20d5338baf703797ee11a96b27a36006d8c808d590a20f6ac7b7a45d70d490fe8333b4be511ae2f939205c006b61d055a0b8c0777fcf613fcdeed84c33ef2de4928c4a44b8", 0xf7}, {&(0x7f0000000500)="1d7100c5e74de53a33bf75a2fa633679259db774c58d5cbf466c11a1fe4cbeddeb192b28a987", 0x26}, {&(0x7f0000000540)="296337da20130c32f41161055c4d29fcbf30c33e9a55ef3ec532f1f4a7c360daf35d1e172869bb2154d02b05", 0x2c}], 0x6}, 0x4000840) 16:46:12 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000140)=0x80) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c65302020776c616e300020776c616e300020776c616e30002076626f786e65743020656d316e6f64657620776c616e300020776c616e300020292a0a1fa1ace1d92ed1ec9465bec1510e8b1afedce00551e0c20ff0ecb3d4d8242c826cfc1eb5b6c228295974d9e77283745112d380b435204b8b7c5ccb67ce1d1f5dd9d4bc01c3a96108c6ca"], 0x57) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:13 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000140)=0x80) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c65302020776c616e300020776c616e300020776c616e30002076626f786e65743020656d316e6f64657620776c616e300020776c616e300020292a0a1fa1ace1d92ed1ec9465bec1510e8b1afedce00551e0c20ff0ecb3d4d8242c826cfc1eb5b6c228295974d9e77283745112d380b435204b8b7c5ccb67ce1d1f5dd9d4bc01c3a96108c6ca"], 0x57) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:13 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'vlan0\x00', @local}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000700)={'vlan0\x00', @random="37a655944a7e"}) [ 522.557618][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 522.600372][T14662] F2FS-fs (loop5): Unable to read 1th superblock [ 522.615715][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 522.627490][T14662] F2FS-fs (loop5): Unable to read 2th superblock 16:46:13 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) io_submit(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) 16:46:13 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x6234f84c1300dfcf, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x40}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x2}]}]}], {0x14}}, 0x70}}, 0x0) 16:46:13 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) [ 522.947675][T14676] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 16:46:13 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:13 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) io_submit(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) [ 523.087423][T14684] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 523.127552][T14684] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:46:13 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) io_submit(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) [ 523.193686][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 523.205226][T14681] F2FS-fs (loop5): Unable to read 1th superblock [ 523.253861][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 523.264292][T14684] EXT4-fs (sda1): Remounting filesystem read-only [ 523.272065][T14681] F2FS-fs (loop5): Unable to read 2th superblock 16:46:13 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) io_submit(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) 16:46:14 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) [ 523.432636][T14693] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 523.461940][T14693] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 523.524492][T14693] EXT4-fs (sda1): Remounting filesystem read-only 16:46:14 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:14 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x6234f84c1300dfcf, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x40}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x2}]}]}], {0x14}}, 0x70}}, 0x0) 16:46:14 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000140)=0x80) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c65302020776c616e300020776c616e300020776c616e30002076626f786e65743020656d316e6f64657620776c616e300020776c616e300020292a0a1fa1ace1d92ed1ec9465bec1510e8b1afedce00551e0c20ff0ecb3d4d8242c826cfc1eb5b6c228295974d9e77283745112d380b435204b8b7c5ccb67ce1d1f5dd9d4bc01c3a96108c6ca"], 0x57) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:14 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x5ad501, 0x0) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$PPPIOCSACTIVE(r3, 0x40107446, &(0x7f0000000040)) pwritev(r1, &(0x7f0000000200)=[{&(0x7f0000000140)="b9", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x5) ftruncate(r1, 0x8001) 16:46:14 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) io_submit(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) 16:46:14 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:14 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:14 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) io_submit(0x0, 0x0, 0x0) [ 524.154710][T14726] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 524.212300][T14726] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 524.220765][T14726] EXT4-fs (sda1): Remounting filesystem read-only 16:46:14 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000140)=0x80) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c65302020776c616e300020776c616e300020776c616e30002076626f786e65743020656d316e6f64657620776c616e300020776c616e300020292a0a1fa1ace1d92ed1ec9465bec1510e8b1afedce00551e0c20ff0ecb3d4d8242c826cfc1eb5b6c228295974d9e77283745112d380b435204b8b7c5ccb67ce1d1f5dd9d4bc01c3a96108c6ca"], 0x57) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:14 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20001, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0x6000}, 0x2a939, 0x0, 0xffffffff, 0x6, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x10, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1}, 0x3c) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000000b06010200bb3561228082e6561a6ac375a337f800000000000000000000000900020073797a300000000005000100ba890000"], 0x28}}, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000300)={0x0, 0x4, 0x4, 0xcb39cb3085a12e2, 0xffff01ef, {0x77359400}, {0x0, 0x2, 0x6, 0x80, 0x5, 0x5, "0d3f0c12"}, 0x3ff, 0x4, @planes=&(0x7f0000000240)={0x7, 0x6, @fd=r1, 0x10001}, 0xe7e9, 0x0, r2}) r3 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xff, 0x68800) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x10, 0x4, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r3}, 0x3c) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000180)=0x15) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f0000000100)) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r6 = socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f0000000040)={0x8, 0x6, 0xef, 0x10000, 0x1}) socket$unix(0x1, 0x5, 0x0) socket$unix(0x1, 0x1, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, r7) [ 524.436127][T14745] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 16:46:15 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:15 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x6234f84c1300dfcf, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x40}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x2}]}]}], {0x14}}, 0x70}}, 0x0) 16:46:15 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) 16:46:15 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000140)=0x80) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c65302020776c616e300020776c616e300020776c616e30002076626f786e65743020656d316e6f64657620776c616e300020776c616e300020292a0a1fa1ace1d92ed1ec9465bec1510e8b1afedce00551e0c20ff0ecb3d4d8242c826cfc1eb5b6c228295974d9e77283745112d380b435204b8b7c5ccb67ce1d1f5dd9d4bc01c3a96108c6ca"], 0x57) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:15 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:15 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000140)=0x80) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c65302020776c616e300020776c616e300020776c616e30002076626f786e65743020656d316e6f64657620776c616e300020776c616e300020292a0a1fa1ace1d92ed1ec9465bec1510e8b1afedce00551e0c20ff0ecb3d4d8242c826cfc1eb5b6c228295974d9e77283745112d380b435204b8b7c5ccb67ce1d1f5dd9d4bc01c3a96108c6ca"], 0x57) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:15 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, 0x0, 0x0) 16:46:16 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:16 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:16 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:16 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000140)=0x80) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c65302020776c616e300020776c616e300020776c616e30002076626f786e65743020656d316e6f64657620776c616e300020776c616e300020292a0a1fa1ace1d92ed1ec9465bec1510e8b1afedce00551e0c20ff0ecb3d4d8242c826cfc1eb5b6c228295974d9e77283745112d380b435204b8b7c5ccb67ce1d1f5dd9d4bc01c3a96108c6ca"], 0x57) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) [ 525.556536][T14771] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 525.585803][T14771] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 525.660314][T14771] EXT4-fs (sda1): Remounting filesystem read-only [ 526.112091][T14745] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 16:46:17 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, 0x0) 16:46:17 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:17 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000140)=0x80) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c65302020776c616e300020776c616e300020776c616e30002076626f786e65743020656d316e6f64657620776c616e300020776c616e300020292a0a1fa1ace1d92ed1ec9465bec1510e8b1afedce00551e0c20ff0ecb3d4d8242c826cfc1eb5b6c228295974d9e77283745112d380b435204b8b7c5ccb67ce1d1f5dd9d4bc01c3a96108c6ca"], 0x57) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:17 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)={{0x14}, [@NFT_MSG_NEWSET={0x48, 0x9, 0xa, 0x6234f84c1300dfcf, 0x0, 0x0, {}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x40}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x2}]}]}], {0x14}}, 0x70}}, 0x0) 16:46:17 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc}, 0x0, 0xb, 0xffffffffffffffff, 0x0) write$tun(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="05000000000000000000450000240000000000219178ac1e0001ac1414aa000000000401907804f426e6003237fb"], 0xfdef) io_setup(0x8, &(0x7f0000000000)) 16:46:17 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:18 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, 0x0) [ 527.447590][T14814] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option 16:46:18 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:18 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000140)=0x80) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c65302020776c616e300020776c616e300020776c616e30002076626f786e65743020656d316e6f64657620776c616e300020776c616e300020292a0a1fa1ace1d92ed1ec9465bec1510e8b1afedce00551e0c20ff0ecb3d4d8242c826cfc1eb5b6c228295974d9e77283745112d380b435204b8b7c5ccb67ce1d1f5dd9d4bc01c3a96108c6ca"], 0x57) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) [ 527.518202][T14814] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:46:18 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0, 0x0) [ 527.632644][T14814] EXT4-fs (sda1): Remounting filesystem read-only 16:46:18 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000140)=0x80) write$binfmt_script(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c65302020776c616e300020776c616e300020776c616e30002076626f786e65743020656d316e6f64657620776c616e300020776c616e300020292a0a1fa1ace1d92ed1ec9465bec1510e8b1afedce00551e0c20ff0ecb3d4d8242c826cfc1eb5b6c228295974d9e77283745112d380b435204b8b7c5ccb67ce1d1f5dd9d4bc01c3a96108c6ca"], 0x57) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:18 executing program 5 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:18 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 16:46:18 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:18 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) [ 528.177605][T14852] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option 16:46:18 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 528.262208][T14852] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 528.351772][T14852] EXT4-fs (sda1): Remounting filesystem read-only [ 528.455788][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 528.470812][T14863] F2FS-fs (loop5): Unable to read 1th superblock [ 528.485781][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 528.498168][T14863] F2FS-fs (loop5): Unable to read 2th superblock 16:46:19 executing program 4: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:19 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x8020003) 16:46:19 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:19 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:19 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:19 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) accept(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f0000000140)=0x80) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:20 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x8020003) [ 529.388423][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 529.399639][T14885] F2FS-fs (loop5): Unable to read 1th superblock [ 529.408583][T14883] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 529.494146][T14883] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 529.503071][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 529.531887][T14885] F2FS-fs (loop5): Unable to read 2th superblock 16:46:20 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) [ 529.555721][T14879] cgroup: fork rejected by pids controller in /syz5 [ 529.581999][T14883] EXT4-fs (sda1): Remounting filesystem read-only 16:46:20 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:20 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x8020003) 16:46:20 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0x2}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:20 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$packet(0x11, 0x0, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc), 0x26d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r2, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[]}}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000440)=ANY=[@ANYRES64=0x0, @ANYRES32, @ANYRES64, @ANYRESHEX=r3, @ANYRES64, @ANYRES64], 0x6, 0x0) r5 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a2, &(0x7f0000000180)={'\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) sendmsg$key(r5, 0x0, 0x0) gettid() memfd_create(&(0x7f00000002c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\xe7\x89\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xff\xff\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\xe8\xff\xff\xff\x00\x00\xb2N\x00', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) r6 = gettid() r7 = syz_open_dev$sg(0x0, 0x0, 0x40) writev(r7, &(0x7f0000000d00), 0x85de494ef80de7) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) getpid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r6, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000940)='/dev/dmmidi#\x00', 0x8001, 0x0) 16:46:21 executing program 1: syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:21 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:21 executing program 2: r0 = gettid() creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:21 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:21 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0x3}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:21 executing program 2: r0 = gettid() creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:21 executing program 1: syz_open_procfs(0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:21 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0x4}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:21 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:21 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r0 = socket$inet6(0xa, 0x3, 0x7) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = creat(0x0, 0x0) r5 = accept(r4, &(0x7f0000000240)=@rc={0x1f, @fixed}, &(0x7f00000002c0)=0x80) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000000)={r8}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000300)={r8, 0x596}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000200)=r8, 0x4) r9 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0xa30000, 0x4, 0x4, r9, 0x0, &(0x7f0000000140)={0x9a0901, 0x38, [], @string=&(0x7f0000000100)}}) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f00000001c0)={r10, 0x1, 0x0, 0x1000000000000}) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r12 = dup(r11) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8b1a, &(0x7f0000000040)='wlan0\x00') connect$inet6(r12, &(0x7f0000000000)={0xa, 0x4e22, 0x468, @mcast1, 0x7}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x2}, 0x0, 0x0, 0x1}, {{@in=@remote, 0x0, 0x33}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6, 0xfdc}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 16:46:21 executing program 2: r0 = gettid() creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:21 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0x5}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:21 executing program 1: syz_open_procfs(0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:22 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:22 executing program 0: mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:22 executing program 2: r0 = gettid() creat(&(0x7f0000000100)='./file0\x00', 0x10003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x1e, 0x1, @tid=r0}, &(0x7f00000000c0)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:22 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x10) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:22 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0x6}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:22 executing program 1: r0 = creat(0x0, 0x10) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:22 executing program 0: mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:22 executing program 2: gettid() creat(&(0x7f0000000100)='./file0\x00', 0x10003) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:23 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) uname(&(0x7f00000000c0)=""/118) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) 16:46:23 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0x7}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:23 executing program 1: r0 = creat(0x0, 0x10) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:23 executing program 2: gettid() perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:23 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) getpid() close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:23 executing program 0: mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:23 executing program 1: r0 = creat(0x0, 0x10) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:23 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0x8}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:23 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:23 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:23 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0x9}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:24 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:24 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:24 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0xa}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:24 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) getpid() close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:24 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:24 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r2 = accept$netrom(r1, &(0x7f0000000040)={{0x3, @rose}, [@bcast, @null, @netrom, @rose, @bcast, @rose, @netrom, @netrom]}, &(0x7f00000000c0)=0x48) getsockopt$IP_SET_OP_VERSION(r2, 0x1, 0x53, &(0x7f0000000100), &(0x7f0000000140)=0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84000, 0x0, 0x7ff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:46:24 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:25 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:25 executing program 4: syz_mount_image$hfsplus(&(0x7f0000000440)='hfsplus\x00', &(0x7f0000000480)='./file0\x00', 0xfb, 0x0, 0x0, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="8b"]) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14, 0x49, 0x1, {0x10, 0x200001, 0x6}}, 0x14) fsmount(r1, 0x1, 0xa) 16:46:25 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:25 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0xc}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:25 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:25 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:25 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) getpid() close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:25 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) [ 534.836757][T15993] hfsplus: unable to parse mount options 16:46:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:25 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) [ 535.136281][T15993] hfsplus: unable to parse mount options 16:46:25 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0x10}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:25 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:25 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x2000004e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffe, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='lp\x00', 0x3) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000580)=@llc={0x1a, 0x0, 0x8, 0x6, 0x0, 0x1, @remote}, 0x80, 0x0}, 0x450) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') sendmsg$kcm(r4, &(0x7f00000000c0)={&(0x7f0000000280)=@xdp={0x2c, 0xa, r2, 0x3f}, 0x80, 0x0}, 0x4000088) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8242}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000240), 0x13f698e4b9e296e3, 0x1f4, 0x0, 0xffffffffffffff06) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, 0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockopt$inet_sctp_SCTP_EVENTS(r6, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000180)=0xe) 16:46:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:26 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:26 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:26 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0x23}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:26 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:26 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:26 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:27 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:27 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0xb4}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) ioctl$BLKPG(r2, 0x4004092b, 0x0) r5 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futimesat(r5, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{}, {r6, r7/1000+30000}}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000599030000000500150006008178a80016000f000300e558f03003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1}, 0x0) 16:46:27 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:27 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:27 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) [ 536.788449][T16502] md0: error: bitmap file is already in use 16:46:27 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0, 0xff}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:46:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:27 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) getpid() r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000300)=0x6, 0x4) r3 = fanotify_init(0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x402440, 0x0) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000080)='.