]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  429.115270]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  429.120500] RIP: 0033:0x412d20
[  429.123703] RSP: 002b:00007ffce6052528 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  429.131450] RAX: ffffffffffffffda RBX: 0000000000033723 RCX: 0000000000412d20
[  429.138710] RDX: 00007ffce60525ba RSI: 0000000000000002 RDI: 00007ffce60525b0
[  429.146104] RBP: 0000000000000111 R08: 0000000000000000 R09: 000000000000000a
[  429.153392] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000
[  429.160697] R13: 00007ffce6052560 R14: 00000000000336b6 R15: 00007ffce6052570
[  429.167988] INFO: task syz-executor.1:9852 blocked for more than 140 seconds.
[  429.175292]       Not tainted 4.14.113 #3
[  429.179427] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  429.187423] syz-executor.1  D26272  9852   6950 0x00000004
[  429.193840] Call Trace:
[  429.196421]  __schedule+0x7be/0x1cf0
[  429.200163]  ? __mutex_lock+0x737/0x1470
[  429.204218]  ? pci_mmcfg_check_reserved+0x150/0x150
[  429.209229]  schedule+0x92/0x1c0
[  429.212655]  schedule_preempt_disabled+0x13/0x20
[  429.217403]  __mutex_lock+0x73c/0x1470
[  429.221313]  ? trace_hardirqs_on+0x10/0x10
[  429.225608]  ? lo_release+0x84/0x1b0
[  429.229309]  ? save_trace+0x280/0x290
[  429.233137]  ? mutex_trylock+0x1c0/0x1c0
[  429.237190]  ? __blkdev_put+0x397/0x7f0
[  429.241195]  ? find_held_lock+0x35/0x130
[  429.245531]  ? __blkdev_put+0x397/0x7f0
[  429.249498]  ? loop_clr_fd+0xae0/0xae0
[  429.253410]  mutex_lock_nested+0x16/0x20
[  429.257450]  ? mutex_lock_nested+0x16/0x20
[  429.261694]  lo_release+0x84/0x1b0
[  429.265212]  ? loop_clr_fd+0xae0/0xae0
[  429.269097]  __blkdev_put+0x436/0x7f0
[  429.272946]  ? bd_set_size+0xb0/0xb0
[  429.276657]  ? wait_for_completion+0x420/0x420
[  429.281328]  blkdev_put+0x88/0x510
[  429.284864]  ? fcntl_setlk+0xb90/0xb90
[  429.288736]  ? blkdev_put+0x510/0x510
[  429.292584]  blkdev_close+0x8b/0xb0
[  429.296208]  __fput+0x277/0x7a0
[  429.299483]  ____fput+0x16/0x20
[  429.302807]  task_work_run+0x119/0x190
[  429.306698]  exit_to_usermode_loop+0x1da/0x220
[  429.311319]  do_syscall_64+0x4a9/0x630
[  429.315199]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  429.320816]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  429.326005] RIP: 0033:0x412b61
[  429.329172] RSP: 002b:00007f7c419a79f0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
[  429.336976] RAX: 0000000000000000 RBX: 00007f7c419a86d4 RCX: 0000000000412b61
[  429.344270] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005
[  429.351587] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c
[  429.358905] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000004
[  429.366206] R13: 0000000000000000 R14: 0000000000000005 R15: 00000000ffffffff
[  429.373649] INFO: task blkid:9851 blocked for more than 140 seconds.