\x00', 0x2100000c) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='auxv\x00') fanotify_mark(r3, 0x105, 0x101b, r1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x112) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x40040, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 16:46:27 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:27 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:27 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:27 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x2, 0x0) 16:46:28 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1c}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x40000000909, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(0xffffffffffffffff, 0x0, 0x0) r2 = dup2(r0, r1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000600)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cfde47a110126616e608ceae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d4979e65199615607672c5995c9e79066e3ceb991601d4b8a6355ddc55368aa1938f1a25958737a63d7da119b71c4444cf18e38d2b30dbb21ad45e199815491be65cb154ad160c3b3ea8100cbb96a06f8b0dd4c6ad7ec5678f5900c32c2393f1d4010577a7ab0f26501c03a7c3e1d2104e948cd2a88309f748594f12bf72a1390327ba1", 0xca}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) tkill(0x0, 0xe) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @broadcast}}, 0x0, 0x0, 0x0, 0x0, "89419dd458db14a03ddc55e771082366fe437e271b37d43fc48d1e7f904a7b9d7c4ea59d1c9d77b12b9046400cff3abb084857ac53069bcbafa405396e7c8fda7607df4153737c58c33bb5dddbb3e668"}, 0xd8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x8, 0x7e, 0x7fff}, &(0x7f0000000240)=0x14) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000100)={{0x1f}, 'port0\x00', 0x93, 0x30820, 0x6, 0xfffffbff, 0x7fffffff, 0x0, 0x3, 0x0, 0x4, 0x6}) [ 537.476486][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 537.509972][T16639] F2FS-fs (loop5): Unable to read 1th superblock 16:46:28 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) [ 537.551890][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 537.564788][T16639] F2FS-fs (loop5): Unable to read 2th superblock 16:46:28 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x3, 0x0) 16:46:28 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:28 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r2}) sendmsg$NFNL_MSG_CTHELPER_GET(r3, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x140, 0x1, 0x9, 0xf01, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_TUPLE={0x38, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @empty}}}]}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x5}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x4}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x4}}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xa1}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @rand_addr="a31d027e43679c5aea0d2af14c1104d0"}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3}, @NFCTH_TUPLE={0x78, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e4800002c00056bd2e9fcf8c11a057d0e39e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) [ 538.012837][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 538.035455][T16677] F2FS-fs (loop5): Unable to read 1th superblock [ 538.042368][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 538.053531][T16677] F2FS-fs (loop5): Unable to read 2th superblock 16:46:28 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:29 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:29 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:29 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4, 0x0) 16:46:29 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r2}) sendmsg$NFNL_MSG_CTHELPER_GET(r3, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x140, 0x1, 0x9, 0xf01, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_TUPLE={0x38, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @empty}}}]}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x5}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x4}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x4}}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xa1}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @rand_addr="a31d027e43679c5aea0d2af14c1104d0"}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3}, @NFCTH_TUPLE={0x78, 0x2, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000180)="2e4800002c00056bd2e9fcf8c11a057d0e39e7c0ba1e67ab757d80648c63940000053582c140153e370907088000f01700d1bd41c63dd777723ec6082c45bb741613dae36b60af666626556259a9bb4fce87b512f9404ea68f9edb4f16c04713c5a2be0565a647ffb799acac7f8266544fd05da816f41797d23ebfae9fad2aa64326af33d7046c8e4b5f33a934821e55417ebff304fd", 0xfeb6}], 0x1}, 0x4c000) 16:46:29 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x8020003) 16:46:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:29 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) [ 538.643731][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 538.655111][T16808] F2FS-fs (loop5): Unable to read 1th superblock [ 538.667516][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 538.684236][T16808] F2FS-fs (loop5): Unable to read 2th superblock 16:46:29 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x8020003) 16:46:29 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:29 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40000, 0x0) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000040)={0xa, {0x5, 0x1, 0x8, 0x80000001}}) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x7, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, 0x0, 0xf0ffffff00000000}}], 0x500, 0x0, 0x0) io_setup(0x1a, &(0x7f0000000100)=0x0) io_getevents(r3, 0x7, 0x6, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000200)={0x0, 0x989680}) 16:46:29 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x5, 0x0) [ 539.125631][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 539.146127][T16935] F2FS-fs (loop5): Unable to read 1th superblock [ 539.152980][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:46:29 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x8020003) [ 539.171901][T16935] F2FS-fs (loop5): Unable to read 2th superblock 16:46:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:29 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:30 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x6, 0x0) 16:46:30 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x0, 0x0, 0x8020003) 16:46:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:30 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) [ 539.728329][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 539.760954][T17063] F2FS-fs (loop5): Unable to read 1th superblock [ 539.808142][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 539.819837][T17063] F2FS-fs (loop5): Unable to read 2th superblock 16:46:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x90b, 0x1) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x115484, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000080)={0x5, 0x6}) ioctl$USBDEVFS_DISCSIGNAL(r0, 0x8010550e, &(0x7f0000000280)={0x0, 0x0}) 16:46:30 executing program 3: prctl$PR_SET_MM(0x23, 0x0, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:30 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x0, 0x0, 0x8020003) 16:46:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:30 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:30 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x7, 0x0) 16:46:30 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e20, @rand_addr=0x3a9}, @in6={0xa, 0x4e22, 0x5, @loopback, 0x1}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e21, 0xe0000000, @dev={0xfe, 0x80, [], 0x30}, 0x1}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x800, @dev={0xfe, 0x80, [], 0x28}, 0x81}], 0x94) 16:46:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) [ 540.376478][T17190] F2FS-fs (loop5): Unable to read 1th superblock [ 540.402806][T17190] F2FS-fs (loop5): Unable to read 2th superblock 16:46:31 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x0, 0x0, 0x8020003) 16:46:31 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:31 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e20, @rand_addr=0x3a9}, @in6={0xa, 0x4e22, 0x5, @loopback, 0x1}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e21, 0xe0000000, @dev={0xfe, 0x80, [], 0x30}, 0x1}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x800, @dev={0xfe, 0x80, [], 0x28}, 0x81}], 0x94) 16:46:31 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x8, 0x0) [ 541.001620][T17327] F2FS-fs (loop5): Unable to read 1th superblock [ 541.037665][T17327] F2FS-fs (loop5): Unable to read 2th superblock 16:46:31 executing program 3: prctl$PR_SET_MM(0x23, 0x0, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) 16:46:31 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x0) 16:46:31 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:31 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e20, @rand_addr=0x3a9}, @in6={0xa, 0x4e22, 0x5, @loopback, 0x1}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e21, 0xe0000000, @dev={0xfe, 0x80, [], 0x30}, 0x1}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x800, @dev={0xfe, 0x80, [], 0x28}, 0x81}], 0x94) 16:46:31 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x9, 0x0) [ 541.422135][T17440] F2FS-fs (loop5): Unable to read 1th superblock 16:46:32 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x0) 16:46:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) [ 541.473782][T17440] F2FS-fs (loop5): Unable to read 2th superblock 16:46:32 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e20, @rand_addr=0x3a9}, @in6={0xa, 0x4e22, 0x5, @loopback, 0x1}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e21, 0xe0000000, @dev={0xfe, 0x80, [], 0x30}, 0x1}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e24, 0x800, @dev={0xfe, 0x80, [], 0x28}, 0x81}], 0x94) 16:46:32 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:32 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xa, 0x0) 16:46:32 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) [ 542.161639][T17575] F2FS-fs (loop5): Unable to read 1th superblock [ 542.184640][T17575] F2FS-fs (loop5): Unable to read 2th superblock 16:46:33 executing program 3: prctl$PR_SET_MM(0x23, 0x0, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:33 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x0) 16:46:33 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8800000) 16:46:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:33 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:33 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xc, 0x0) [ 542.591888][ T2625] print_req_error: 8 callbacks suppressed [ 542.591905][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 542.612612][T17687] F2FS-fs (loop5): Unable to read 1th superblock [ 542.626656][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:46:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 542.644023][T17687] F2FS-fs (loop5): Unable to read 2th superblock 16:46:33 executing program 1 (fault-call:2 fault-nth:0): r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:33 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:46:33 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:33 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x10, 0x0) 16:46:33 executing program 2 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 543.105483][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 543.121754][T17811] F2FS-fs (loop5): Unable to read 1th superblock [ 543.159423][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 543.170586][T17811] F2FS-fs (loop5): Unable to read 2th superblock [ 543.204828][T17818] FAULT_INJECTION: forcing a failure. [ 543.204828][T17818] name failslab, interval 1, probability 0, space 0, times 1 [ 543.307518][T17818] CPU: 0 PID: 17818 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 543.317491][T17818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.327563][T17818] Call Trace: [ 543.330910][T17818] dump_stack+0x197/0x210 [ 543.335365][T17818] should_fail.cold+0x5/0xf [ 543.339918][T17818] ? setup_fault_attr+0x1f0/0x1f0 [ 543.345051][T17818] ? ___might_sleep+0x163/0x2c0 [ 543.349952][T17818] __should_failslab+0xb7/0x100 [ 543.354861][T17818] should_failslab+0x9/0x14 [ 543.359403][T17818] __kmalloc+0x2e0/0x770 [ 543.363664][T17818] ? mark_held_locks+0xf0/0xf0 [ 543.368546][T17818] ? tomoyo_realpath_from_path+0xc5/0x660 [ 543.374306][T17818] tomoyo_realpath_from_path+0xc5/0x660 [ 543.379879][T17818] ? tomoyo_path_number_perm+0x193/0x520 [ 543.385581][T17818] tomoyo_path_number_perm+0x1dd/0x520 [ 543.391066][T17818] ? tomoyo_path_number_perm+0x193/0x520 [ 543.396758][T17818] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 543.402581][T17818] ? __f_unlock_pos+0x19/0x20 [ 543.407414][T17818] ? __fget_files+0x359/0x520 [ 543.412144][T17818] ? do_dup2+0x4f0/0x4f0 [ 543.416410][T17818] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 543.422718][T17818] ? fput_many+0x12c/0x1a0 [ 543.427270][T17818] tomoyo_file_ioctl+0x23/0x30 [ 543.432150][T17818] security_file_ioctl+0x77/0xc0 [ 543.437163][T17818] ksys_ioctl+0x56/0x180 [ 543.441451][T17818] __x64_sys_ioctl+0x73/0xb0 [ 543.446076][T17818] do_syscall_64+0xfa/0x790 [ 543.450618][T17818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.456531][T17818] RIP: 0033:0x45c479 [ 543.460446][T17818] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 543.480087][T17818] RSP: 002b:00007f1ebdbc2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 543.488522][T17818] RAX: ffffffffffffffda RBX: 00007f1ebdbc36d4 RCX: 000000000045c479 [ 543.496512][T17818] RDX: 0000000020000040 RSI: 0000000000008b1a RDI: 0000000000000004 [ 543.504499][T17818] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 543.512493][T17818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 543.520489][T17818] R13: 0000000000000417 R14: 00000000004d3058 R15: 0000000000000000 [ 543.534929][T17818] ERROR: Out of memory at tomoyo_realpath_from_path. 16:46:34 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:34 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:34 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:34 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:34 executing program 2 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:34 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x23, 0x0) 16:46:34 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x2, 0x0, 0x8020003) [ 543.819807][T17937] FAULT_INJECTION: forcing a failure. [ 543.819807][T17937] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 543.833068][T17937] CPU: 1 PID: 17937 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 543.842961][T17937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.853022][T17937] Call Trace: [ 543.856353][T17937] dump_stack+0x197/0x210 [ 543.860721][T17937] should_fail.cold+0x5/0xf [ 543.865255][T17937] ? setup_fault_attr+0x1f0/0x1f0 [ 543.870293][T17937] ? mark_lock+0xc2/0x1220 [ 543.874742][T17937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.881046][T17937] should_fail_alloc_page+0x50/0x60 [ 543.886261][T17937] __alloc_pages_nodemask+0x1a1/0x910 [ 543.891662][T17937] ? __alloc_pages_slowpath+0x2900/0x2900 [ 543.897410][T17937] ? mark_lock+0xc2/0x1220 [ 543.901838][T17937] ? aa_file_perm+0x601/0x1600 [ 543.906674][T17937] cache_grow_begin+0x90/0xc60 [ 543.911625][T17937] ? trace_hardirqs_off+0x62/0x240 16:46:34 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x2, 0x8020003) [ 543.916773][T17937] __kmalloc+0x6b2/0x770 [ 543.921045][T17937] ? mark_held_locks+0xf0/0xf0 [ 543.925824][T17937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 543.932110][T17937] ? tomoyo_realpath_from_path+0xc5/0x660 [ 543.937858][T17937] tomoyo_realpath_from_path+0xc5/0x660 [ 543.943420][T17937] ? tomoyo_path_number_perm+0x193/0x520 [ 543.949085][T17937] tomoyo_path_number_perm+0x1dd/0x520 [ 543.954556][T17937] ? tomoyo_path_number_perm+0x193/0x520 [ 543.960207][T17937] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 543.966025][T17937] ? __f_unlock_pos+0x19/0x20 [ 543.970790][T17937] ? __fget_files+0x359/0x520 [ 543.975519][T17937] ? do_dup2+0x4f0/0x4f0 [ 543.979780][T17937] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 543.986040][T17937] ? fput_many+0x12c/0x1a0 [ 543.990482][T17937] tomoyo_file_ioctl+0x23/0x30 [ 543.995269][T17937] security_file_ioctl+0x77/0xc0 [ 544.000228][T17937] ksys_ioctl+0x56/0x180 [ 544.004495][T17937] __x64_sys_ioctl+0x73/0xb0 [ 544.009109][T17937] do_syscall_64+0xfa/0x790 [ 544.013638][T17937] entry_SYSCALL_64_after_hwframe+0x49/0xbe 16:46:34 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x8, 0x8020003) [ 544.019541][T17937] RIP: 0033:0x45c479 [ 544.023444][T17937] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 544.043056][T17937] RSP: 002b:00007f1ebdbc2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 544.051496][T17937] RAX: ffffffffffffffda RBX: 00007f1ebdbc36d4 RCX: 000000000045c479 [ 544.059477][T17937] RDX: 0000000020000040 RSI: 0000000000008b1a RDI: 0000000000000004 16:46:34 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) [ 544.067457][T17937] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 544.075443][T17937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 544.083430][T17937] R13: 0000000000000417 R14: 00000000004d3058 R15: 0000000000000001 16:46:34 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:34 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xb4, 0x0) 16:46:35 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:35 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:35 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x2080, 0x8020003) 16:46:35 executing program 2 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:35 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:35 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf0, 0x0) 16:46:35 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:35 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x3f00, 0x8020003) [ 544.788562][T18186] FAULT_INJECTION: forcing a failure. [ 544.788562][T18186] name failslab, interval 1, probability 0, space 0, times 0 16:46:35 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:35 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) 16:46:35 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x8020, 0x8020003) 16:46:35 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x300, 0x0) [ 545.211022][T18186] CPU: 1 PID: 18186 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 545.220971][T18186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.231030][T18186] Call Trace: [ 545.234469][T18186] dump_stack+0x197/0x210 [ 545.238834][T18186] should_fail.cold+0x5/0xf [ 545.243417][T18186] ? setup_fault_attr+0x1f0/0x1f0 [ 545.248466][T18186] ? ___might_sleep+0x163/0x2c0 [ 545.253347][T18186] __should_failslab+0xb7/0x100 [ 545.258215][T18186] should_failslab+0x9/0x14 [ 545.262735][T18186] __kmalloc+0x2e0/0x770 [ 545.267014][T18186] ? lock_acquire+0x190/0x410 [ 545.271787][T18186] ? rtnl_lock+0x17/0x20 [ 545.276059][T18186] ? ioctl_standard_iw_point+0x3b2/0xc20 [ 545.281802][T18186] ioctl_standard_iw_point+0x3b2/0xc20 [ 545.287281][T18186] ? cfg80211_wext_giwessid+0x160/0x160 [ 545.292870][T18186] ? wireless_send_event+0xbb0/0xbb0 [ 545.298174][T18186] ? mutex_trylock+0x2d0/0x2d0 [ 545.303009][T18186] ? dev_load+0xb0/0x210 [ 545.307277][T18186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 545.313527][T18186] ? full_name_hash+0xc0/0x100 [ 545.318319][T18186] ioctl_standard_call+0x1aa/0x1d0 [ 545.323472][T18186] ? cfg80211_wext_giwessid+0x160/0x160 [ 545.329030][T18186] ? cfg80211_wext_giwessid+0x160/0x160 [ 545.334597][T18186] wireless_process_ioctl.constprop.0+0x236/0x2b0 [ 545.341029][T18186] ? ioctl_standard_iw_point+0xc20/0xc20 [ 545.346690][T18186] wext_handle_ioctl+0x106/0x1c0 [ 545.351649][T18186] ? call_commit_handler+0x10/0x10 [ 545.356780][T18186] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 545.363026][T18186] ? do_vfs_ioctl+0x568/0x13b0 [ 545.367784][T18186] ? ioctl_file_clone+0x180/0x180 [ 545.372806][T18186] sock_ioctl+0x47d/0x790 [ 545.377127][T18186] ? dlci_ioctl_set+0x40/0x40 [ 545.381794][T18186] ? fput_many+0x12c/0x1a0 [ 545.386241][T18186] ? tomoyo_file_ioctl+0x23/0x30 [ 545.391168][T18186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 545.397398][T18186] ? security_file_ioctl+0x8d/0xc0 [ 545.402496][T18186] ? dlci_ioctl_set+0x40/0x40 [ 545.407196][T18186] ksys_ioctl+0x123/0x180 [ 545.411529][T18186] __x64_sys_ioctl+0x73/0xb0 [ 545.416113][T18186] do_syscall_64+0xfa/0x790 [ 545.420637][T18186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.426518][T18186] RIP: 0033:0x45c479 [ 545.430400][T18186] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 545.449997][T18186] RSP: 002b:00007f1ebdbc2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 545.458409][T18186] RAX: ffffffffffffffda RBX: 00007f1ebdbc36d4 RCX: 000000000045c479 [ 545.466375][T18186] RDX: 0000000020000040 RSI: 0000000000008b1a RDI: 0000000000000004 [ 545.474347][T18186] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 545.482311][T18186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 545.490364][T18186] R13: 0000000000000417 R14: 00000000004d3058 R15: 0000000000000002 16:46:36 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:36 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) 16:46:36 executing program 2 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:36 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:36 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) [ 545.805460][T18350] FAULT_INJECTION: forcing a failure. [ 545.805460][T18350] name failslab, interval 1, probability 0, space 0, times 0 [ 545.853870][T18350] CPU: 0 PID: 18350 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 545.863936][T18350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.874021][T18350] Call Trace: [ 545.877343][T18350] dump_stack+0x197/0x210 [ 545.881815][T18350] should_fail.cold+0x5/0xf [ 545.886379][T18350] ? setup_fault_attr+0x1f0/0x1f0 [ 545.891438][T18350] ? cfg80211_mgd_wext_siwessid+0x401/0x520 [ 545.897355][T18350] ? find_held_lock+0x35/0x130 [ 545.902169][T18350] __should_failslab+0xb7/0x100 [ 545.907045][T18350] should_failslab+0x9/0x14 [ 545.911579][T18350] kmem_cache_alloc_node+0x56/0x740 [ 545.916799][T18350] ? lock_downgrade+0x920/0x920 [ 545.921679][T18350] ? fs_reclaim_release+0xf/0x30 [ 545.926737][T18350] __alloc_skb+0xd5/0x5e0 [ 545.931105][T18350] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 545.936693][T18350] ? wait_for_completion+0x440/0x440 [ 545.942082][T18350] wireless_send_event+0x1a6/0xbb0 [ 545.947253][T18350] ? rtnetlink_ifinfo_prep+0x3d0/0x3d0 [ 545.952776][T18350] ioctl_standard_iw_point+0xa8c/0xc20 [ 545.958259][T18350] ? cfg80211_wext_giwessid+0x160/0x160 [ 545.963848][T18350] ? wireless_send_event+0xbb0/0xbb0 [ 545.969160][T18350] ? mutex_trylock+0x2d0/0x2d0 [ 545.973945][T18350] ? dev_load+0xb0/0x210 [ 545.978213][T18350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 545.984473][T18350] ? full_name_hash+0xc0/0x100 [ 545.989282][T18350] ioctl_standard_call+0x1aa/0x1d0 [ 545.994439][T18350] ? cfg80211_wext_giwessid+0x160/0x160 [ 546.000004][T18350] ? cfg80211_wext_giwessid+0x160/0x160 [ 546.005584][T18350] wireless_process_ioctl.constprop.0+0x236/0x2b0 [ 546.012040][T18350] ? ioctl_standard_iw_point+0xc20/0xc20 [ 546.017709][T18350] wext_handle_ioctl+0x106/0x1c0 [ 546.022670][T18350] ? call_commit_handler+0x10/0x10 [ 546.027808][T18350] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 546.034067][T18350] ? do_vfs_ioctl+0x568/0x13b0 [ 546.038918][T18350] ? ioctl_file_clone+0x180/0x180 [ 546.044009][T18350] sock_ioctl+0x47d/0x790 [ 546.048387][T18350] ? dlci_ioctl_set+0x40/0x40 [ 546.053086][T18350] ? fput_many+0x12c/0x1a0 [ 546.057546][T18350] ? tomoyo_file_ioctl+0x23/0x30 [ 546.062540][T18350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 546.068818][T18350] ? security_file_ioctl+0x8d/0xc0 [ 546.073948][T18350] ? dlci_ioctl_set+0x40/0x40 [ 546.078654][T18350] ksys_ioctl+0x123/0x180 [ 546.083013][T18350] __x64_sys_ioctl+0x73/0xb0 [ 546.087632][T18350] do_syscall_64+0xfa/0x790 [ 546.092171][T18350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 546.098075][T18350] RIP: 0033:0x45c479 [ 546.102022][T18350] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 546.121649][T18350] RSP: 002b:00007f1ebdbc2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 546.130066][T18350] RAX: ffffffffffffffda RBX: 00007f1ebdbc36d4 RCX: 000000000045c479 [ 546.138158][T18350] RDX: 0000000020000040 RSI: 0000000000008b1a RDI: 0000000000000004 [ 546.146146][T18350] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 16:46:36 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x2000000, 0x8020003) [ 546.154132][T18350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 546.162134][T18350] R13: 0000000000000417 R14: 00000000004d3058 R15: 0000000000000003 16:46:36 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x2000208, 0x8020003) 16:46:37 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x20020, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:37 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x428, 0x0) 16:46:37 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:37 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x8000000, 0x8020003) 16:46:37 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:37 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:37 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x445, 0x0) 16:46:37 executing program 2 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:37 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) 16:46:37 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x8020002, 0x8020003) 16:46:37 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 547.056252][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 547.081657][T18576] F2FS-fs (loop5): Unable to read 1th superblock [ 547.091981][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:46:37 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) [ 547.122361][T18576] F2FS-fs (loop5): Unable to read 2th superblock [ 547.148206][ T27] audit: type=1800 audit(1583081197.786:88): pid=18584 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17278 res=0 16:46:37 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) 16:46:37 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x20800000, 0x8020003) [ 547.263158][T18581] FAULT_INJECTION: forcing a failure. [ 547.263158][T18581] name failslab, interval 1, probability 0, space 0, times 0 [ 547.338915][T18581] CPU: 1 PID: 18581 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 547.348862][T18581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.358929][T18581] Call Trace: [ 547.362253][T18581] dump_stack+0x197/0x210 [ 547.366617][T18581] should_fail.cold+0x5/0xf [ 547.371177][T18581] ? setup_fault_attr+0x1f0/0x1f0 [ 547.376222][T18581] ? cfg80211_mgd_wext_siwessid+0x401/0x520 [ 547.382135][T18581] ? find_held_lock+0x35/0x130 [ 547.386926][T18581] __should_failslab+0xb7/0x100 [ 547.391791][T18581] should_failslab+0x9/0x14 [ 547.396320][T18581] kmem_cache_alloc_node+0x56/0x740 [ 547.401527][T18581] ? lock_downgrade+0x920/0x920 [ 547.406397][T18581] ? fs_reclaim_release+0xf/0x30 [ 547.411411][T18581] __alloc_skb+0xd5/0x5e0 [ 547.415768][T18581] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 547.421338][T18581] ? wait_for_completion+0x440/0x440 [ 547.426669][T18581] wireless_send_event+0x1a6/0xbb0 [ 547.431814][T18581] ? rtnetlink_ifinfo_prep+0x3d0/0x3d0 16:46:38 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) [ 547.437309][T18581] ioctl_standard_iw_point+0xa8c/0xc20 [ 547.442817][T18581] ? cfg80211_wext_giwessid+0x160/0x160 [ 547.448389][T18581] ? wireless_send_event+0xbb0/0xbb0 [ 547.453732][T18581] ? mutex_trylock+0x2d0/0x2d0 [ 547.458522][T18581] ? dev_load+0xb0/0x210 [ 547.462819][T18581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.469072][T18581] ? full_name_hash+0xc0/0x100 [ 547.473864][T18581] ioctl_standard_call+0x1aa/0x1d0 [ 547.478991][T18581] ? cfg80211_wext_giwessid+0x160/0x160 [ 547.484554][T18581] ? cfg80211_wext_giwessid+0x160/0x160 [ 547.490129][T18581] wireless_process_ioctl.constprop.0+0x236/0x2b0 [ 547.496555][T18581] ? ioctl_standard_iw_point+0xc20/0xc20 [ 547.502212][T18581] wext_handle_ioctl+0x106/0x1c0 [ 547.507170][T18581] ? call_commit_handler+0x10/0x10 [ 547.512301][T18581] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 547.518561][T18581] ? do_vfs_ioctl+0x568/0x13b0 [ 547.523361][T18581] ? ioctl_file_clone+0x180/0x180 [ 547.528546][T18581] sock_ioctl+0x47d/0x790 [ 547.532903][T18581] ? dlci_ioctl_set+0x40/0x40 [ 547.537595][T18581] ? fput_many+0x12c/0x1a0 [ 547.542038][T18581] ? tomoyo_file_ioctl+0x23/0x30 [ 547.546993][T18581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.553246][T18581] ? security_file_ioctl+0x8d/0xc0 [ 547.558370][T18581] ? dlci_ioctl_set+0x40/0x40 [ 547.563089][T18581] ksys_ioctl+0x123/0x180 [ 547.567447][T18581] __x64_sys_ioctl+0x73/0xb0 [ 547.572061][T18581] do_syscall_64+0xfa/0x790 [ 547.576592][T18581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.582493][T18581] RIP: 0033:0x45c479 16:46:38 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x3f000000, 0x8020003) [ 547.586399][T18581] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 547.606008][T18581] RSP: 002b:00007f1ebdbc2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 547.614517][T18581] RAX: ffffffffffffffda RBX: 00007f1ebdbc36d4 RCX: 000000000045c479 [ 547.622496][T18581] RDX: 0000000020000040 RSI: 0000000000008b1a RDI: 0000000000000004 [ 547.630472][T18581] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 16:46:38 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:38 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x446, 0x0) [ 547.638455][T18581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 547.646438][T18581] R13: 0000000000000417 R14: 00000000004d3058 R15: 0000000000000004 [ 547.655219][ T27] audit: type=1800 audit(1583081197.976:89): pid=18695 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17272 res=0 16:46:38 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 547.732095][ T27] audit: type=1800 audit(1583081197.976:90): pid=18702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17283 res=0 [ 547.833793][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 547.846083][T18714] F2FS-fs (loop5): Unable to read 1th superblock [ 547.860768][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 547.872287][T18714] F2FS-fs (loop5): Unable to read 2th superblock 16:46:38 executing program 2 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:38 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x200000000000000, 0x8020003) 16:46:38 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:38 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@init_itable_val={'init_itable'}}, {@data_journal='data=journal'}]}) 16:46:38 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:38 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x447, 0x0) [ 548.173108][T18832] FAULT_INJECTION: forcing a failure. [ 548.173108][T18832] name failslab, interval 1, probability 0, space 0, times 0 [ 548.237261][T18832] CPU: 1 PID: 18832 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 548.247206][T18832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.257272][T18832] Call Trace: [ 548.260577][T18832] dump_stack+0x197/0x210 [ 548.264966][T18832] should_fail.cold+0x5/0xf [ 548.269499][T18832] ? setup_fault_attr+0x1f0/0x1f0 [ 548.274550][T18832] ? __kasan_check_read+0x11/0x20 [ 548.279601][T18832] __should_failslab+0xb7/0x100 [ 548.284489][T18832] should_failslab+0x9/0x14 [ 548.289002][T18832] kmem_cache_alloc_node_trace+0x5a/0x750 [ 548.294813][T18832] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 548.300811][T18832] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 548.306641][T18832] __kmalloc_node_track_caller+0x3d/0x70 [ 548.312288][T18832] __kmalloc_reserve.isra.0+0x40/0xf0 [ 548.317677][T18832] __alloc_skb+0x10b/0x5e0 [ 548.322112][T18832] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 548.327679][T18832] ? wait_for_completion+0x440/0x440 [ 548.333002][T18832] wireless_send_event+0x1a6/0xbb0 [ 548.338140][T18832] ? rtnetlink_ifinfo_prep+0x3d0/0x3d0 [ 548.343651][T18832] ioctl_standard_iw_point+0xa8c/0xc20 [ 548.349129][T18832] ? cfg80211_wext_giwessid+0x160/0x160 [ 548.354700][T18832] ? wireless_send_event+0xbb0/0xbb0 [ 548.360021][T18832] ? mutex_trylock+0x2d0/0x2d0 [ 548.364813][T18832] ? dev_load+0xb0/0x210 [ 548.369084][T18832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.375346][T18832] ? full_name_hash+0xc0/0x100 [ 548.380141][T18832] ioctl_standard_call+0x1aa/0x1d0 [ 548.385259][T18832] ? cfg80211_wext_giwessid+0x160/0x160 [ 548.390835][T18832] ? cfg80211_wext_giwessid+0x160/0x160 [ 548.396404][T18832] wireless_process_ioctl.constprop.0+0x236/0x2b0 [ 548.402847][T18832] ? ioctl_standard_iw_point+0xc20/0xc20 [ 548.408499][T18832] wext_handle_ioctl+0x106/0x1c0 [ 548.413452][T18832] ? call_commit_handler+0x10/0x10 [ 548.418579][T18832] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 548.424839][T18832] ? do_vfs_ioctl+0x568/0x13b0 [ 548.429629][T18832] ? ioctl_file_clone+0x180/0x180 [ 548.434678][T18832] sock_ioctl+0x47d/0x790 [ 548.439048][T18832] ? dlci_ioctl_set+0x40/0x40 [ 548.443737][T18832] ? fput_many+0x12c/0x1a0 [ 548.448175][T18832] ? tomoyo_file_ioctl+0x23/0x30 [ 548.453142][T18832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 548.459480][T18832] ? security_file_ioctl+0x8d/0xc0 [ 548.464611][T18832] ? dlci_ioctl_set+0x40/0x40 [ 548.469307][T18832] ksys_ioctl+0x123/0x180 [ 548.473654][T18832] __x64_sys_ioctl+0x73/0xb0 [ 548.478261][T18832] do_syscall_64+0xfa/0x790 [ 548.482802][T18832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.488716][T18832] RIP: 0033:0x45c479 [ 548.492616][T18832] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 548.512222][T18832] RSP: 002b:00007f1ebdbc2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 548.520822][T18832] RAX: ffffffffffffffda RBX: 00007f1ebdbc36d4 RCX: 000000000045c479 [ 548.528798][T18832] RDX: 0000000020000040 RSI: 0000000000008b1a RDI: 0000000000000004 16:46:39 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x200020800000000, 0x8020003) [ 548.536775][T18832] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 548.544751][T18832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 548.552731][T18832] R13: 0000000000000417 R14: 00000000004d3058 R15: 0000000000000005 16:46:39 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 548.697828][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 548.715611][T18845] F2FS-fs (loop5): Unable to read 1th superblock [ 548.734524][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 548.747236][T18845] F2FS-fs (loop5): Unable to read 2th superblock 16:46:39 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, 0x0) 16:46:39 executing program 4: creat(0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:39 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x800000000000000, 0x8020003) 16:46:39 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x448, 0x0) [ 549.197050][T18960] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 549.298866][T18960] EXT4-fs (sda1): Remounting filesystem read-only 16:46:40 executing program 2 (fault-call:3 fault-nth:6): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:40 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:40 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x2080000000000000, 0x8020003) 16:46:40 executing program 4: creat(0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 549.451947][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 549.471992][T18971] F2FS-fs (loop5): Unable to read 1th superblock [ 549.478675][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 549.509716][T18971] F2FS-fs (loop5): Unable to read 2th superblock [ 549.557348][T19012] FAULT_INJECTION: forcing a failure. [ 549.557348][T19012] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 549.570731][T19012] CPU: 0 PID: 19012 Comm: syz-executor.2 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 549.580639][T19012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.590710][T19012] Call Trace: [ 549.594172][T19012] dump_stack+0x197/0x210 [ 549.598570][T19012] should_fail.cold+0x5/0xf [ 549.603134][T19012] ? setup_fault_attr+0x1f0/0x1f0 [ 549.608187][T19012] ? save_stack+0x5c/0x90 [ 549.612549][T19012] ? save_stack+0x23/0x90 [ 549.616905][T19012] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 549.622728][T19012] ? kasan_slab_alloc+0xf/0x20 [ 549.627508][T19012] ? kmem_cache_alloc_node+0x138/0x740 [ 549.632987][T19012] ? __alloc_skb+0xd5/0x5e0 [ 549.637515][T19012] ? wireless_send_event+0x1a6/0xbb0 [ 549.642844][T19012] should_fail_alloc_page+0x50/0x60 [ 549.648082][T19012] __alloc_pages_nodemask+0x1a1/0x910 [ 549.653504][T19012] ? __alloc_pages_slowpath+0x2900/0x2900 [ 549.659324][T19012] ? perf_trace_run_bpf_submit+0x131/0x190 [ 549.665274][T19012] ? setup_fault_attr+0x1f0/0x1f0 [ 549.670380][T19012] cache_grow_begin+0x90/0xc60 [ 549.675182][T19012] ? __kmalloc_node_track_caller+0x3d/0x70 [ 549.681021][T19012] ? trace_hardirqs_off+0x62/0x240 [ 549.686186][T19012] kmem_cache_alloc_node_trace+0x689/0x750 [ 549.692082][T19012] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 549.698093][T19012] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 549.703986][T19012] __kmalloc_node_track_caller+0x3d/0x70 [ 549.709658][T19012] __kmalloc_reserve.isra.0+0x40/0xf0 [ 549.715160][T19012] __alloc_skb+0x10b/0x5e0 [ 549.719610][T19012] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 549.725195][T19012] ? wait_for_completion+0x440/0x440 [ 549.730543][T19012] wireless_send_event+0x1a6/0xbb0 [ 549.735711][T19012] ? rtnetlink_ifinfo_prep+0x3d0/0x3d0 [ 549.741238][T19012] ioctl_standard_iw_point+0xa8c/0xc20 [ 549.746825][T19012] ? cfg80211_wext_giwessid+0x160/0x160 [ 549.752439][T19012] ? wireless_send_event+0xbb0/0xbb0 [ 549.757860][T19012] ? mutex_trylock+0x2d0/0x2d0 [ 549.762662][T19012] ? dev_load+0xb0/0x210 [ 549.766944][T19012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.773207][T19012] ? full_name_hash+0xc0/0x100 [ 549.778032][T19012] ioctl_standard_call+0x1aa/0x1d0 [ 549.783173][T19012] ? cfg80211_wext_giwessid+0x160/0x160 [ 549.788736][T19012] ? cfg80211_wext_giwessid+0x160/0x160 [ 549.794441][T19012] wireless_process_ioctl.constprop.0+0x236/0x2b0 [ 549.800891][T19012] ? ioctl_standard_iw_point+0xc20/0xc20 [ 549.806573][T19012] wext_handle_ioctl+0x106/0x1c0 [ 549.811540][T19012] ? call_commit_handler+0x10/0x10 [ 549.816786][T19012] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 549.823052][T19012] ? do_vfs_ioctl+0x568/0x13b0 [ 549.827865][T19012] ? ioctl_file_clone+0x180/0x180 [ 549.833008][T19012] sock_ioctl+0x47d/0x790 [ 549.837495][T19012] ? dlci_ioctl_set+0x40/0x40 [ 549.842217][T19012] ? fput_many+0x12c/0x1a0 [ 549.846672][T19012] ? tomoyo_file_ioctl+0x23/0x30 [ 549.851745][T19012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 549.858020][T19012] ? security_file_ioctl+0x8d/0xc0 [ 549.863163][T19012] ? dlci_ioctl_set+0x40/0x40 [ 549.867871][T19012] ksys_ioctl+0x123/0x180 [ 549.872243][T19012] __x64_sys_ioctl+0x73/0xb0 [ 549.876863][T19012] do_syscall_64+0xfa/0x790 [ 549.881411][T19012] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.887326][T19012] RIP: 0033:0x45c479 [ 549.891245][T19012] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.910915][T19012] RSP: 002b:00007f1ebdbc2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 549.919369][T19012] RAX: ffffffffffffffda RBX: 00007f1ebdbc36d4 RCX: 000000000045c479 [ 549.927361][T19012] RDX: 0000000020000040 RSI: 0000000000008b1a RDI: 0000000000000004 [ 549.935357][T19012] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 549.943349][T19012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 549.951374][T19012] R13: 0000000000000417 R14: 00000000004d3058 R15: 0000000000000006 16:46:40 executing program 4: creat(0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:40 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x3f00000000000000, 0x8020003) 16:46:40 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x449, 0x0) 16:46:40 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(0x0, 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:40 executing program 0: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:40 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 550.173980][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 550.201373][T19097] F2FS-fs (loop5): Unable to read 1th superblock [ 550.224646][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 550.238304][T19097] F2FS-fs (loop5): Unable to read 2th superblock [ 550.254621][ T27] audit: type=1800 audit(1583081200.896:91): pid=19105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17293 res=0 16:46:41 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(0x0, 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:41 executing program 2 (fault-call:3 fault-nth:7): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:41 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020002) [ 550.576720][ T27] audit: type=1800 audit(1583081201.216:92): pid=19214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17254 res=0 16:46:41 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x44a, 0x0) 16:46:41 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(0x0, 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 550.917551][ T27] audit: type=1800 audit(1583081201.556:93): pid=19224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17290 res=0 16:46:41 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0xffffffff000) 16:46:41 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 551.016633][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 551.047255][T19225] F2FS-fs (loop5): Unable to read 1th superblock [ 551.054165][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 551.083984][T19225] F2FS-fs (loop5): Unable to read 2th superblock 16:46:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:41 executing program 0: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x2, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:41 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 551.354535][ T27] audit: type=1804 audit(1583081201.996:94): pid=19301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir558361054/syzkaller.ELYVax/158/file0" dev="sda1" ino=17285 res=1 16:46:42 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x200) ioctl(r0, 0x9, &(0x7f00000000c0)="064988722a2e114527c92d560571a8c730c67345d3a729f8112762cc197876c2bfa4acd8a8b4d217788573") r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000000)={0x1d, 0x0, 0x0, 0x6}) 16:46:42 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x44b, 0x0) 16:46:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x10, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:42 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 551.503209][ T27] audit: type=1804 audit(1583081202.046:95): pid=19301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir558361054/syzkaller.ELYVax/158/file0" dev="sda1" ino=17285 res=1 16:46:42 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:42 executing program 0 (fault-call:2 fault-nth:0): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, 0x0) [ 551.734557][T19356] F2FS-fs (loop5): Unable to read 1th superblock 16:46:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x127a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 551.790826][T19356] F2FS-fs (loop5): Unable to read 2th superblock [ 551.800260][ T27] audit: type=1804 audit(1583081202.436:96): pid=19361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir558361054/syzkaller.ELYVax/159/file0" dev="sda1" ino=17287 res=1 [ 551.896500][T19369] FAULT_INJECTION: forcing a failure. [ 551.896500][T19369] name failslab, interval 1, probability 0, space 0, times 0 16:46:42 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:42 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x2, 0xe0, 0x8000, 0x2, 0x3, 0x9, 0x178, 0x38, 0x1a5, 0x1, 0x23, 0x20, 0x1, 0x7, 0x0, 0x3}, [{0x7, 0x0, 0x1, 0x4, 0x6, 0x7f, 0x5, 0x81}, {0x60000000, 0x3, 0x2, 0x3, 0x6, 0x10001, 0xc0000000, 0x3}], "d7a1f6773601e06704f8d565513443ef42a5cc9abe196fbf13d4d8e1d445daaca4966386fe0232de0dd2e6252b3ebe847e809c3867e75ebda84de54499e5e5ce371cd0da4ac437246e3126b5491c7098c11169f487457b7b3e6981e68aefcfd5a84b0334e378b8140131d4f202e93ef2c81ca18a46fdb639a989cae868ada3268f4587884df1abe6e1fa1a23fb47b94d21aafc8c8bc6b73adc8a87a90f449849a0ac7bc314a06aa334d8d3f9", [[], [], [], [], [], [], [], [], [], []]}, 0xb24) fallocate(r0, 0x3, 0x0, 0x8020003) [ 551.931921][ T27] audit: type=1804 audit(1583081202.476:97): pid=19361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir558361054/syzkaller.ELYVax/159/file0" dev="sda1" ino=17287 res=1 [ 551.977004][T19369] CPU: 0 PID: 19369 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 551.986976][T19369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.997348][T19369] Call Trace: [ 552.000662][T19369] dump_stack+0x197/0x210 [ 552.005132][T19369] should_fail.cold+0x5/0xf [ 552.009661][T19369] ? setup_fault_attr+0x1f0/0x1f0 [ 552.014712][T19369] ? ___might_sleep+0x163/0x2c0 [ 552.019586][T19369] __should_failslab+0xb7/0x100 [ 552.024461][T19369] should_failslab+0x9/0x14 [ 552.028984][T19369] __kmalloc+0x2e0/0x770 [ 552.033269][T19369] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 552.039526][T19369] ? fput_many+0x12c/0x1a0 [ 552.043958][T19369] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 552.050215][T19369] ? strnlen_user+0x1fc/0x2e0 [ 552.054926][T19369] ? __x64_sys_memfd_create+0x13c/0x470 [ 552.060520][T19369] __x64_sys_memfd_create+0x13c/0x470 [ 552.065934][T19369] ? memfd_fcntl+0x18a0/0x18a0 [ 552.070711][T19369] ? do_syscall_64+0x26/0x790 [ 552.075406][T19369] ? lockdep_hardirqs_on+0x421/0x5e0 [ 552.080709][T19369] ? trace_hardirqs_on+0x67/0x240 [ 552.085781][T19369] do_syscall_64+0xfa/0x790 [ 552.090324][T19369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.096236][T19369] RIP: 0033:0x45c479 [ 552.100314][T19369] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 552.119927][T19369] RSP: 002b:00007f663649fa68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 552.128347][T19369] RAX: ffffffffffffffda RBX: 00007f66364a06d4 RCX: 000000000045c479 [ 552.136348][T19369] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1518 16:46:42 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x44c, 0x0) [ 552.144432][T19369] RBP: 000000000076bf20 R08: 0000000000020020 R09: 0000000000000001 [ 552.152457][T19369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 552.160443][T19369] R13: 0000000000000bd9 R14: 00000000004cdb80 R15: 0000000000000000 16:46:42 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './bus', [{0x20, 'proc('}, {0x20, ',vboxnet0'}, {0x20, '[}\xfdvboxnet0wlan1/'}, {0x20, '{'}, {}, {0x20, 'mime_type\\'}], 0xa, "08c9e77bb91ac9d22c4aa5574104fb7bb35405df9cefefdabfcfeb33c964209caec8304a3ce20d2027cc03a0bdb861488a427049557c52035cf24de54b31ea386dfb8551550250fc69b984d98e36d91c53bda7e239bef83bc1d0ed8fa70a55995eeb8b4b0c3990b6935e09837f7e266c921cfe22844cfc72ad35458532efca38c1057de23ff2113d1396bfe84d5872de8ebf997217a86e60f7a271b25e480dc9a5033c79f981366051c317b0c12520bce43991f20cff375c300ba3c6865712f198f3fd1b64cf"}, 0xff) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:42 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(0x0, 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 552.233046][ T27] audit: type=1804 audit(1583081202.776:98): pid=19475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir558361054/syzkaller.ELYVax/160/file0" dev="sda1" ino=17236 res=1 16:46:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x2402, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 552.317719][T19484] F2FS-fs (loop5): Unable to read 1th superblock [ 552.326594][T19484] F2FS-fs (loop5): Unable to read 2th superblock [ 552.374949][ T27] audit: type=1804 audit(1583081202.786:99): pid=19475 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir558361054/syzkaller.ELYVax/160/file0" dev="sda1" ino=17236 res=1 16:46:43 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:43 executing program 0 (fault-call:2 fault-nth:1): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, 0x0) 16:46:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4605, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:43 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(0x0, 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:43 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x44d, 0x0) 16:46:43 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="751e0917d581939536e97a472edd6b5ae903f41226537aede3f6dc8346f97f2d2717deea5c7451edd4aefb45d547c7863dc42a92caea3561e72ee6b2f5b9f9b4fd12460da9bda468be2899b044bd6ad7efb4a206f3cc2624c74fcee01f82b1ae9d093a45755b5be40213913420b4bfb42dc4dd555ff625a2db548ea0715fb04f960fdb99655c7a85ae0f1d3324abdb0f24497005bf303574a514b3ceaa9e1fe51a65fc6df56a7228b06cb9c306cf27310bae1ae20524"], 0x1) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000)={@empty}, &(0x7f0000000140)=0x14) fallocate(r0, 0x3, 0x0, 0x8020003) [ 552.829508][T19612] F2FS-fs (loop5): Unable to read 1th superblock [ 552.837999][T19605] FAULT_INJECTION: forcing a failure. [ 552.837999][T19605] name failslab, interval 1, probability 0, space 0, times 0 [ 552.865338][ T2626] print_req_error: 5 callbacks suppressed [ 552.865354][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 552.884261][T19612] F2FS-fs (loop5): Unable to read 2th superblock [ 552.903419][T19605] CPU: 1 PID: 19605 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 552.913348][T19605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.923551][T19605] Call Trace: 16:46:43 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(0x0, 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 552.926861][T19605] dump_stack+0x197/0x210 [ 552.931223][T19605] should_fail.cold+0x5/0xf [ 552.935864][T19605] ? setup_fault_attr+0x1f0/0x1f0 [ 552.941020][T19605] ? ___might_sleep+0x163/0x2c0 [ 552.946009][T19605] ? shmem_destroy_inode+0x80/0x80 [ 552.951142][T19605] __should_failslab+0xb7/0x100 [ 552.956013][T19605] should_failslab+0x9/0x14 [ 