[  429.380168]       Not tainted 4.14.113 #3
[  429.384298] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  429.392293] blkid           D28512  9851   6912 0x00000004
[  429.397927] Call Trace:
[  429.400577]  __schedule+0x7be/0x1cf0
[  429.404287]  ? __mutex_lock+0x737/0x1470
[  429.408333]  ? pci_mmcfg_check_reserved+0x150/0x150
[  429.413404]  schedule+0x92/0x1c0
[  429.416930]  schedule_preempt_disabled+0x13/0x20
[  429.421719]  __mutex_lock+0x73c/0x1470
[  429.425602]  ? lo_release+0x1e/0x1b0
[  429.429331]  ? mutex_trylock+0x1c0/0x1c0
[  429.433443]  ? blkdev_put+0x7b/0x510
[  429.437153]  ? blkdev_put+0x7b/0x510
[  429.441011]  ? loop_clr_fd+0xae0/0xae0
[  429.444893]  mutex_lock_nested+0x16/0x20
[  429.448947]  ? mutex_lock_nested+0x16/0x20
[  429.453822]  lo_release+0x1e/0x1b0
[  429.457419]  ? loop_clr_fd+0xae0/0xae0
[  429.461347]  __blkdev_put+0x436/0x7f0
[  429.465144]  ? bd_set_size+0xb0/0xb0
[  429.468981]  ? wait_for_completion+0x420/0x420
[  429.473700]  blkdev_put+0x88/0x510
[  429.477238]  ? fcntl_setlk+0xb90/0xb90
[  429.481227]  ? blkdev_put+0x510/0x510
[  429.485027]  blkdev_close+0x8b/0xb0
[  429.488634]  __fput+0x277/0x7a0
[  429.491948]  ____fput+0x16/0x20
[  429.495221]  task_work_run+0x119/0x190
[  429.499089]  exit_to_usermode_loop+0x1da/0x220
[  429.503696]  do_syscall_64+0x4a9/0x630
[  429.507579]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  429.512459]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  429.517643] RIP: 0033:0x7f67700f02b0
[  429.521391] RSP: 002b:00007ffc3ad09238 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  429.529097] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f67700f02b0
[  429.536399] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
[  429.543737] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001
[  429.551062] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000024bc030
[  429.558323] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005
[  429.565647] INFO: task blkid:9859 blocked for more than 140 seconds.
[  429.572150]       Not tainted 4.14.113 #3
[  429.576273] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  429.584718] blkid           D29040  9859   7155 0x00000004
[  429.590379] Call Trace:
[  429.592959]  __schedule+0x7be/0x1cf0
[  429.596664]  ? __mutex_lock+0x737/0x1470
[  429.600779]  ? pci_mmcfg_check_reserved+0x150/0x150
[  429.605850]  schedule+0x92/0x1c0
[  429.609208]  schedule_preempt_disabled+0x13/0x20
[  429.614006]  __mutex_lock+0x73c/0x1470
[  429.617888]  ? lo_ioctl+0x87/0x1c70
[  429.621698]  ? lock_downgrade+0x6d0/0x6e0
[  429.625844]  ? mutex_trylock+0x1c0/0x1c0
[  429.629941]  ? avc_has_extended_perms+0x8ec/0xe40
[  429.634991]  ? __might_fault+0x110/0x1d0
[  429.639056]  ? avc_ss_reset+0x110/0x110
[  429.643177]  mutex_lock_nested+0x16/0x20
[  429.647236]  ? mutex_lock_nested+0x16/0x20
[  429.651508]  lo_ioctl+0x87/0x1c70
[  429.654965]  ? loop_probe+0x160/0x160
[  429.658745]  blkdev_ioctl+0x983/0x1880
[  429.662656]  ? blkpg_ioctl+0x980/0x980
[  429.666597]  ? __might_sleep+0x93/0xb0
[  429.670532]  ? save_trace+0x290/0x290
[  429.674335]  block_ioctl+0xde/0x120
[  429.677951]  ? blkdev_fallocate+0x3b0/0x3b0
[  429.682334]  do_vfs_ioctl+0x7b9/0x1070
[  429.686211]  ? selinux_file_mprotect+0x5d0/0x5d0
[  429.691003]  ? ioctl_preallocate+0x1c0/0x1c0
[  429.695397]  ? lock_downgrade+0x6e0/0x6e0
[  429.699548]  ? security_file_ioctl+0x83/0xc0
[  429.704065]  ? security_file_ioctl+0x8f/0xc0
[  429.708519]  SyS_ioctl+0x8f/0xc0
[  429.712318]  ? do_vfs_ioctl+0x1070/0x1070
[  429.716483]  do_syscall_64+0x1eb/0x630
[  429.720712]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  429.725646]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  429.730889] RIP: 0033:0x7fadfe685347
[  429.734589] RSP: 002b:00007ffd57379368 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  429.742388] RAX: ffffffffffffffda RBX: 00000000013b0030 RCX: 00007fadfe685347
[  429.749654] RDX: 0000000000000000 RSI: 0000000000005331 RDI: 0000000000000003
[  429.757042] RBP: 0000000000000003 R08: 00007fadfe9355a0 R09: 0000000000000008
[  429.764545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  429.771965] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005
[  429.779244] INFO: task blkid:9860 blocked for more than 140 seconds.
[  429.785931]       Not tainted 4.14.113 #3
[  429.790216] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  429.798257] blkid           D28400  9860   7136 0x00000004
[  429.803999] Call Trace:
[  429.806583]  __schedule+0x7be/0x1cf0
[  429.810329]  ? __mutex_lock+0x737/0x1470
[  429.814372]  ? pci_mmcfg_check_reserved+0x150/0x150
[  429.819369]  schedule+0x92/0x1c0
[  429.822773]  schedule_preempt_disabled+0x13/0x20
[  429.827602]  __mutex_lock+0x73c/0x1470
[  429.831564]  ? __mutex_unlock_slowpath+0x71/0x800
[  429.836416]  ? __blkdev_get+0x145/0x1120
[  429.840984]  ? mutex_trylock+0x1c0/0x1c0
[  429.845033]  ? exact_match+0xd/0x20
[  429.848704]  ? kobj_lookup+0x319/0x410
[  429.852676]  ? blkdev_ioctl+0x1880/0x1880
[  429.856822]  mutex_lock_nested+0x16/0x20
[  429.860969]  ? mutex_lock_nested+0x16/0x20
[  429.865245]  __blkdev_get+0x145/0x1120
[  429.869133]  ? __blkdev_put+0x7f0/0x7f0
[  429.873312]  ? bd_acquire+0x178/0x2c0
[  429.877286]  ? find_held_lock+0x35/0x130
[  429.881396]  blkdev_get+0xa8/0x8e0
[  429.884924]  ? bd_may_claim+0xd0/0xd0
[  429.888709]  ? _raw_spin_unlock+0x2d/0x50
[  429.892922]  blkdev_open+0x1d1/0x260
[  429.896629]  ? security_file_open+0x8f/0x1a0
[  429.901327]  do_dentry_open+0x73e/0xeb0
[  429.905352]  ? bd_acquire+0x2c0/0x2c0
[  429.909151]  vfs_open+0x105/0x230
[  429.912674]  path_openat+0x8bd/0x3f70
[  429.916471]  ? trace_hardirqs_on+0x10/0x10
[  429.920770]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  429.925436]  ? find_held_lock+0x35/0x130
[  429.929490]  ? __alloc_fd+0x1d4/0x4a0
[  429.933357]  do_filp_open+0x18e/0x250
[  429.937145]  ? may_open_dev+0xe0/0xe0
[  429.940980]  ? _raw_spin_unlock+0x2d/0x50
[  429.945118]  ? __alloc_fd+0x1d4/0x4a0
[  429.949002]  do_sys_open+0x2c5/0x430
[  429.952792]  ? filp_open+0x70/0x70
[  429.956332]  SyS_open+0x2d/0x40
[  429.959697]  ? do_sys_open+0x430/0x430
[  429.963717]  do_syscall_64+0x1eb/0x630
[  429.967593]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  429.972884]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  429.978066] RIP: 0033:0x7f73c3bd6120
[  429.981980] RSP: 002b:00007fff13d63198 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  429.989684] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f73c3bd6120
[  429.997021] RDX: 00007fff13d63f41 RSI: 0000000000000000 RDI: 00007fff13d63f41
[  430.004306] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000
[  430.011750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000002387030
[  430.019012] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005
[  430.026340] INFO: task blkid:9861 blocked for more than 140 seconds.