552.960544][T19605] kmem_cache_alloc+0x2aa/0x710 [ 552.965407][T19605] ? __alloc_fd+0x487/0x620 [ 552.969961][T19605] ? shmem_destroy_inode+0x80/0x80 [ 552.975089][T19605] shmem_alloc_inode+0x1c/0x50 16:46:43 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)=""/140, 0x2c, 0x8c, 0x1}, 0x20) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000080)={0x0, 0x401, 0x8001, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0xa10903, 0x40, [], @ptr=0x5}}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r8) r9 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r9, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_udp_encap(r9, 0x11, 0x64, &(0x7f0000000040)=0x3, 0x4) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8800fe802000000000000000000000000000ff02000000000000000000000000000100004e2000099078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934449a34ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc37123b042c181118cdcccc5390959505e48def8641ac80341ef6dbffb3f83416cd989dbb9bba07427a463cd368c3f4d3e30ef75024976f73fb217350273175753bbc9c0c50eb99f2cad648f5046bf8ac8ec617c4d85b77d0af3bf1eb770f5662d54dc1da088a46828e17f2b54edd288c9706ba7fd5059ef31873345fc28cd32427e61e83deda596a84c0d3b3be0d4e2a4bbdd804866b8ff97fec0b69f84c69f5cfcbae512ce102e1763e89025ff4328804d13c8ee4d473d93741c9fa84b2ceadadb97699a30a9ad745537b5d519d3862a4b148fc837dff15ea4826"], 0x0) r10 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsa\x00', 0x40, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000580)={r8, r10}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$DRM_IOCTL_DROP_MASTER(r5, 0x641f) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r11, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0xfe, 0x0}}}}, 0x84) [ 552.979882][T19605] alloc_inode+0x68/0x1e0 [ 552.984235][T19605] new_inode_pseudo+0x19/0xf0 [ 552.988933][T19605] new_inode+0x1f/0x40 [ 552.993058][T19605] shmem_get_inode+0x84/0x7e0 [ 552.997765][T19605] __shmem_file_setup.part.0+0x7e/0x2b0 [ 553.003339][T19605] shmem_file_setup+0x66/0x90 [ 553.008049][T19605] __x64_sys_memfd_create+0x2a2/0x470 [ 553.013442][T19605] ? memfd_fcntl+0x18a0/0x18a0 [ 553.018314][T19605] ? do_syscall_64+0x26/0x790 [ 553.023005][T19605] ? lockdep_hardirqs_on+0x421/0x5e0 [ 553.028310][T19605] ? trace_hardirqs_on+0x67/0x240 [ 553.033362][T19605] do_syscall_64+0xfa/0x790 [ 553.037895][T19605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.043797][T19605] RIP: 0033:0x45c479 [ 553.047706][T19605] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 553.067446][T19605] RSP: 002b:00007f663649fa68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 553.075924][T19605] RAX: ffffffffffffffda RBX: 00007f66364a06d4 RCX: 000000000045c479 [ 553.083945][T19605] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1518 [ 553.092032][T19605] RBP: 000000000076bf20 R08: 0000000000020020 R09: 0000000000000001 [ 553.100012][T19605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 553.108102][T19605] R13: 0000000000000bd9 R14: 00000000004cdb80 R15: 0000000000000001 16:46:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4c00, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:43 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:43 executing program 0 (fault-call:2 fault-nth:2): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, 0x0) 16:46:43 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:44 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x44e, 0x0) 16:46:44 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e1dc4cc0"], 0x1) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) r2 = dup2(0xffffffffffffffff, r1) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f0000000000), &(0x7f0000000080)=0x4) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4c01, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 553.491110][T19739] FAULT_INJECTION: forcing a failure. [ 553.491110][T19739] name failslab, interval 1, probability 0, space 0, times 0 [ 553.496189][ T27] audit: type=1804 audit(1583081204.126:100): pid=19740 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir558361054/syzkaller.ELYVax/164/file0" dev="sda1" ino=17306 res=1 16:46:44 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:44 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 553.691751][T19739] CPU: 1 PID: 19739 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 553.701698][T19739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.711764][T19739] Call Trace: [ 553.716117][T19739] dump_stack+0x197/0x210 [ 553.720550][T19739] should_fail.cold+0x5/0xf [ 553.725099][T19739] ? setup_fault_attr+0x1f0/0x1f0 [ 553.730149][T19739] ? ___might_sleep+0x163/0x2c0 [ 553.735031][T19739] __should_failslab+0xb7/0x100 16:46:44 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="aaca55040000d6"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 553.739912][T19739] should_failslab+0x9/0x14 [ 553.744433][T19739] kmem_cache_alloc+0x2aa/0x710 [ 553.749321][T19739] ? current_time+0x6b/0x110 [ 553.753932][T19739] ? ktime_get_coarse_real_ts64+0xeb/0x2a0 [ 553.759775][T19739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 553.766050][T19739] ? timestamp_truncate+0x20f/0x2f0 [ 553.771274][T19739] __d_alloc+0x2e/0x8c0 [ 553.775589][T19739] d_alloc_pseudo+0x1e/0x70 [ 553.780106][T19739] alloc_file_pseudo+0xe2/0x280 [ 553.784973][T19739] ? alloc_file+0x4d0/0x4d0 [ 553.789508][T19739] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 553.795786][T19739] ? __kasan_check_write+0x14/0x20 [ 553.800931][T19739] __shmem_file_setup.part.0+0x108/0x2b0 [ 553.806595][T19739] shmem_file_setup+0x66/0x90 [ 553.811302][T19739] __x64_sys_memfd_create+0x2a2/0x470 [ 553.816699][T19739] ? memfd_fcntl+0x18a0/0x18a0 [ 553.821480][T19739] ? do_syscall_64+0x26/0x790 [ 553.826242][T19739] ? lockdep_hardirqs_on+0x421/0x5e0 [ 553.831546][T19739] ? trace_hardirqs_on+0x67/0x240 [ 553.836607][T19739] do_syscall_64+0xfa/0x790 [ 553.841131][T19739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.847127][T19739] RIP: 0033:0x45c479 [ 553.851030][T19739] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 553.870841][T19739] RSP: 002b:00007f663649fa68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 553.879278][T19739] RAX: ffffffffffffffda RBX: 00007f66364a06d4 RCX: 000000000045c479 [ 553.887259][T19739] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1518 [ 553.895242][T19739] RBP: 000000000076bf20 R08: 0000000000020020 R09: 0000000000000001 [ 553.903221][T19739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 553.911204][T19739] R13: 0000000000000bd9 R14: 00000000004cdb80 R15: 0000000000000002 16:46:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4c04, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 553.915618][ T27] audit: type=1804 audit(1583081204.336:101): pid=19759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir558361054/syzkaller.ELYVax/165/file0" dev="sda1" ino=17306 res=1 16:46:44 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='overlay\x00', 0x2c010, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="75e2693a"], &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='ubifs\x00', 0x20, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x140) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r3) r4 = accept4$packet(r0, 0x0, &(0x7f0000000180), 0x80800) write$binfmt_elf64(r4, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRESHEX=r2, @ANYRESOCT, @ANYRES32=r3, @ANYRESOCT=r1], 0x4c) fallocate(r0, 0x3, 0x0, 0x8020003) 16:46:44 executing program 0 (fault-call:2 fault-nth:3): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, 0x0) 16:46:44 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:44 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:44 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x44f, 0x0) 16:46:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4c05, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 554.393698][T19877] FAULT_INJECTION: forcing a failure. [ 554.393698][T19877] name failslab, interval 1, probability 0, space 0, times 0 [ 554.407577][ T27] audit: type=1804 audit(1583081205.046:102): pid=19876 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir558361054/syzkaller.ELYVax/166/file0" dev="sda1" ino=17290 res=1 [ 554.451700][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 554.462814][T19877] CPU: 0 PID: 19877 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 554.472715][T19877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.482798][T19877] Call Trace: [ 554.486112][T19877] dump_stack+0x197/0x210 [ 554.490481][T19877] should_fail.cold+0x5/0xf [ 554.495001][T19877] ? __lock_acquire+0x1af3/0x6320 [ 554.498610][T19884] F2FS-fs (loop5): Unable to read 1th superblock [ 554.500047][T19877] ? setup_fault_attr+0x1f0/0x1f0 [ 554.500080][T19877] ? ___might_sleep+0x163/0x2c0 [ 554.516276][T19877] __should_failslab+0xb7/0x100 [ 554.521150][T19877] should_failslab+0x9/0x14 [ 554.525666][T19877] kmem_cache_alloc+0x2aa/0x710 [ 554.530551][T19877] ? rwlock_bug.part.0+0x90/0x90 [ 554.535504][T19877] ? lock_downgrade+0x920/0x920 [ 554.536643][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 554.540378][T19877] __alloc_file+0x27/0x340 [ 554.540403][T19877] alloc_empty_file+0x72/0x170 [ 554.540427][T19877] alloc_file+0x5e/0x4d0 [ 554.540452][T19877] alloc_file_pseudo+0x189/0x280 [ 554.540476][T19877] ? alloc_file+0x4d0/0x4d0 [ 554.552540][T19884] F2FS-fs (loop5): Unable to read 2th superblock [ 554.555735][T19877] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 554.555762][T19877] ? __kasan_check_write+0x14/0x20 [ 554.555792][T19877] __shmem_file_setup.part.0+0x108/0x2b0 [ 554.555821][T19877] shmem_file_setup+0x66/0x90 [ 554.602250][T19877] __x64_sys_memfd_create+0x2a2/0x470 [ 554.607652][T19877] ? memfd_fcntl+0x18a0/0x18a0 [ 554.612427][T19877] ? do_syscall_64+0x26/0x790 [ 554.617115][T19877] ? lockdep_hardirqs_on+0x421/0x5e0 [ 554.622406][T19877] ? trace_hardirqs_on+0x67/0x240 [ 554.627459][T19877] do_syscall_64+0xfa/0x790 [ 554.631975][T19877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.637895][T19877] RIP: 0033:0x45c479 [ 554.641793][T19877] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 554.661513][T19877] RSP: 002b:00007f663649fa68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 554.669938][T19877] RAX: ffffffffffffffda RBX: 00007f66364a06d4 RCX: 000000000045c479 [ 554.677963][T19877] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1518 [ 554.685945][T19877] RBP: 000000000076bf20 R08: 0000000000020020 R09: 0000000000000001 [ 554.693923][T19877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 16:46:45 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="855a1c8d728270af2baf6dce490000000000004b55a8119873e3f1eecb6189303afebc861532046338eb23db80640200000000000000707b9153cb"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 554.701899][T19877] R13: 0000000000000bd9 R14: 00000000004cdb80 R15: 0000000000000003 16:46:45 executing program 0 (fault-call:2 fault-nth:4): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, 0x0) 16:46:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x541b, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:45 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:45 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:45 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x450, 0x0) 16:46:45 executing program 1: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000340)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000380)={'filter\x00'}, &(0x7f0000000300)=0x78) r3 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r3, &(0x7f0000000200)={0x13}) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000480)=ANY=[@ANYBLOB="65edf1f0f096859184616ef6ad70ff8c8148a70abe76dcaf4000a5ae6aed386773f747ec5598eceddb9fcbb70780512447ded3bff78e297f4acfd85dfb5decceef74bc0caae4b90cdf4c9b0cf0359c9edf3a074efc2abd315a4b21ec6261fc6b0b3f0275ad1120766e79ef2a04ac4ad6e4"], 0x1) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000240)={{0xa, 0x4e22, 0x6, @loopback, 0x3}, {0xa, 0x9, 0x3, @remote, 0x3}, 0x1ff, [0x20, 0xffff, 0x7, 0xb3, 0xffffffff, 0x1, 0x101, 0x9]}, 0x5c) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x10, 0x3f5, 0x10, 0x70bd2b, 0x25dfdbfc, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20048051}, 0xc1) ptrace$getregs(0xe, r5, 0x7, &(0x7f00000000c0)=""/220) fallocate(r4, 0xb3, 0x0, 0x8020003) syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x3, 0x10000) [ 555.052112][T20004] FAULT_INJECTION: forcing a failure. [ 555.052112][T20004] name failslab, interval 1, probability 0, space 0, times 0 [ 555.112780][T20004] CPU: 1 PID: 20004 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 555.122719][T20004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.132781][T20004] Call Trace: [ 555.136087][T20004] dump_stack+0x197/0x210 [ 555.140449][T20004] should_fail.cold+0x5/0xf [ 555.144985][T20004] ? setup_fault_attr+0x1f0/0x1f0 [ 555.150053][T20004] ? ___might_sleep+0x163/0x2c0 [ 555.154927][T20004] __should_failslab+0xb7/0x100 16:46:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5421, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 555.159788][T20004] should_failslab+0x9/0x14 [ 555.165258][T20004] kmem_cache_alloc+0x2aa/0x710 [ 555.170153][T20004] ? kmem_cache_alloc+0x364/0x710 [ 555.175201][T20004] security_file_alloc+0x39/0x170 [ 555.180250][T20004] __alloc_file+0xde/0x340 [ 555.184782][T20004] alloc_empty_file+0x72/0x170 [ 555.189578][T20004] alloc_file+0x5e/0x4d0 [ 555.193851][T20004] alloc_file_pseudo+0x189/0x280 [ 555.198809][T20004] ? alloc_file+0x4d0/0x4d0 [ 555.203335][T20004] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 555.209595][T20004] ? __kasan_check_write+0x14/0x20 [ 555.214732][T20004] __shmem_file_setup.part.0+0x108/0x2b0 [ 555.220413][T20004] shmem_file_setup+0x66/0x90 [ 555.225131][T20004] __x64_sys_memfd_create+0x2a2/0x470 [ 555.230521][T20004] ? memfd_fcntl+0x18a0/0x18a0 [ 555.235300][T20004] ? do_syscall_64+0x26/0x790 [ 555.239995][T20004] ? lockdep_hardirqs_on+0x421/0x5e0 [ 555.245296][T20004] ? trace_hardirqs_on+0x67/0x240 [ 555.250340][T20004] do_syscall_64+0xfa/0x790 [ 555.254863][T20004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.260767][T20004] RIP: 0033:0x45c479 [ 555.264671][T20004] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 555.284287][T20004] RSP: 002b:00007f663649fa68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 555.292707][T20004] RAX: ffffffffffffffda RBX: 00007f66364a06d4 RCX: 000000000045c479 [ 555.300685][T20004] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c1518 16:46:46 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 555.308662][T20004] RBP: 000000000076bf20 R08: 0000000000020020 R09: 0000000000000001 [ 555.316639][T20004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 555.324616][T20004] R13: 0000000000000bd9 R14: 00000000004cdb80 R15: 0000000000000004 16:46:46 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000080)=0x10) 16:46:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5450, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:46 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x451, 0x0) 16:46:46 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(0x0, 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:46 executing program 0 (fault-call:2 fault-nth:5): creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, 0x0) 16:46:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5451, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:46:46 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000080)={0xff, 0x3, 0xbd4}) 16:46:46 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 555.948472][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 555.976610][T20135] F2FS-fs (loop5): Unable to read 1th superblock [ 556.040575][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 556.052885][T20135] F2FS-fs (loop5): Unable to read 2th superblock 16:46:46 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) [ 556.165334][T20144] FAULT_INJECTION: forcing a failure. [ 556.165334][T20144] name failslab, interval 1, probability 0, space 0, times 0 16:46:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 556.291813][T20144] CPU: 1 PID: 20144 Comm: syz-executor.0 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 556.301846][T20144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.311910][T20144] Call Trace: [ 556.315240][T20144] dump_stack+0x197/0x210 [ 556.319602][T20144] should_fail.cold+0x5/0xf [ 556.324124][T20144] ? setup_fault_attr+0x1f0/0x1f0 [ 556.329201][T20144] ? ___might_sleep+0x163/0x2c0 [ 556.334079][T20144] __should_failslab+0xb7/0x100 [ 556.338944][T20144] should_failslab+0x9/0x14 [ 556.343462][T20144] __kmalloc+0x2e0/0x770 [ 556.347715][T20144] ? mark_held_locks+0xf0/0xf0 [ 556.352505][T20144] ? __kasan_check_read+0x11/0x20 [ 556.357649][T20144] ? tomoyo_realpath_from_path+0xc5/0x660 [ 556.363390][T20144] tomoyo_realpath_from_path+0xc5/0x660 [ 556.368949][T20144] ? tomoyo_path_perm+0x1cb/0x430 [ 556.374002][T20144] tomoyo_path_perm+0x230/0x430 [ 556.378857][T20144] ? tomoyo_path_perm+0x1cb/0x430 [ 556.383900][T20144] ? tomoyo_check_open_permission+0x3e0/0x3e0 [ 556.389994][T20144] ? __kasan_check_read+0x11/0x20 [ 556.395029][T20144] ? __lock_acquire+0x1af3/0x6320 [ 556.400080][T20144] ? rcu_read_lock_held+0x9c/0xb0 [ 556.405155][T20144] ? rcu_read_lock_any_held+0xcd/0xf0 [ 556.410543][T20144] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 556.415852][T20144] tomoyo_path_truncate+0x1d/0x30 [ 556.420889][T20144] security_path_truncate+0xf2/0x150 [ 556.426193][T20144] do_sys_ftruncate+0x3d9/0x550 [ 556.431065][T20144] __x64_sys_ftruncate+0x59/0x80 [ 556.436015][T20144] do_syscall_64+0xfa/0x790 [ 556.440535][T20144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.446433][T20144] RIP: 0033:0x45c447 [ 556.450333][T20144] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 556.469947][T20144] RSP: 002b:00007f663649fa68 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 556.478362][T20144] RAX: ffffffffffffffda RBX: 00007f66364a06d4 RCX: 000000000045c447 16:46:47 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x6, 0x2000) ftruncate(r1, 0x6f) 16:46:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:47 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x500, 0x0) [ 556.486341][T20144] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 556.494316][T20144] RBP: 000000000076bf20 R08: 0000000000020020 R09: 0000000000000001 [ 556.502312][T20144] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 556.510291][T20144] R13: 0000000000000bd9 R14: 00000000004cdb80 R15: 0000000000000005 [ 556.772324][T20144] ERROR: Out of memory at tomoyo_realpath_from_path. [ 556.798698][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:46:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5460, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 556.816564][T20267] F2FS-fs (loop5): Unable to read 1th superblock [ 556.828633][T20144] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:46:47 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) 16:46:47 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000340)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x7, 0x4, 0x4}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') open_by_handle_at(r3, &(0x7f0000000180)={0xe0, 0x10001, "ace9f7675c95bf81af9bd0e72b91a714723859b12a00c4bae477be31195412bb51fdb7fe9afc3c067d317d2c9f73a9f602fdf5957bf6c9af00e2c857cca14af551e83c2ff70e0490bb022b251cf193f7da02e492efc5c359cc1f371b0a98f376bacd32f30c24d72b4211b9e86d03139f66b08bcc72297f392ba3e7658e41afc5de4cad7e0cec1df99a37c084f80a16cd99153e8ae49d3cc4569eef6d253be5741b555122e963f74fe35e471ad67ad537ed5f60f801e2275e22b00308e405097c5c089367a81a95bad704dc8e5e63680102d61d3d84606316"}, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000080)=ANY=[@ANYBLOB="843bae8a40eb381ea932a5d23c0829d075c5fca4c2a354dd9ad17325d6ab7ad363d93a8cd91c4fc89b2e1a9c060d0f8b3a147ed2b9b4a70fe4c61cad8b6ae95469081dc4a6738411cddef43eb29a4ad0fad02aa4e6a7d4db76546eb1b2a519485806f151d4e39db06ebee66b38d93b53c5b1b0cd1e22cc29d2ec931ecdeb35cb52379bb6bd6d52dd72c8125e2c1b9c9ed2585b44a953d69d8d9156e33bc483762029339f5e0839ccb87b94e5d0384599bec5c71e1a62d96fd30ed259e7f5119241"], 0x1) fallocate(r4, 0x3, 0x0, 0x8020003) [ 556.862321][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 556.876817][T20267] F2FS-fs (loop5): Unable to read 2th superblock [ 556.884326][T20144] EXT4-fs (sda1): Remounting filesystem read-only 16:46:47 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20020, 0x0) 16:46:47 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:46:47 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x600, 0x0) 16:46:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x6364, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 557.244743][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.271626][T20384] F2FS-fs (loop5): Unable to read 1th superblock 16:46:47 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') fcntl$setflags(r2, 0x2, 0x0) [ 557.308006][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 557.320050][T20384] F2FS-fs (loop5): Unable to read 2th superblock 16:46:48 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x700f, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 557.405849][T20392] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 557.414480][T20392] EXT4-fs (sda1): Remounting filesystem read-only 16:46:48 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x700, 0x0) 16:46:48 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2, 0x0, 0x0, 0x20020, 0x0) 16:46:49 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 558.468766][T20507] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 558.541183][T20507] EXT4-fs (sda1): Remounting filesystem read-only 16:46:49 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='B'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b1a, &(0x7f0000000040)='wlan0\x00') sendfile(r0, r6, 0x0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8b1a, &(0x7f0000000040)='wlan0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e22, @empty}}, 0x0, 0x0, 0x20, 0x0, "8a5d0baee115b482a9e6de285c97f4236b6e0ac2b4e2e80cdf2b86630cf5bfcffbb4cb83758e653d966a681ef5e3b2849293acba07eccd00da2d09dcd270aa8051defcfaff7217b28da194326f78814f"}, 0xd8) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r10) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r11 = socket$caif_stream(0x25, 0x1, 0x4) r12 = dup(r11) r13 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r14 = dup(r13) ioctl$PERF_EVENT_IOC_SET_FILTER(r14, 0x8b1a, &(0x7f0000000040)='wlan0\x00') dup(r9) ioctl$void(r0, 0x5451) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x11, r0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xfffffffffffffff7) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000080)) r15 = openat$cgroup_subtree(r12, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r15, 0x40d, &(0x7f0000000200)) [ 558.731006][T20513] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 558.746333][T20513] EXT4-fs (sda1): Remounting filesystem read-only [ 561.271765][T11060] tipc: TX() has been purged, node left! [ 562.207472][T20550] IPVS: ftp: loaded support on port[0] = 21 [ 562.491727][T20550] chnl_net:caif_netlink_parms(): no params data found [ 563.184507][T20558] IPVS: ftp: loaded support on port[0] = 21 [ 563.192312][T20550] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.199545][T20550] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.241695][T20550] device bridge_slave_0 entered promiscuous mode [ 563.270107][T20556] IPVS: ftp: loaded support on port[0] = 21 [ 563.330740][T20550] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.342144][T20550] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.378146][T20550] device bridge_slave_1 entered promiscuous mode [ 563.829682][T20550] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 563.858750][T20550] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 563.905954][T20550] team0: Port device team_slave_0 added [ 563.916614][T20550] team0: Port device team_slave_1 added [ 564.049223][T20550] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 564.058716][T20550] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 564.085774][T20550] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 564.097340][T20558] chnl_net:caif_netlink_parms(): no params data found [ 564.119397][T20550] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 564.126826][T20550] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 564.154142][T20550] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 564.375709][T20558] bridge0: port 1(bridge_slave_0) entered blocking state [ 564.382881][T20558] bridge0: port 1(bridge_slave_0) entered disabled state [ 564.390637][T20558] device bridge_slave_0 entered promiscuous mode [ 564.444845][T20550] device