[  430.032843]       Not tainted 4.14.113 #3
[  430.036964] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  430.044950] blkid           D27744  9861   6911 0x00000004
[  430.050618] Call Trace:
[  430.053287]  __schedule+0x7be/0x1cf0
[  430.057134]  ? __mutex_lock+0x737/0x1470
[  430.061248]  ? pci_mmcfg_check_reserved+0x150/0x150
[  430.066261]  schedule+0x92/0x1c0
[  430.069611]  schedule_preempt_disabled+0x13/0x20
[  430.074411]  __mutex_lock+0x73c/0x1470
[  430.078303]  ? lo_open+0x1d/0xb0
[  430.081735]  ? refcount_inc_not_zero+0x50/0xe0
[  430.086320]  ? mutex_trylock+0x1c0/0x1c0
[  430.090416]  ? exact_match+0xd/0x20
[  430.094035]  ? kobj_lookup+0x319/0x410
[  430.097905]  ? loop_unregister_transfer+0x90/0x90
[  430.103225]  mutex_lock_nested+0x16/0x20
[  430.107277]  ? mutex_lock_nested+0x16/0x20
[  430.111552]  lo_open+0x1d/0xb0
[  430.114825]  __blkdev_get+0xab1/0x1120
[  430.118696]  ? __blkdev_put+0x7f0/0x7f0
[  430.122700]  ? bd_acquire+0x178/0x2c0
[  430.126494]  ? find_held_lock+0x35/0x130
[  430.130595]  blkdev_get+0xa8/0x8e0
[  430.134130]  ? bd_may_claim+0xd0/0xd0
[  430.137926]  ? _raw_spin_unlock+0x2d/0x50
[  430.142129]  blkdev_open+0x1d1/0x260
[  430.145836]  ? security_file_open+0x8f/0x1a0
[  430.150282]  do_dentry_open+0x73e/0xeb0
[  430.154254]  ? bd_acquire+0x2c0/0x2c0
[  430.158038]  vfs_open+0x105/0x230
[  430.161661]  path_openat+0x8bd/0x3f70
[  430.165461]  ? trace_hardirqs_on+0x10/0x10
[  430.169679]  ? path_lookupat.isra.0+0x7b0/0x7b0
[  430.174375]  ? find_held_lock+0x35/0x130
[  430.178431]  ? __alloc_fd+0x1d4/0x4a0
[  430.182258]  do_filp_open+0x18e/0x250
[  430.186062]  ? may_open_dev+0xe0/0xe0
[  430.189854]  ? _raw_spin_unlock+0x2d/0x50
[  430.194119]  ? __alloc_fd+0x1d4/0x4a0
[  430.197924]  do_sys_open+0x2c5/0x430
[  430.201675]  ? filp_open+0x70/0x70
[  430.205257]  SyS_open+0x2d/0x40
[  430.208616]  ? do_sys_open+0x430/0x430
[  430.212552]  do_syscall_64+0x1eb/0x630
[  430.216433]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  430.221321]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  430.226510] RIP: 0033:0x7f8d9d593120
[  430.230895] RSP: 002b:00007ffffbfa3a98 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[  430.238607] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8d9d593120
[  430.246083] RDX: 00007ffffbfa4f41 RSI: 0000000000000000 RDI: 00007ffffbfa4f41
[  430.253364] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000
[  430.260667] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000017df030
[  430.268114] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005
[  430.275522] 
[  430.275522] Showing all locks held in the system:
[  430.281878] 1 lock held by khungtaskd/1008:
[  430.286322]  #0:  (tasklist_lock){.+.+}, at: [<ffffffff81486f98>] debug_show_all_locks+0x7f/0x21f
[  430.295476] 2 locks held by getty/6901:
[  430.299644]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>] ldsem_down_read+0x33/0x40
[  430.308361]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>] n_tty_read+0x1e6/0x17b0
[  430.317695] 2 locks held by getty/6902:
[  430.322125]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>] ldsem_down_read+0x33/0x40
[  430.330864]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>] n_tty_read+0x1e6/0x17b0
[  430.340196] 2 locks held by getty/6903:
[  430.344271]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>] ldsem_down_read+0x33/0x40
[  430.352975]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>] n_tty_read+0x1e6/0x17b0
[  430.362317] 2 locks held by getty/6904:
[  430.366273]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>] ldsem_down_read+0x33/0x40
[  430.374976]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>] n_tty_read+0x1e6/0x17b0
[  430.384367] 2 locks held by getty/6905:
[  430.388331]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>] ldsem_down_read+0x33/0x40
[  430.397032]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>] n_tty_read+0x1e6/0x17b0
[  430.406373] 2 locks held by getty/6906:
[  430.410378]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>] ldsem_down_read+0x33/0x40
[  430.419049]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>] n_tty_read+0x1e6/0x17b0
[  430.428359] 2 locks held by getty/6907:
[  430.432340]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff861b0323>] ldsem_down_read+0x33/0x40
[  430.441136]  #1:  (&ldata->atomic_read_lock){+.+.}, at: [<ffffffff8310c666>] n_tty_read+0x1e6/0x17b0
[  430.450608] 2 locks held by syz-executor.0/6946:
[  430.455353]  #0:  (loop_ctl_mutex/1){+.+.}, at: [<ffffffff8373cec7>] lo_ioctl+0x87/0x1c70
[  430.463709]  #1:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff82caa54f>] blkdev_reread_part+0x1f/0x40
[  430.472692] 1 lock held by syz-executor.5/6947:
[  430.477346]  #0:  (loop_ctl_mutex/1){+.+.}, at: [<ffffffff8373cec7>] lo_ioctl+0x87/0x1c70
[  430.485699] 2 locks held by syz-executor.3/6948:
[  430.490473]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a81c5>] __blkdev_get+0x145/0x1120
[  430.499240]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff8373663d>] lo_open+0x1d/0xb0
[  430.507333] 1 lock held by syz-executor.2/6949:
[  430.512019]  #0:  (loop_ctl_mutex/1){+.+.}, at: [<ffffffff8373cec7>] lo_ioctl+0x87/0x1c70
[  430.520573] 2 locks held by syz-executor.4/6951:
[  430.525322]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a81c5>] __blkdev_get+0x145/0x1120
[  430.534019]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff8373663d>] lo_open+0x1d/0xb0
[  430.542158] 3 locks held by syz-executor.1/9852:
[  430.546895]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a7936>] __blkdev_put+0xa6/0x7f0
[  430.555433]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff8373b1ee>] lo_release+0x1e/0x1b0
[  430.563958]  #2:  (loop_ctl_mutex#2){+.+.}, at: [<ffffffff8373b254>] lo_release+0x84/0x1b0
[  430.572516] 2 locks held by blkid/9851:
[  430.576474]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a7936>] __blkdev_put+0xa6/0x7f0
[  430.585095]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff8373b1ee>] lo_release+0x1e/0x1b0
[  430.593540] 1 lock held by blkid/9859:
[  430.597410]  #0:  (loop_ctl_mutex/1){+.+.}, at: [<ffffffff8373cec7>] lo_ioctl+0x87/0x1c70
[  430.605767] 1 lock held by blkid/9860:
[  430.609640]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a81c5>] __blkdev_get+0x145/0x1120
[  430.618362] 2 locks held by blkid/9861:
[  430.622356]  #0:  (&bdev->bd_mutex){+.+.}, at: [<ffffffff819a81c5>] __blkdev_get+0x145/0x1120
[  430.631083]  #1:  (loop_index_mutex){+.+.}, at: [<ffffffff8373663d>] lo_open+0x1d/0xb0
[  430.639172] 
[  430.640833] =============================================
[  430.640833] 
[  430.647881] NMI backtrace for cpu 0
[  430.651624] CPU: 0 PID: 1008 Comm: khungtaskd Not tainted 4.14.113 #3
[  430.658189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  430.667535] Call Trace:
[  430.670119]  dump_stack+0x138/0x19c
[  430.673738]  nmi_cpu_backtrace.cold+0x57/0x94
[  430.678210]  ? irq_force_complete_move.cold+0x7d/0x7d
[  430.683381]  nmi_trigger_cpumask_backtrace+0x141/0x189
[  430.688641]  arch_trigger_cpumask_backtrace+0x14/0x20
[  430.693813]  watchdog+0x5e7/0xb90
[  430.697247]  kthread+0x31c/0x430
[  430.700603]  ? hungtask_pm_notify+0x60/0x60
[  430.704989]  ? kthread_create_on_node+0xd0/0xd0
[  430.709639]  ret_from_fork+0x3a/0x50
[  430.713431] Sending NMI from CPU 0 to CPUs 1:
[  430.717957] NMI backtrace for cpu 1 skipped: idling at pc 0xffffffff861b0e02
[  430.725336] Kernel panic - not syncing: hung_task: blocked tasks
[  430.731476] CPU: 1 PID: 1008 Comm: khungtaskd Not tainted 4.14.113 #3
[  430.738064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  430.747485] Call Trace:
[  430.750061]  dump_stack+0x138/0x19c
[  430.753670]  panic+0x1f2/0x438
[  430.756836]  ? add_taint.cold+0x16/0x16
[  430.760791]  ? ___preempt_schedule+0x16/0x18
[  430.765181]  watchdog+0x5f8/0xb90
[  430.768616]  kthread+0x31c/0x430
[  430.771961]  ? hungtask_pm_notify+0x60/0x60
[  430.776288]  ? kthread_create_on_node+0xd0/0xd0
[  430.780937]  ret_from_fork+0x3a/0x50
[  430.786052] Kernel Offset: disabled
[  430.789688] Rebooting in 86400 seconds..