hsr_slave_0 entered promiscuous mode [ 564.502875][T20550] device hsr_slave_1 entered promiscuous mode [ 564.541590][T20550] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 564.549204][T20550] Cannot create hsr debugfs directory [ 564.555032][T20558] bridge0: port 2(bridge_slave_1) entered blocking state [ 564.562202][T20558] bridge0: port 2(bridge_slave_1) entered disabled state [ 564.570385][T20558] device bridge_slave_1 entered promiscuous mode [ 564.577844][T20556] chnl_net:caif_netlink_parms(): no params data found [ 564.722931][T20558] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 564.746732][T20558] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 564.843877][T20558] team0: Port device team_slave_0 added [ 564.869610][T20558] team0: Port device team_slave_1 added [ 564.894411][T20556] bridge0: port 1(bridge_slave_0) entered blocking state [ 564.902074][T20556] bridge0: port 1(bridge_slave_0) entered disabled state [ 564.910178][T20556] device bridge_slave_0 entered promiscuous mode [ 565.013108][T20556] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.020160][T20556] bridge0: port 2(bridge_slave_1) entered disabled state [ 565.028565][T20556] device bridge_slave_1 entered promiscuous mode [ 565.040175][T20558] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 565.052743][T20558] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 565.079286][T20558] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 565.098430][T20558] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 565.105431][T20558] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 565.131886][T20558] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 565.159274][T20556] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 565.171926][T20556] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 565.224945][T20556] team0: Port device team_slave_0 added [ 565.237190][T20556] team0: Port device team_slave_1 added [ 565.293527][T20558] device hsr_slave_0 entered promiscuous mode [ 565.342103][T20558] device hsr_slave_1 entered promiscuous mode [ 565.401705][T20558] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 565.409288][T20558] Cannot create hsr debugfs directory [ 565.544440][T20556] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 565.551431][T20556] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 565.578115][T20556] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 565.598507][T20556] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 565.605707][T20556] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 565.636138][T20556] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 565.763530][T20556] device hsr_slave_0 entered promiscuous mode [ 565.811935][T20556] device hsr_slave_1 entered promiscuous mode [ 565.851668][T20556] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 565.859259][T20556] Cannot create hsr debugfs directory [ 566.039562][T20550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 566.064839][T20550] 8021q: adding VLAN 0 to HW filter on device team0 [ 566.081088][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 566.088769][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 566.116875][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 566.126148][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 566.135301][ T9958] bridge0: port 1(bridge_slave_0) entered blocking state [ 566.143131][ T9958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 566.151056][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 566.159611][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 566.168165][ T9958] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.175230][ T9958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 566.183570][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 566.192966][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 566.224524][T11060] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 566.237239][T11060] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 566.245660][T11060] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 566.253460][T11060] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 566.263789][T11060] device bridge_slave_1 left promiscuous mode [ 566.269982][T11060] bridge0: port 2(bridge_slave_1) entered disabled state [ 566.312753][T11060] device bridge_slave_0 left promiscuous mode [ 566.318977][T11060] bridge0: port 1(bridge_slave_0) entered disabled state [ 566.395035][T11060] device veth1_macvtap left promiscuous mode [ 566.401491][T11060] device veth0_macvtap left promiscuous mode [ 566.408165][T11060] device veth1_vlan left promiscuous mode [ 566.415475][T11060] device veth0_vlan left promiscuous mode [ 570.392817][T11060] device hsr_slave_0 left promiscuous mode [ 570.451727][T11060] device hsr_slave_1 left promiscuous mode [ 570.511475][T11060] @ (unregistering): Port device team_slave_1 removed [ 570.524406][T11060] @ (unregistering): Port device team_slave_0 removed [ 570.537094][T11060] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 570.610326][T11060] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 570.759305][T11060] bond0 (unregistering): Released all slaves [ 570.927107][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 570.935814][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 570.946593][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 570.972447][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 571.000833][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 571.011012][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 571.046777][T20550] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 571.058076][T20550] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 571.076896][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 571.086857][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 571.095447][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 571.104586][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 571.113837][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 571.177158][T20558] 8021q: adding VLAN 0 to HW filter on device bond0 [ 571.193427][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 571.200893][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 571.218610][T20550] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 571.250437][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 571.259230][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 571.282316][T20556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 571.293272][T20558] 8021q: adding VLAN 0 to HW filter on device team0 [ 571.316760][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 571.325362][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 571.334645][T13674] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.341758][T13674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.349632][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 571.363647][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 571.373275][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 571.382603][ T9923] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.389658][ T9923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.408476][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 571.417392][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 571.429482][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 571.443709][T20556] 8021q: adding VLAN 0 to HW filter on device team0 [ 571.463482][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 571.482617][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 571.501005][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 571.509652][ T9923] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.516743][ T9923] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.529660][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 571.538553][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 571.547600][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 571.556271][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 571.564792][ T9923] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.571905][ T9923] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.580226][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 571.588885][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 571.612428][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 571.621105][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 571.631454][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 571.654155][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 571.662486][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 571.670550][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 571.695900][T20558] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 571.707822][T20558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 571.718301][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 571.727854][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 571.736441][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 571.749014][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 571.757780][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 571.766542][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 571.775254][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 571.783972][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 571.794638][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 571.811741][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 571.820080][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 571.829180][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 571.837579][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 571.856697][T20556] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 571.870788][T20550] device veth0_vlan entered promiscuous mode [ 571.900774][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 571.909876][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 571.919674][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 571.927623][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 571.947562][T20550] device veth1_vlan entered promiscuous mode [ 571.960551][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 571.984437][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 571.993335][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 572.012614][T20558] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 572.030525][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 572.039579][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 572.058449][T20556] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 572.073762][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 572.083216][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 572.110223][T20550] device veth0_macvtap entered promiscuous mode [ 572.138771][T20550] device veth1_macvtap entered promiscuous mode [ 572.198440][T20550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 572.218302][T20550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 572.230919][T20550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 572.241915][T20550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 572.251840][T20550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 572.262587][T20550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 572.272468][T20550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 572.283258][T20550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 572.293826][T20550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 572.304354][T20550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 572.316698][T20550] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 572.333787][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 572.349142][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 572.357415][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 572.366461][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 572.380067][T20550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 572.391633][T20550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 572.402960][T20550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 572.413495][T20550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 572.423723][T20550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 572.434638][T20550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 572.444961][T20550] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 572.455519][T20550] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 572.467098][T20550] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 572.486955][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 572.495537][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 572.505072][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 572.514618][ T9923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 572.547910][ T9945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 572.557765][ T9945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 572.572330][T20558] device veth0_vlan entered promiscuous mode [ 572.605200][ T9945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 572.613450][ T9945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 572.640417][T20558] device veth1_vlan entered promiscuous mode [ 572.649739][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 572.658178][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 572.668261][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 572.736312][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 572.749423][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 572.758244][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 572.769653][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 572.777835][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 572.824378][T20556] device veth0_vlan entered promiscuous mode [ 572.856611][T20556] device veth1_vlan entered promiscuous mode [ 572.868434][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 572.897672][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 572.918726][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 572.945622][T20558] device veth0_macvtap entered promiscuous mode [ 572.962845][T20558] device veth1_macvtap entered promiscuous mode [ 572.975970][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 572.987843][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 573.003311][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 573.026841][T20556] device veth0_macvtap entered promiscuous mode [ 573.043979][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 573.052832][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 573.073303][T20558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.084502][T20558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.094739][T20558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.105468][T20558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.115368][T20558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.126659][T20558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.136559][T20558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.154913][T20558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.165628][T20558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.176467][T20558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.186448][T20558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.196909][T20558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.208075][T20558] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 573.221860][T20556] device veth1_macvtap entered promiscuous mode [ 573.229927][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 573.252703][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 573.262681][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 573.271872][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 573.291049][T20558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 573.308928][T20558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.329396][T20558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 573.339916][T20558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.349890][T20558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 573.360359][T20558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.370319][T20558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 573.380818][T20558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.391003][T20558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 573.401924][T20558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.413582][T20558] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 573.425855][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 573.435151][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 573.470006][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.481108][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.491186][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.502245][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.512578][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.523069][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.532959][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.544177][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.554132][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.564639][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.574479][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.585005][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.595037][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 573.605532][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.616718][T20556] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 573.695003][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 573.710630][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 573.802759][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 573.813405][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.823288][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 573.833766][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.843964][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 573.854426][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.865621][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 573.876097][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.886502][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 573.897025][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.907017][T20556] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 573.917477][T20556] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 573.928574][T20556] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 573.982509][ T9945] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 573.991215][ T9945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 574.080590][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 574.098548][T20600] F2FS-fs (loop5): Unable to read 1th superblock [ 574.105286][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 574.116992][T20600] F2FS-fs (loop5): Unable to read 2th superblock [ 574.127206][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 574.140038][T20602] F2FS-fs (loop5): Unable to read 1th superblock [ 574.150351][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 574.161390][T20602] F2FS-fs (loop5): Unable to read 2th superblock 16:47:04 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) 16:47:04 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:04 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x3, 0x0, 0x0, 0x20020, 0x0) 16:47:04 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffff, 0x400000) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x1, 0x6, 0x5, 0x0, 0x0, {0x9, 0x0, 0x9}}, 0x14}}, 0x200080d0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x727b, 0x4000) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000001c0)={0x0, @reserved}) fallocate(r1, 0x3, 0x0, 0x8020003) 16:47:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8904, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:04 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x900, 0x0) 16:47:05 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) [ 574.401221][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 574.413097][T20613] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 574.427580][T20616] F2FS-fs (loop5): Unable to read 1th superblock 16:47:05 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) getsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000), &(0x7f0000000080)=0x4) fallocate(r0, 0x3, 0x0, 0x8020003) [ 574.446407][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 574.487141][T20613] EXT4-fs (sda1): Remounting filesystem read-only [ 574.514010][T20616] F2FS-fs (loop5): Unable to read 2th superblock 16:47:05 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xa00, 0x0) 16:47:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8912, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:05 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x100) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f00000001c0)='wlan0\x00') syz_genetlink_get_family_id$wireguard(&(0x7f0000000000)='wireguard\x00') r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8b1a, &(0x7f0000000040)='wlan0\x00') prctl$PR_GET_FPEXC(0xb, &(0x7f0000000140)) getsockopt$inet6_tcp_int(r8, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r9 = dup(r6) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r11 = dup(r10) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r12 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x20500, 0x0) getsockopt$inet_mtu(r12, 0x0, 0xa, &(0x7f00000003c0), &(0x7f0000000500)=0x4) r13 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r14 = dup(r13) ioctl$PERF_EVENT_IOC_SET_FILTER(r14, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r14, 0xc0045520, &(0x7f0000000580)=0x5) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000000280)={0x0, 0xff, 0x6, [0x9, 0x6, 0x9, 0x3, 0xc8ac, 0x1000]}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r11, 0x84, 0x7c, &(0x7f0000000400)={r15, 0x4, 0x6ecf}, &(0x7f0000000440)=0x8) ioctl$SNDRV_PCM_IOCTL_PAUSE(r5, 0x40044145, &(0x7f0000000180)) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r9, 0x8983, &(0x7f0000000540)={0x6, 'syzkaller0\x00', {0x3f}, 0x3}) write$binfmt_elf64(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="837b11ed43cb6c7685004be4d0d9271f6aa098b2ef8056c5fc2980c8db5f75bd76b07dfff464362d9f", @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRESDEC=0x0, @ANYRES16=r0, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES64=r0], @ANYRESOCT=r3, @ANYRESHEX=r5], @ANYRESOCT=0x0], 0x48) getsockname$inet(r9, &(0x7f0000000200)={0x2, 0x0, @multicast2}, &(0x7f0000000240)=0x10) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:05 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 574.697133][T20640] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:05 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, r0, 0x0, 0x7fffffff) [ 574.740941][T20640] EXT4-fs (sda1): Remounting filesystem read-only 16:47:05 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x4, 0x0, 0x0, 0x20020, 0x0) [ 574.856056][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 574.872828][T20648] F2FS-fs (loop5): Unable to read 1th superblock [ 574.890191][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 574.911424][T20648] F2FS-fs (loop5): Unable to read 2th superblock [ 574.918830][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 574.929793][T20650] F2FS-fs (loop5): Unable to read 1th superblock [ 574.941095][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 574.952411][T20650] F2FS-fs (loop5): Unable to read 2th superblock 16:47:05 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xc00, 0x0) [ 575.111901][T20665] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 575.137827][T20665] EXT4-fs (sda1): Remounting filesystem read-only [ 575.162034][T20669] F2FS-fs (loop5): Unable to read 1th superblock [ 575.174393][T20669] F2FS-fs (loop5): Unable to read 2th superblock 16:47:05 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x1020, 0x0) 16:47:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8933, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:05 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) [ 575.288350][T20676] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 575.296769][T20676] EXT4-fs (sda1): Remounting filesystem read-only 16:47:06 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) 16:47:06 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x5, 0x0, 0x0, 0x20020, 0x0) 16:47:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8982, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:06 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x2000, 0x0) 16:47:06 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) [ 575.898349][T20709] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 575.930419][T20709] EXT4-fs (sda1): Remounting filesystem read-only [ 576.104638][T20717] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 576.121742][T20717] EXT4-fs (sda1): Remounting filesystem read-only [ 578.035894][T20724] IPVS: ftp: loaded support on port[0] = 21 [ 578.106698][T20724] chnl_net:caif_netlink_parms(): no params data found [ 578.156718][T20724] bridge0: port 1(bridge_slave_0) entered blocking state [ 578.164482][T20724] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.173550][T20724] device bridge_slave_0 entered promiscuous mode [ 578.184016][T20724] bridge0: port 2(bridge_slave_1) entered blocking state [ 578.191102][T20724] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.199053][T20724] device bridge_slave_1 entered promiscuous mode [ 578.224855][T20724] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 578.236220][T20724] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 578.260401][T20724] team0: Port device team_slave_0 added [ 578.268064][T20724] team0: Port device team_slave_1 added [ 578.288429][T20724] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 578.295534][T20724] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 578.322764][T20724] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 578.335255][T20724] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 578.343046][T20724] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 578.369109][T20724] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 578.433832][T20724] device hsr_slave_0 entered promiscuous mode [ 578.471820][T20724] device hsr_slave_1 entered promiscuous mode [ 578.531628][T20724] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 578.539216][T20724] Cannot create hsr debugfs directory [ 578.626488][T20724] bridge0: port 2(bridge_slave_1) entered blocking state [ 578.633713][T20724] bridge0: port 2(bridge_slave_1) entered forwarding state [ 578.641037][T20724] bridge0: port 1(bridge_slave_0) entered blocking state [ 578.648147][T20724] bridge0: port 1(bridge_slave_0) entered forwarding state [ 578.710478][T20724] 8021q: adding VLAN 0 to HW filter on device bond0 [ 578.728550][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 578.737894][T13674] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.751300][T13674] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.760288][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 578.774048][T20724] 8021q: adding VLAN 0 to HW filter on device team0 [ 578.790883][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 578.799375][ T2907] bridge0: port 1(bridge_slave_0) entered blocking state [ 578.806479][ T2907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 578.826909][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 578.835583][T13674] bridge0: port 2(bridge_slave_1) entered blocking state [ 578.842704][T13674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 578.869497][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 578.879153][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 578.904245][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 578.912983][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 578.921220][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 578.933529][T20724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 578.958514][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 578.967083][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 578.980600][T20724] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 579.055412][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 579.082516][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 579.090921][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 579.099415][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 579.112487][T20724] device veth0_vlan entered promiscuous mode [ 579.131244][T20724] device veth1_vlan entered promiscuous mode [ 579.176468][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 579.185190][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 579.196427][T20724] device veth0_macvtap entered promiscuous mode [ 579.209803][T20724] device veth1_macvtap entered promiscuous mode [ 579.239253][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 579.250302][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.260352][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 579.271275][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.281739][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 579.292574][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.306957][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 579.317741][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.327676][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 579.338126][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.347999][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 579.358567][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.368453][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 579.378944][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.397212][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 579.412528][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.424567][T20724] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 579.434799][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 579.443893][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 579.451906][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 579.460313][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 579.472319][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 579.483699][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.494751][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 579.505774][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.515684][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 579.526617][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.536555][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 579.547705][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.557728][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 579.568238][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.578173][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 579.588640][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.598518][T20724] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 579.608999][T20724] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 579.620485][T20724] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 579.632079][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 579.640517][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:47:10 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:10 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) 16:47:10 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x2010, 0x0) 16:47:10 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) 16:47:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b0f, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:10 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x20020, 0x0) 16:47:10 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 580.095175][T20744] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 580.119498][T20744] EXT4-fs (sda1): Remounting filesystem read-only 16:47:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b19, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:10 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) 16:47:10 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x2300, 0x0) [ 580.264819][T20760] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 580.288019][T20760] EXT4-fs (sda1): Remounting filesystem read-only 16:47:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x60, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x30, 0x2, [@TCA_BASIC_EMATCHES={0x2c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2e23}}, @TCA_EMATCH_TREE_LIST={0x20, 0x2, 0x0, 0x1, [@TCF_EM_META={0x1c, 0x1, 0x0, 0x0, {{}, [@TCA_EM_META_LVALUE={0x4}, @TCA_EM_META_HDR={0xc}]}}]}]}]}}]}, 0x60}}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000100)=r5) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYRESDEC, @ANYRES64, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRES16, @ANYRES64, @ANYRES32, @ANYRESHEX, @ANYRES32]]], 0x8) r6 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fallocate(r6, 0x3, 0x3, 0x8020003) 16:47:11 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x25f3, 0x0) 16:47:11 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:11 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x7, 0x0, 0x0, 0x20020, 0x0) 16:47:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b36, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:11 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) 16:47:11 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x2804, 0x0) 16:47:11 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0], 0x17) fallocate(r0, 0x3, 0x0, 0x8020003) [ 581.016603][T20800] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 581.083056][T20800] EXT4-fs (sda1): Remounting filesystem read-only 16:47:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b37, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:11 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x0) 16:47:12 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x3f00, 0x0) [ 581.308334][T20817] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:12 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x204000, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000080)={0x1, 0x0, {0xd96f, 0x9, 0x1, 0x5}}) [ 581.361671][T20817] EXT4-fs (sda1): Remounting filesystem read-only 16:47:12 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x8, 0x0, 0x0, 0x20020, 0x0) 16:47:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8bdf, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:12 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:12 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4000, 0x0) [ 581.798801][T20847] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 581.844290][T20847] EXT4-fs (sda1): Remounting filesystem read-only [ 581.961169][ T2626] print_req_error: 2 callbacks suppressed [ 581.961215][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 581.983721][T20854] F2FS-fs (loop5): Unable to read 1th superblock 16:47:12 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x48, 0x0, 0x0, 0x20020, 0x0) [ 582.045802][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 582.058180][T20854] F2FS-fs (loop5): Unable to read 2th superblock 16:47:12 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4504, 0x0) [ 582.223251][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 582.234534][T20863] F2FS-fs (loop5): Unable to read 1th superblock [ 582.250276][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 582.262115][T20863] F2FS-fs (loop5): Unable to read 2th superblock 16:47:12 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4604, 0x0) 16:47:13 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/locks\x00', 0x0, 0x0) recvfrom$x25(r1, &(0x7f0000000080)=""/26, 0x1a, 0x40002000, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000300)={r3, &(0x7f0000000280)=""/66}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000140)={r3, 0x2}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000000)={r3}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') setsockopt$inet_udp_encap(r5, 0x11, 0x64, &(0x7f0000000100)=0x3, 0x4) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r6, 0x3, 0x0, 0x8020003) [ 582.278644][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 582.290425][T20861] F2FS-fs (loop5): Unable to read 1th superblock [ 582.302872][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 582.315310][T20861] F2FS-fs (loop5): Unable to read 2th superblock [ 582.486196][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 582.511250][T20869] F2FS-fs (loop5): Unable to read 1th superblock [ 582.535706][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 582.547844][T20869] F2FS-fs (loop5): Unable to read 2th superblock [ 582.567823][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 582.580591][T20874] F2FS-fs (loop5): Unable to read 1th superblock 16:47:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8bff, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 582.599109][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 582.616624][T20874] F2FS-fs (loop5): Unable to read 2th superblock [ 582.641199][T20876] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 582.663280][T20876] EXT4-fs (sda1): Remounting filesystem read-only [ 582.783257][T20883] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 582.832865][T20883] EXT4-fs (sda1): Remounting filesystem read-only [ 584.828425][T20897] IPVS: ftp: loaded support on port[0] = 21 [ 584.914717][T20897] chnl_net:caif_netlink_parms(): no params data found [ 584.957331][T20897] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.964547][T20897] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.972721][T20897] device bridge_slave_0 entered promiscuous mode [ 584.981563][T20897] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.988674][T20897] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.997308][T20897] device bridge_slave_1 entered promiscuous mode [ 585.018907][T20897] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 585.031472][T20897] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 585.053566][T20897] team0: Port device team_slave_0 added [ 585.064655][T20897] team0: Port device team_slave_1 added [ 585.086066][T20897] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 585.093082][T20897] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 585.119535][T20897] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 585.132448][T20897] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 585.139409][T20897] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 585.165725][T20897] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 585.223361][T20897] device hsr_slave_0 entered promiscuous mode [ 585.271904][T20897] device hsr_slave_1 entered promiscuous mode [ 585.331602][T20897] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 585.339174][T20897] Cannot create hsr debugfs directory [ 585.421093][T20897] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.428216][T20897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 585.435642][T20897] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.442749][T20897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 585.501391][T20897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 585.519681][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 585.529148][ T9959] bridge0: port 1(bridge_slave_0) entered disabled state [ 585.538785][ T9959] bridge0: port 2(bridge_slave_1) entered disabled state [ 585.548103][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 585.566038][T20897] 8021q: adding VLAN 0 to HW filter on device team0 [ 585.579083][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 585.588832][ T9959] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.595974][ T9959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 585.614808][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 585.624794][ T9958] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.631966][ T9958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 585.658917][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 585.687988][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 585.697926][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 585.718732][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 585.734888][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 585.751215][T20897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 585.775776][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 585.783555][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 585.800527][T20897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 585.878211][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 585.904282][ T9945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 585.913489][ T9945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 585.921262][ T9945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 585.932641][T20897] device veth0_vlan entered promiscuous mode [ 585.951329][T20897] device veth1_vlan entered promiscuous mode [ 585.981391][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 585.995101][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 586.006712][T20897] device veth0_macvtap entered promiscuous mode [ 586.018840][T20897] device veth1_macvtap entered promiscuous mode [ 586.047394][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.059406][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.069997][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.080465][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.090476][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.100932][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.110850][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.122321][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.132233][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.142680][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.152566][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.163782][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.173733][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.184408][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.195420][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.205944][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.216055][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.226538][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.237664][T20897] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 586.246629][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 586.256036][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 586.264045][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 586.272786][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 586.287296][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.298117][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.308907][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.319995][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.330583][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.341066][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.353363][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.364359][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.374277][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.384806][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.403002][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.413625][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.423701][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.434518][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.444401][T20897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.455908][T20897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.467606][T20897] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 586.477237][ T9945] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 586.487034][ T9945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:47:17 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='y'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000000)=0x4) 16:47:17 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:17 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4704, 0x0) 16:47:17 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x4c, 0x0, 0x0, 0x20020, 0x0) 16:47:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xab08, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:17 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) [ 586.941031][T20921] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 586.971938][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 587.001638][T20921] EXT4-fs (sda1): Remounting filesystem read-only [ 587.002874][T20916] F2FS-fs (loop5): Unable to read 1th superblock [ 587.030064][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 587.042320][T20916] F2FS-fs (loop5): Unable to read 2th superblock 16:47:17 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r4, 0xc01064c7, &(0x7f0000000180)={0x5, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') sendto$inet(r2, &(0x7f0000000080)="a407a1f603775b2b9372a89342ba0935453f7b4836a762f7e9eb75901215f9e146fe7041f3b37e4dba6e9ea3b02ad675fa406bade1cd4fe858155843fef970fc60ddde25f74b631d6d0b444a0d3212483de08cf38fc182286f24dbafcc7090", 0x5f, 0x8001, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x40) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 587.066212][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 587.100062][T20930] F2FS-fs (loop5): Unable to read 1th superblock [ 587.112150][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 587.123416][T20930] F2FS-fs (loop5): Unable to read 2th superblock 16:47:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xae01, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:17 executing program 4: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 587.244913][T20934] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:17 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4804, 0x0) [ 587.321752][T20934] EXT4-fs (sda1): Remounting filesystem read-only 16:47:18 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x60, 0x0, 0x0, 0x20020, 0x0) 16:47:18 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x40000, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='G'], 0x1) fallocate(r1, 0x3, 0x0, 0x8020003) 16:47:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xae41, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 587.565348][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 587.585875][T20950] F2FS-fs (loop5): Unable to read 1th superblock [ 587.669167][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 587.684356][T20950] F2FS-fs (loop5): Unable to read 2th superblock 16:47:18 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:18 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4904, 0x0) 16:47:18 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'syzkaller0\x00', {'netpci0\x00'}, 0x3}) [ 587.924436][T20969] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 587.971802][T20969] EXT4-fs (sda1): Remounting filesystem read-only 16:47:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xae80, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:18 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 588.177959][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 588.218661][T20976] F2FS-fs (loop5): Unable to read 1th superblock [ 588.304748][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 588.316246][T20976] F2FS-fs (loop5): Unable to read 2th superblock 16:47:19 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:19 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 588.542158][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 588.553476][T20982] F2FS-fs (loop5): Unable to read 1th superblock [ 588.568322][T20991] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:19 executing program 4: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40045431, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 588.602766][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 588.613716][T20991] EXT4-fs (sda1): Remounting filesystem read-only [ 588.622633][T20982] F2FS-fs (loop5): Unable to read 2th superblock 16:47:19 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4a04, 0x0) 16:47:19 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x68, 0x0, 0x0, 0x20020, 0x0) 16:47:19 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="8c"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 588.988580][T21011] F2FS-fs (loop5): Unable to read 1th superblock [ 589.033770][T21011] F2FS-fs (loop5): Unable to read 2th superblock [ 589.091776][T21016] F2FS-fs (loop5): Unable to read 1th superblock [ 589.130945][T21022] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:19 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x0, 0x744, 0xffffffffffffdbb2) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(0xffffffffffffffff, 0xc034564b, &(0x7f0000000000)={0xa17, 0x5c534721, 0xca2, 0x7, 0x3, @stepwise={{0x4b1, 0x9}, {0x9000, 0x8001}, {0x6, 0x8}}}) [ 589.165918][T21016] F2FS-fs (loop5): Unable to read 2th superblock [ 589.187990][T21022] EXT4-fs (sda1): Remounting filesystem read-only 16:47:19 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4b04, 0x0) 16:47:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x400454ca, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:20 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="8ed06ffbf66f5312eb39842d28dffc7c3c6dc8e5423129c845d9c11ce9be132803a38749f79876cbbfb4400dd1f02a3fcda32ab35979895733", 0x39, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='\x00', 0xfffffffffffffffa) keyctl$reject(0x13, r0, 0x100000000, 0xe47, r1) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="3b231b79bffd2dc0b53937bc7a70b8308a6ad50be452b723e63639824f3a290cd32b0fdcd3efc19faee0ffb990a17c0fd0520a8ad11a6d842ae6207dd41732a2e5b58b8464a069"], 0x1) fallocate(r2, 0x3, 0x0, 0x8020003) [ 589.412800][T21029] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:20 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000000)={'syz_tun\x00', {0x2, 0x4e20, @local}}) 16:47:20 executing program 1: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="845ec050fad09214c148be0aad7817a2e26607d6074d03c8be32478afb3a83775c51e3054aa45abd80385ecbd88a594b995c0cddf6fb45eec2bcba179628d7f5678533ad619231213ccda20599c84e7acfe01579abe674aa245c173e2c89649ceee2e81dcc16ae597b478c504f0bd88cd8a3af82ece4b718309098d706be849298842dc0efe965b7b5d5a544126ec790"], 0x1) [ 589.552075][T21029] EXT4-fs (sda1): Remounting filesystem read-only [ 589.651798][T21044] F2FS-fs (loop5): Unable to read 1th superblock [ 589.718716][T21044] F2FS-fs (loop5): Unable to read 2th superblock [ 589.744855][T21050] F2FS-fs (loop5): Unable to read 1th superblock [ 589.786312][T21050] F2FS-fs (loop5): Unable to read 2th superblock 16:47:20 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:20 executing program 4: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4a04, 0x0) 16:47:20 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6c, 0x0, 0x0, 0x20020, 0x0) 16:47:20 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4c04, 0x0) 16:47:20 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000140)={0x3, "7cfcd54eab646699b6feb44f5373af49dd08de3cedff6e037968cd3e1318b5f4", 0x80, 0x5, 0x1, 0x1, 0x1}) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r3) flock(r3, 0x2) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000080)={0x2, 0x6, 0x1e, "6b3b5e8f021f803e47f4c57fa630bbdf318fecb049780d6d9bbe3b7738435f81bd0a2bdbd508d05b1af512099d93b9defbe1a91ced1c0f2bb65e8ec7", 0x4, "aeb6ff28a8660972ae2d394f323b5f015bfca1f170332d38502a52b12cdd7c9103b2f97a69263314dab625db277426e6b164bd2c0b67c707f1a37229", 0xe0}) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40049409, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 590.172496][T21068] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 590.180815][T21068] EXT4-fs (sda1): Remounting filesystem read-only [ 590.199214][T21069] F2FS-fs (loop5): Unable to read 1th superblock [ 590.224171][T21069] F2FS-fs (loop5): Unable to read 2th superblock [ 590.279380][T21075] F2FS-fs (loop5): Unable to read 1th superblock 16:47:21 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) dup3(r1, r0, 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) [ 590.345104][T21075] F2FS-fs (loop5): Unable to read 2th superblock 16:47:21 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4d04, 0x0) [ 590.393832][T21070] F2FS-fs (loop4): Unable to read 1th superblock 16:47:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:21 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 590.493442][T21070] F2FS-fs (loop4): Unable to read 2th superblock [ 590.510713][T21087] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 590.565995][T21087] EXT4-fs (sda1): Remounting filesystem read-only [ 590.610212][T21090] F2FS-fs (loop5): Unable to read 1th superblock [ 590.629991][T21090] F2FS-fs (loop5): Unable to read 2th superblock 16:47:21 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4e04, 0x0) [ 590.657392][T21092] F2FS-fs (loop5): Unable to read 1th superblock [ 590.671734][T21092] F2FS-fs (loop5): Unable to read 2th superblock [ 590.755158][ T27] audit: type=1804 audit(1583081241.396:103): pid=21099 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir403714374/syzkaller.QljxTt/5/file0" dev="sda1" ino=17415 res=1 16:47:21 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x74, 0x0, 0x0, 0x20020, 0x0) [ 590.954865][T21107] F2FS-fs (loop5): Unable to read 1th superblock [ 590.982201][T21107] F2FS-fs (loop5): Unable to read 2th superblock [ 591.031929][T21109] F2FS-fs (loop5): Unable to read 1th superblock [ 591.062893][T21109] F2FS-fs (loop5): Unable to read 2th superblock [ 591.144260][T21115] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 591.170687][T21115] EXT4-fs (sda1): Remounting filesystem read-only 16:47:21 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40086602, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:21 executing program 4 (fault-call:4 fault-nth:0): creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:47:21 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x30, r2, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x30}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r2, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x5}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'tunl0\x00'}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x5f4}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x80}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="84c99e3b67ac78d68e38b13060dd10dd0f121029d5f57a7c591479fd49fd188eb0b5688f19489bf6cc90cc7ca23dadefa0224dff7fbab1101603330a355175e1d5129acf441ac47dea3da2a150a21360db1ceb08abbe6638a86001f69a451cf39ab30737a25d62beec9fa4f552755b6042836eb2afc9f8e3ef65b34e8c93bb6aac6cf28f6eabaac24245c3acecd0577ac418e4b7cbd309cc33f8cf8d57c9b2e1e37564fba3545741a46cf347ed10bbb6d68b308fe190f1d2f83d8815"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:21 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4f04, 0x0) [ 591.279477][T21125] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 591.291668][T21125] EXT4-fs (sda1): Remounting filesystem read-only 16:47:22 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x5004, 0x0) [ 591.432726][T21130] FAULT_INJECTION: forcing a failure. [ 591.432726][T21130] name failslab, interval 1, probability 0, space 0, times 0 [ 591.492119][T21130] CPU: 0 PID: 21130 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 591.502049][T21130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.512107][T21130] Call Trace: [ 591.515427][T21130] dump_stack+0x197/0x210 [ 591.519787][T21130] should_fail.cold+0x5/0xf [ 591.524309][T21130] ? setup_fault_attr+0x1f0/0x1f0 [ 591.529358][T21130] ? ___might_sleep+0x163/0x2c0 [ 591.534237][T21130] __should_failslab+0xb7/0x100 16:47:22 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="fbba46"], 0x1) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) fallocate(r0, 0x3, 0xb59400000000, 0x3) [ 591.539100][T21130] should_failslab+0x9/0x14 [ 591.543612][T21130] kmem_cache_alloc_trace+0x2d3/0x790 [ 591.549035][T21130] alloc_pipe_info+0x116/0x520 [ 591.553908][T21130] splice_direct_to_actor+0x80e/0xa30 [ 591.559291][T21130] ? __lock_acquire+0x1af3/0x6320 [ 591.564336][T21130] ? generic_pipe_buf_nosteal+0x10/0x10 [ 591.569921][T21130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 591.576298][T21130] ? do_splice_to+0x180/0x180 [ 591.580995][T21130] ? rw_verify_area+0x126/0x360 [ 591.585908][T21130] do_splice_direct+0x1da/0x2a0 [ 591.590760][T21130] ? splice_direct_to_actor+0xa30/0xa30 [ 591.596338][T21130] ? rcu_read_lock_any_held+0xcd/0xf0 [ 591.601725][T21130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 591.608027][T21130] ? __this_cpu_preempt_check+0x35/0x190 [ 591.613663][T21130] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 591.620034][T21130] ? __sb_start_write+0x1f6/0x4a0 [ 591.625064][T21130] do_sendfile+0x597/0xd00 [ 591.629529][T21130] ? do_compat_pwritev64+0x1c0/0x1c0 [ 591.634823][T21130] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 591.641084][T21130] ? fput+0x1b/0x20 [ 591.644904][T21130] __x64_sys_sendfile64+0x1dd/0x220 [ 591.650120][T21130] ? __ia32_sys_sendfile+0x230/0x230 [ 591.655436][T21130] ? do_syscall_64+0x26/0x790 [ 591.660108][T21130] ? lockdep_hardirqs_on+0x421/0x5e0 [ 591.665411][T21130] ? trace_hardirqs_on+0x67/0x240 [ 591.670465][T21130] do_syscall_64+0xfa/0x790 [ 591.674981][T21130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 591.680888][T21130] RIP: 0033:0x45c479 [ 591.684780][T21130] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 591.704386][T21130] RSP: 002b:00007f4a78e2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 591.712820][T21130] RAX: ffffffffffffffda RBX: 00007f4a78e2b6d4 RCX: 000000000045c479 [ 591.720789][T21130] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 591.728749][T21130] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 591.736711][T21130] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000006 [ 591.744681][T21130] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000000 16:47:22 executing program 4 (fault-call:4 fault-nth:1): creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:47:22 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x7a, 0x0, 0x0, 0x20020, 0x0) 16:47:22 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4008ae89, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:22 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x5104, 0x0) 16:47:22 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="23c7df534c038306265e5d047a78d3b18c6ef869ff0910f6b5a34a744d6cd756005e2f0c6a949a958ea9b27342221de34dbd064149e31026780d6c25b9746bedb101bc4dba464dabdbedf89cf1bec440010e171e7a0382137ec1cbde2bcf81764b02b2b760497ec3c639c4f6883fa5df6a77942470db29e02d2a39a79d939a8754da3add630fbbdc57a9c71c3d5cd3dcbab39023"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 592.080195][T21153] FAULT_INJECTION: forcing a failure. [ 592.080195][T21153] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 592.093532][T21153] CPU: 0 PID: 21153 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 592.103423][T21153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.113488][T21153] Call Trace: [ 592.116801][T21153] dump_stack+0x197/0x210 [ 592.120167][T21155] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 592.121170][T21153] should_fail.cold+0x5/0xf [ 592.133980][T21153] ? setup_fault_attr+0x1f0/0x1f0 [ 592.139177][T21153] ? rcu_read_unlock+0x16/0x60 [ 592.143958][T21153] ? find_held_lock+0x35/0x130 [ 592.148749][T21153] should_fail_alloc_page+0x50/0x60 [ 592.153962][T21153] __alloc_pages_nodemask+0x1a1/0x910 [ 592.157706][T21155] EXT4-fs (sda1): Remounting filesystem read-only [ 592.159363][T21153] ? lock_downgrade+0x920/0x920 [ 592.159385][T21153] ? __alloc_pages_slowpath+0x2900/0x2900 [ 592.159414][T21153] ? rcu_read_unlock+0x2e/0x60 [ 592.181135][T21153] cache_grow_begin+0x90/0xc60 [ 592.185915][T21153] ? trace_hardirqs_off+0x62/0x240 [ 592.191043][T21153] kmem_cache_alloc_trace+0x6b3/0x790 [ 592.196422][T21153] ? _parse_integer+0x139/0x190 [ 592.201373][T21153] alloc_pipe_info+0x116/0x520 [ 592.206176][T21153] splice_direct_to_actor+0x80e/0xa30 [ 592.211555][T21153] ? __lock_acquire+0x1af3/0x6320 [ 592.216610][T21153] ? generic_pipe_buf_nosteal+0x10/0x10 [ 592.222179][T21153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 592.228434][T21153] ? do_splice_to+0x180/0x180 [ 592.233127][T21153] ? rw_verify_area+0x126/0x360 [ 592.238063][T21153] do_splice_direct+0x1da/0x2a0 [ 592.242947][T21153] ? splice_direct_to_actor+0xa30/0xa30 [ 592.248503][T21153] ? rcu_read_lock_any_held+0xcd/0xf0 [ 592.253894][T21153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 592.260150][T21153] ? __this_cpu_preempt_check+0x35/0x190 [ 592.265799][T21153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 592.272070][T21153] ? __sb_start_write+0x1f6/0x4a0 [ 592.277127][T21153] do_sendfile+0x597/0xd00 [ 592.281607][T21153] ? do_compat_pwritev64+0x1c0/0x1c0 [ 592.286921][T21153] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 592.293188][T21153] ? fput+0x1b/0x20 [ 592.297037][T21153] __x64_sys_sendfile64+0x1dd/0x220 [ 592.302255][T21153] ? __ia32_sys_sendfile+0x230/0x230 [ 592.307557][T21153] ? do_syscall_64+0x26/0x790 [ 592.312253][T21153] ? lockdep_hardirqs_on+0x421/0x5e0 [ 592.317561][T21153] ? trace_hardirqs_on+0x67/0x240 [ 592.322641][T21153] do_syscall_64+0xfa/0x790 [ 592.327171][T21153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 592.333075][T21153] RIP: 0033:0x45c479 [ 592.336994][T21153] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 592.356623][T21153] RSP: 002b:00007f4a78e2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 592.365051][T21153] RAX: ffffffffffffffda RBX: 00007f4a78e2b6d4 RCX: 000000000045c479 [ 592.373035][T21153] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 592.381020][T21153] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 592.389065][T21153] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000006 [ 592.397050][T21153] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000001 [ 592.515584][T21171] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:23 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:23 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xb400, 0x0) 16:47:23 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="84cc08b7d2635517a26b4d0e0500842c42a176ec2aa4fa8a1bafa03ac6fe323077f8a4e985c5fe004be9254024b1c389a2e2797c9c46fd584de8a31a6d412f5e925223776266e548f798ab601ed04d875ec48923e6"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 592.621972][T21171] EXT4-fs (sda1): Remounting filesystem read-only 16:47:23 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b1a, &(0x7f0000000040)='wlan0\x00') recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@hci, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)=""/66, 0x42}], 0x1, &(0x7f0000000300)=""/141, 0x8d}, 0x2001) 16:47:23 executing program 4 (fault-call:4 fault-nth:2): creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:47:23 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4008ae90, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:23 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x20020, 0x0) 16:47:23 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xedc0, 0x0) 16:47:23 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4000, &(0x7f00000001c0)=0x3, 0x7, 0x2) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r1, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xa0e}]}, 0x20}, 0x1, 0x0, 0x0, 0x801}, 0x40001) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r2, 0x3, 0x0, 0x8020003) 16:47:23 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 593.037817][T21198] FAULT_INJECTION: forcing a failure. [ 593.037817][T21198] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 593.051059][T21198] CPU: 1 PID: 21198 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 593.060955][T21198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.071275][T21198] Call Trace: [ 593.074619][T21198] dump_stack+0x197/0x210 [ 593.078976][T21198] should_fail.cold+0x5/0xf [ 593.083507][T21198] ? splice_direct_to_actor+0x80e/0xa30 [ 593.089075][T21198] ? setup_fault_attr+0x1f0/0x1f0 [ 593.094106][T21198] ? rcu_read_unlock+0x16/0x60 [ 593.098879][T21198] ? find_held_lock+0x35/0x130 [ 593.103929][T21198] should_fail_alloc_page+0x50/0x60 [ 593.109143][T21198] __alloc_pages_nodemask+0x1a1/0x910 [ 593.114705][T21198] ? lock_downgrade+0x920/0x920 [ 593.119575][T21198] ? __alloc_pages_slowpath+0x2900/0x2900 [ 593.125318][T21198] ? rcu_read_unlock+0x2e/0x60 [ 593.130112][T21198] cache_grow_begin+0x90/0xc60 [ 593.134888][T21198] ? trace_hardirqs_off+0x62/0x240 [ 593.140044][T21198] __kmalloc+0x6b2/0x770 [ 593.144297][T21198] ? kmem_cache_alloc_trace+0x397/0x790 [ 593.149851][T21198] ? _parse_integer+0x139/0x190 [ 593.154740][T21198] ? alloc_pipe_info+0x1dd/0x520 [ 593.159697][T21198] alloc_pipe_info+0x1dd/0x520 [ 593.164509][T21198] splice_direct_to_actor+0x80e/0xa30 [ 593.169903][T21198] ? __lock_acquire+0x1af3/0x6320 [ 593.174942][T21198] ? generic_pipe_buf_nosteal+0x10/0x10 [ 593.180514][T21198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 593.186766][T21198] ? do_splice_to+0x180/0x180 [ 593.191460][T21198] ? rw_verify_area+0x126/0x360 [ 593.196332][T21198] do_splice_direct+0x1da/0x2a0 [ 593.201208][T21198] ? splice_direct_to_actor+0xa30/0xa30 [ 593.206764][T21198] ? rcu_read_lock_any_held+0xcd/0xf0 [ 593.212156][T21198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 593.218413][T21198] ? __this_cpu_preempt_check+0x35/0x190 [ 593.224062][T21198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 593.230312][T21198] ? __sb_start_write+0x1f6/0x4a0 [ 593.235353][T21198] do_sendfile+0x597/0xd00 [ 593.239804][T21198] ? do_compat_pwritev64+0x1c0/0x1c0 [ 593.245104][T21198] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 593.251833][T21198] ? fput+0x1b/0x20 [ 593.255661][T21198] __x64_sys_sendfile64+0x1dd/0x220 [ 593.260869][T21198] ? __ia32_sys_sendfile+0x230/0x230 [ 593.266166][T21198] ? do_syscall_64+0x26/0x790 [ 593.270858][T21198] ? lockdep_hardirqs_on+0x421/0x5e0 [ 593.276198][T21198] ? trace_hardirqs_on+0x67/0x240 [ 593.281246][T21198] do_syscall_64+0xfa/0x790 [ 593.285772][T21198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 593.291666][T21198] RIP: 0033:0x45c479 [ 593.295571][T21198] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 593.315174][T21198] RSP: 002b:00007f4a78e2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 593.323594][T21198] RAX: ffffffffffffffda RBX: 00007f4a78e2b6d4 RCX: 000000000045c479 16:47:23 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf000, 0x0) 16:47:23 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="9e"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$RTC_PIE_ON(r2, 0x7005) 16:47:23 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf325, 0x0) 16:47:23 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 593.331569][T21198] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 593.339548][T21198] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 593.347631][T21198] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000006 [ 593.355606][T21198] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000002 [ 593.396505][T21202] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 593.441771][T21202] EXT4-fs (sda1): Remounting filesystem read-only 16:47:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40186366, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:24 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xff00, 0x0) [ 593.593432][T21236] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 593.624088][T21236] EXT4-fs (sda1): Remounting filesystem read-only 16:47:24 executing program 4 (fault-call:4 fault-nth:3): creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:47:24 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') sendmsg$RDMA_NLDEV_CMD_RES_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x1409, 0x100, 0x70bd29, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x38}}, 0x40040c50) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x90) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r3) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESDEC], 0x2b) r4 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x90000, 0x0) fallocate(r4, 0x3, 0x1, 0x1) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002840)='/dev/vsock\x00', 0x8000, 0x0) setsockopt$netrom_NETROM_T1(r5, 0x103, 0x1, &(0x7f0000002880), 0x4) 16:47:24 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x20020, 0x0) 16:47:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4020940d, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:24 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 594.007380][T21255] FAULT_INJECTION: forcing a failure. [ 594.007380][T21255] name failslab, interval 1, probability 0, space 0, times 0 [ 594.072286][T21260] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 594.075824][T21255] CPU: 1 PID: 21255 Comm: syz-executor.4 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 594.090477][T21255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.100549][T21255] Call Trace: [ 594.103857][T21255] dump_stack+0x197/0x210 [ 594.108352][T21255] should_fail.cold+0x5/0xf [ 594.112580][T21260] EXT4-fs (sda1): Remounting filesystem read-only 16:47:24 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xff0f, 0x0) [ 594.112902][T21255] ? setup_fault_attr+0x1f0/0x1f0 [ 594.112935][T21255] ? ___might_sleep+0x163/0x2c0 [ 594.130152][T21255] __should_failslab+0xb7/0x100 [ 594.135012][T21255] should_failslab+0x9/0x14 [ 594.139524][T21255] __kmalloc+0x2e0/0x770 [ 594.143797][T21255] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 594.150046][T21255] ? ext4_find_extent+0x7e1/0xa50 [ 594.155114][T21255] ext4_find_extent+0x7e1/0xa50 [ 594.160003][T21255] ext4_ext_map_blocks+0x1dc/0x3ac0 [ 594.165741][T21255] ? mark_held_locks+0xf0/0xf0 [ 594.170527][T21255] ? ext4_ext_release+0x10/0x10 [ 594.175415][T21255] ? __kasan_check_write+0x14/0x20 [ 594.180539][T21255] ? down_read+0x109/0x440 [ 594.184969][T21255] ? down_read_killable+0x490/0x490 [ 594.190176][T21255] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 594.196433][T21255] ? ext4_es_lookup_extent+0x426/0xd40 [ 594.201989][T21255] ext4_map_blocks+0xdc7/0x17e0 [ 594.206877][T21255] ? ext4_issue_zeroout+0x1e0/0x1e0 [ 594.212096][T21255] ? stack_trace_save+0x8f/0xc0 [ 594.216967][T21255] ? stack_trace_consume_entry+0x170/0x170 [ 594.222781][T21255] ? __lock_acquire+0x8a0/0x6320 [ 594.227734][T21255] ? __lock_acquire+0x8a0/0x6320 [ 594.232682][T21255] ? __lock_acquire+0x8a0/0x6320 [ 594.237646][T21255] ext4_iomap_begin+0x55b/0x720 [ 594.242515][T21255] ? save_stack+0x5c/0x90 [ 594.246859][T21255] ? save_stack+0x23/0x90 [ 594.251196][T21255] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 594.257008][T21255] ? kasan_kmalloc+0x9/0x10 [ 594.261578][T21255] ? iomap_dio_rw+0x26c/0x11b0 [ 594.266378][T21255] ? ext4_iomap_begin_report+0x500/0x500 [ 594.272019][T21255] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 594.278185][T21255] ? iomap_dio_rw+0xa45/0x11b0 [ 594.282961][T21255] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 594.288520][T21255] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 594.294511][T21255] ? pagecache_isize_extended+0x3d0/0x3d0 [ 594.300245][T21255] ? iomap_dio_rw+0xa45/0x11b0 [ 594.305017][T21255] iomap_apply+0x1b6/0xda0 [ 594.309434][T21255] ? iomap_dio_bio_actor+0xf20/0xf20 [ 594.314728][T21255] ? trace_event_raw_event_iomap_apply+0x470/0x470 [ 594.321258][T21255] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 594.327258][T21255] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 594.333091][T21255] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 594.339347][T21255] ? filemap_check_errors+0xae/0x150 [ 594.344657][T21255] iomap_dio_rw+0xa45/0x11b0 [ 594.349254][T21255] ? iomap_dio_bio_actor+0xf20/0xf20 [ 594.354587][T21255] ? iomap_dio_complete+0x780/0x780 [ 594.359817][T21255] ? down_read_killable+0x490/0x490 [ 594.365568][T21255] ? memcg_kmem_put_cache+0xad/0x1a0 [ 594.370873][T21255] ext4_file_read_iter+0x45a/0x620 [ 594.375990][T21255] ? ext4_file_read_iter+0x45a/0x620 [ 594.381300][T21255] generic_file_splice_read+0x4af/0x800 [ 594.386864][T21255] ? add_to_pipe+0x3b0/0x3b0 [ 594.391492][T21255] ? rw_verify_area+0x126/0x360 [ 594.396351][T21255] ? add_to_pipe+0x3b0/0x3b0 [ 594.400959][T21255] do_splice_to+0x127/0x180 [ 594.405498][T21255] splice_direct_to_actor+0x320/0xa30 [ 594.410889][T21255] ? generic_pipe_buf_nosteal+0x10/0x10 [ 594.416464][T21255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 594.422715][T21255] ? do_splice_to+0x180/0x180 [ 594.427411][T21255] ? rw_verify_area+0x126/0x360 [ 594.432278][T21255] do_splice_direct+0x1da/0x2a0 [ 594.437165][T21255] ? splice_direct_to_actor+0xa30/0xa30 [ 594.442724][T21255] ? rcu_read_lock_any_held+0xcd/0xf0 [ 594.448116][T21255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 594.454368][T21255] ? __this_cpu_preempt_check+0x35/0x190 [ 594.460047][T21255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 594.466295][T21255] ? __sb_start_write+0x1f6/0x4a0 [ 594.471337][T21255] do_sendfile+0x597/0xd00 [ 594.475801][T21255] ? do_compat_pwritev64+0x1c0/0x1c0 [ 594.481104][T21255] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 594.487365][T21255] ? fput+0x1b/0x20 [ 594.491238][T21255] __x64_sys_sendfile64+0x1dd/0x220 [ 594.496449][T21255] ? __ia32_sys_sendfile+0x230/0x230 [ 594.501743][T21255] ? do_syscall_64+0x26/0x790 [ 594.506436][T21255] ? lockdep_hardirqs_on+0x421/0x5e0 [ 594.511737][T21255] ? trace_hardirqs_on+0x67/0x240 [ 594.516767][T21255] do_syscall_64+0xfa/0x790 [ 594.521261][T21255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 594.527142][T21255] RIP: 0033:0x45c479 [ 594.531028][T21255] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 594.552533][T21255] RSP: 002b:00007f4a78e2ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 594.560937][T21255] RAX: ffffffffffffffda RBX: 00007f4a78e2b6d4 RCX: 000000000045c479 16:47:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4020ae46, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 594.568899][T21255] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 594.576852][T21255] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 594.584811][T21255] R10: 000000007fffffff R11: 0000000000000246 R12: 0000000000000006 [ 594.592767][T21255] R13: 00000000000008d1 R14: 00000000004cb364 R15: 0000000000000003 16:47:25 executing program 4 (fault-call:4 fault-nth:4): creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:47:25 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:25 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf0ffff, 0x0) [ 594.790091][T21285] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:25 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xfeffff, 0x0) 16:47:25 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r3 = creat(0x0, 0x0) r4 = accept(r3, &(0x7f0000000240)=@rc={0x1f, @fixed}, &(0x7f00000002c0)=0x80) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000000)={r7}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000300)={r7, 0x596}, 0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000080)={r7, @in={{0x2, 0x4e20, @loopback}}, 0x20, 0x7, 0xffffffff, 0x0, 0xa4, 0x80000000, 0xa9}, 0x9c) fallocate(r0, 0x3, 0x0, 0x8020003) [ 594.931743][T21285] EXT4-fs (sda1): Remounting filesystem read-only 16:47:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4090ae82, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:25 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:47:25 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x600, 0x0, 0x0, 0x20020, 0x0) 16:47:25 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:25 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x1000000, 0x0) 16:47:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4138ae84, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 595.373876][T21326] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:26 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fff0010) [ 595.491625][T21326] EXT4-fs (sda1): Remounting filesystem read-only [ 595.538866][ T2625] print_req_error: 22 callbacks suppressed [ 595.538891][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 595.558228][T21335] F2FS-fs (loop5): Unable to read 1th superblock [ 595.573489][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 595.584676][T21335] F2FS-fs (loop5): Unable to read 2th superblock [ 595.600924][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 595.612339][T21340] F2FS-fs (loop5): Unable to read 1th superblock [ 595.625938][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 595.637971][T21340] F2FS-fs (loop5): Unable to read 2th superblock 16:47:26 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x2000000, 0x0) 16:47:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x80045430, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 595.694709][T21327] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 595.729583][T21327] EXT4-fs (sda1): Remounting filesystem read-only 16:47:26 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffff10) 16:47:26 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:26 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x20020, 0x0) [ 595.857688][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 595.881753][T21354] F2FS-fs (loop5): Unable to read 1th superblock 16:47:26 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 595.966396][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 595.977524][T21354] F2FS-fs (loop5): Unable to read 2th superblock 16:47:26 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='.'], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000000)) [ 596.033650][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 596.045030][T21356] F2FS-fs (loop5): Unable to read 1th superblock [ 596.052787][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:47:26 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x3000000, 0x0) 16:47:26 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7ffffff0) [ 596.081740][T21356] F2FS-fs (loop5): Unable to read 2th superblock [ 596.141681][T21372] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 596.198328][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 596.210676][T21378] F2FS-fs (loop5): Unable to read 1th superblock [ 596.231147][T21372] EXT4-fs (sda1): Remounting filesystem read-only [ 596.242501][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 596.255138][T21378] F2FS-fs (loop5): Unable to read 2th superblock 16:47:27 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4000000, 0x0) 16:47:27 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'], 0x1) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') fallocate(r2, 0x2, 0x0, 0x8020005) [ 596.454616][T21487] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 596.477265][T21492] F2FS-fs (loop5): Unable to read 1th superblock [ 596.491836][T21492] F2FS-fs (loop5): Unable to read 2th superblock [ 596.519741][T21487] EXT4-fs (sda1): Remounting filesystem read-only 16:47:27 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x5000000, 0x0) 16:47:27 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$EVIOCGNAME(r3, 0x80404506, &(0x7f0000000140)=""/207) sendfile(r0, r1, 0x0, 0x7fffffff) [ 596.819418][T21602] F2FS-fs (loop5): Unable to read 1th superblock [ 596.839690][T21602] F2FS-fs (loop5): Unable to read 2th superblock [ 598.022539][T11060] tipc: TX() has been purged, node left! [ 598.211674][T11060] tipc: TX() has been purged, node left! [ 598.371702][T11060] tipc: TX() has been purged, node left! [ 600.750907][T21741] IPVS: ftp: loaded support on port[0] = 21 [ 600.839996][T21741] chnl_net:caif_netlink_parms(): no params data found [ 600.889816][T21741] bridge0: port 1(bridge_slave_0) entered blocking state [ 600.897121][T21741] bridge0: port 1(bridge_slave_0) entered disabled state [ 600.906070][T21741] device bridge_slave_0 entered promiscuous mode [ 600.921247][T21741] bridge0: port 2(bridge_slave_1) entered blocking state [ 600.928728][T21741] bridge0: port 2(bridge_slave_1) entered disabled state [ 600.937345][T21741] device bridge_slave_1 entered promiscuous mode [ 600.959046][T21741] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 600.974786][T21741] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 600.998355][T21741] team0: Port device team_slave_0 added [ 601.006896][T21741] team0: Port device team_slave_1 added [ 601.031262][T21741] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 601.038280][T21741] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 601.075683][T21741] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 601.089450][T21741] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 601.097291][T21741] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 601.124813][T21741] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 601.194905][T21741] device hsr_slave_0 entered promiscuous mode [ 601.242816][T21741] device hsr_slave_1 entered promiscuous mode [ 601.281701][T21741] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 601.289351][T21741] Cannot create hsr debugfs directory [ 601.378083][T21741] bridge0: port 2(bridge_slave_1) entered blocking state [ 601.385232][T21741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 601.392649][T21741] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.399703][T21741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 601.470910][T21741] 8021q: adding VLAN 0 to HW filter on device bond0 [ 601.487919][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 601.497722][T13674] bridge0: port 1(bridge_slave_0) entered disabled state [ 601.507448][T13674] bridge0: port 2(bridge_slave_1) entered disabled state [ 601.517274][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 601.534227][T21741] 8021q: adding VLAN 0 to HW filter on device team0 [ 601.559731][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 601.570227][T13530] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.577349][T13530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 601.602470][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 601.611010][T13530] bridge0: port 2(bridge_slave_1) entered blocking state [ 601.618136][T13530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 601.643215][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 601.652597][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 601.667255][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 601.686377][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 601.695427][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 601.707615][T21741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 601.735378][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 601.743761][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 601.761190][T21741] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 601.844096][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 601.870074][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 601.878653][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 601.888276][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 601.896505][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 601.910580][T21741] device veth0_vlan entered promiscuous mode [ 601.927552][T21741] device veth1_vlan entered promiscuous mode [ 601.956774][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 601.965054][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 601.973574][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 601.982768][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 601.998044][T21741] device veth0_macvtap entered promiscuous mode [ 602.015100][T21741] device veth1_macvtap entered promiscuous mode [ 602.036752][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 602.049064][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.058968][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 602.069534][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.080361][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 602.090989][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.100917][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 602.111605][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.121414][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 602.131897][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.141771][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 602.153352][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.163256][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 602.173785][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.184327][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 602.195054][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.205546][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 602.216066][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.225925][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 602.236538][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.247933][T21741] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 602.257711][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 602.268023][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 602.276187][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 602.284979][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 602.296963][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 602.308699][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.318974][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 602.329754][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.340496][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 602.353676][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.364048][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 602.374927][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.385077][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 602.395990][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.406108][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 602.417434][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.427873][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 602.438362][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.448386][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 602.458873][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.469673][T21741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 602.480151][T21741] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 602.492577][T21741] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 602.503173][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 602.512864][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:47:33 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x80086301, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:33 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x1f00, 0x0, 0x0, 0x20020, 0x0) 16:47:33 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:33 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) r1 = shmget(0x1, 0x1000, 0xf0000284, &(0x7f0000ffb000/0x1000)=nil) shmat(r1, &(0x7f0000ffb000/0x2000)=nil, 0x6000) r2 = socket$pppoe(0x18, 0x1, 0x0) read(r2, &(0x7f0000000300)=""/4096, 0x1000) shmctl$IPC_RMID(r1, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000100)=0x1e) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000080)=""/100) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:33 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x6000000, 0x0) 16:47:33 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x80) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 603.341339][ T2625] print_req_error: 4 callbacks suppressed [ 603.341357][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 603.360598][T21772] F2FS-fs (loop5): Unable to read 1th superblock [ 603.372674][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 603.386421][T21772] F2FS-fs (loop5): Unable to read 2th superblock 16:47:34 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x28) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:34 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r3) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0xfffffff7, 0xd8086631915fde4c, 0x4, 0x1000000, 0x2, {0x77359400}, {0x2, 0x8, 0x1, 0x40, 0xfa, 0x7, "dde91c4d"}, 0x1000, 0x4, @fd, 0x80, 0x0, r3}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)={0x24, r6, 0x1, 0x0, 0x0, {{}, {}, {0xa4}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r6, 0x400, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0xfff, 0x6, 0x5, 0x8}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) [ 603.424560][T21775] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 603.452957][T21775] EXT4-fs (sda1): Remounting filesystem read-only 16:47:34 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x20) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 603.650692][T21866] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:34 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x80984120, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 603.691751][T21866] EXT4-fs (sda1): Remounting filesystem read-only 16:47:34 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000, 0x0, 0x0, 0x20020, 0x0) 16:47:34 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x7000000, 0x0) 16:47:34 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYBLOB="9f38898195efc44a9f8fdcfc707508822356635d012af40a60cb4a7b736d7122659eb32fbf9c3ca32baff5580da8251cef4779d29b4cd346070268c0d0a5"], 0x1) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./bus\x00', 0xb2d, 0xa, &(0x7f0000001500)=[{&(0x7f0000000100)="d33d25d4f8dd2b70eb3d3116620e0e3fb44dbd13187c6b5b5dc011d8f9e5bf5c5bc2029b04b3d63401ed2d7c46b313f26472bbb3e0295f30f2d63bad0943f65d9fcb5382675ccb8b3c657bcde7aa69f91588cac424f320f169d4d154583c2e7f1c7a120026f370fdb7825688e0c4762fdc0667cf25c05c3ce0fc9a47b0854d9eda6c3df1425e37a8174f1c00230eb61163f9fc3ce6b2c7023974", 0x9a, 0x4982}, {&(0x7f00000001c0)="4408c82e516ac90c5a6aaf", 0xb, 0x7}, {&(0x7f0000000200)="14f40bba51e9650d8a6a1298d3f6400263ad86c4321b9eb5a962561b71bbdf53d3005615afb5ff4c668fd58ac53832d72eb27dcda07191d3faa42c68952b48d865c01eb5a521d7", 0x47, 0x1}, {&(0x7f0000000280)="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", 0x1000, 0x2}, {&(0x7f0000001280)="905f8596404d11809b970df35a5c7dbf15e154a3871ffc7ce20268391e9b80ebdf8b1a385dc6cabe7d90efe6434bbcbe497a155bb29971f2b017ac174caa6bb9626ec17b96047e32385ba16449ff4a48ac04470cdcf74a3c810e5701156021d88f7e565be9fb4494bf871a954751bdc61292d8a3952404f31283a737a94cadc6efb779ac091ff79bee8ef220779e9de9a9b5538c01860a3871cb7638c59f41205d071134e7e3b4a9f0c0acf4ccb00f8cf93c6b90", 0xb4, 0x5f}, {&(0x7f0000001340)="854fa68a679aa293ef934f8dbee8f5f02a7b3190a626af2bc9338848d0f098efc84a4de2f2", 0x25, 0x297}, {&(0x7f0000001380)="cb0c2674812c1d22de92ad0cf993", 0xe, 0x956}, {&(0x7f00000013c0)="2acb53a34607ede147ffd1b6e571202025c034118da6322eb0b753c2aa8d49764a8799531757dd0a862a0fdc47e9dddf7e411d31def5a71c24ce387eae6792304ff04832f9ebde91dabfdc1125d93fe475f149129934143044936dc443e2cec6ffcd7e723e30a7b6e99f3e745f723d3925ff93a8", 0x74, 0x2}, {&(0x7f0000001440)="a1361a4fc9e9b60c423e74069b99a97375f47e96b7809a17", 0x18, 0x6}, {&(0x7f0000001480)="6aecedeff462ff105bd04ef84f18acf19758f91c99e75dd162bebabf055d0e36a49e86b78771db6d0d584cf375a86714a1715a794b77e82c3594ddb63074b068efa04f3a106148ddd4c3a12b3cce8881712ae9624c1f2c0cd29ad2886dacccfa14203805cd", 0x65, 0x7}], 0x811, &(0x7f0000001600)=ANY=[@ANYBLOB='nonumtail=0,shortname=winnt,shortname=winnt,rodir,nnonumtail=1,shortname=lower,nonumtail=0,shortname=lower,mask=MAY_WRITE,defcontext=\x00ystem_u,fsmagic=0x0000000000000cf1,smackfsroot=\\@bdev,\x00']) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000000)={0x5}, 0x1) 16:47:34 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x151903, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7) [ 604.154321][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 604.171890][T21916] F2FS-fs (loop5): Unable to read 1th superblock 16:47:34 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8138ae83, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 604.202747][T21919] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 604.252899][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 604.269161][T21916] F2FS-fs (loop5): Unable to read 2th superblock [ 604.297684][T21919] EXT4-fs (sda1): Remounting filesystem read-only 16:47:35 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6(0xa, 0x800, 0xf8) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) socket$nl_sock_diag(0x10, 0x3, 0x4) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7f, 0x2088c1) getsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) sendfile(r0, r1, 0x0, 0x7fffffff) [ 604.376581][ T27] audit: type=1800 audit(1583081255.016:104): pid=21949 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17440 res=0 [ 604.434914][T21927] FAT-fs (loop1): Unrecognized mount option "nnonumtail=1" or missing value [ 604.498212][T21988] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 604.523918][T21988] EXT4-fs (sda1): Remounting filesystem read-only 16:47:35 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x8000000, 0x0) 16:47:35 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:35 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x3f00, 0x0, 0x0, 0x20020, 0x0) 16:47:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc0045878, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:35 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x1) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 604.957315][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 604.970797][T22059] F2FS-fs (loop5): Unable to read 1th superblock [ 605.026626][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 605.037927][T22059] F2FS-fs (loop5): Unable to read 2th superblock 16:47:35 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x2) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 605.149351][T22043] FAT-fs (loop1): Unrecognized mount option "nnonumtail=1" or missing value [ 605.175213][T22072] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc0045878, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 605.212878][T22072] EXT4-fs (sda1): Remounting filesystem read-only 16:47:36 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x9000000, 0x0) [ 605.318824][ T27] audit: type=1804 audit(1583081255.956:105): pid=22180 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir403714374/syzkaller.QljxTt/22/file0" dev="sda1" ino=17424 res=1 [ 605.504497][T22186] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:36 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) 16:47:36 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x107) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/102, 0x66) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000200)={0x9e0000, 0x4, 0x79dd, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x980923, 0x100, [], @p_u8=&(0x7f00000000c0)=0x6}}) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000280)=""/94) sendfile(r0, r1, 0x0, 0x7fffffff) [ 605.578138][ T27] audit: type=1804 audit(1583081255.966:106): pid=22180 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir403714374/syzkaller.QljxTt/22/file0" dev="sda1" ino=17424 res=1 [ 605.638248][T22186] EXT4-fs (sda1): Remounting filesystem read-only 16:47:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc008ae05, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 605.740065][ T27] audit: type=1804 audit(1583081255.976:107): pid=22180 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir403714374/syzkaller.QljxTt/22/file0" dev="sda1" ino=17424 res=1 [ 605.813587][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 605.840739][T22197] F2FS-fs (loop5): Unable to read 1th superblock [ 605.852054][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:47:36 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x4000, 0x0, 0x0, 0x20020, 0x0) [ 605.880310][T22197] F2FS-fs (loop5): Unable to read 2th superblock 16:47:36 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) dup(r2) r3 = accept4(r2, 0x0, &(0x7f0000000040), 0x800) recvfrom$llc(r3, &(0x7f0000000140)=""/73, 0x49, 0x10000, &(0x7f00000000c0)={0x1a, 0x31f4356f7d931a0e, 0x5, 0x4, 0x8, 0x4, @multicast}, 0x10) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:47:36 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:36 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$IOC_PR_PREEMPT_ABORT(r5, 0x401870cc, &(0x7f0000000380)={0x0, 0x6, 0xfffffff8, 0x40}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000340)={&(0x7f0000000180)={0x1d, r3}, 0x10, &(0x7f0000000300)={&(0x7f0000000240)={0x4, 0x400, 0xfffffffe, {r6, r7/1000+10000}, {r8, r9/1000+10000}, {0x4, 0x0, 0x1}, 0x1, @canfd={{}, 0x3b, 0x0, 0x0, 0x0, "b3ceb921dc4556148fafdb02ea96dd652fe57aa3ac3e88172fe37f435097f4add088eebbba0ea2986eea44528c5e79e8d37044bed7ad895ddf5adc1180b36b52"}}, 0x80}, 0x1, 0x0, 0x0, 0x44}, 0x20000000) [ 605.999258][ T27] audit: type=1804 audit(1583081255.986:108): pid=22183 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir403714374/syzkaller.QljxTt/22/file0" dev="sda1" ino=17424 res=1 16:47:36 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xa000000, 0x0) 16:47:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc0189436, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 606.146929][T22313] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:36 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xffffffff, 0x8840) recvfrom$rxrpc(r2, &(0x7f00000000c0)=""/31, 0x1f, 0x60, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x0, @empty}}, 0x24) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 606.236781][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 606.250167][T22324] F2FS-fs (loop5): Unable to read 1th superblock [ 606.268204][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 606.279640][T22324] F2FS-fs (loop5): Unable to read 2th superblock 16:47:37 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$NBD_DO_IT(r1, 0xab03) creat(&(0x7f00000000c0)='./file0\x00', 0x189) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) [ 606.404342][T22313] EXT4-fs (sda1): Remounting filesystem read-only 16:47:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc020660b, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:37 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xc000000, 0x0) [ 606.607869][T22445] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 606.663234][T22445] EXT4-fs (sda1): Remounting filesystem read-only 16:47:37 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x4800, 0x0, 0x0, 0x20020, 0x0) [ 606.853044][T22453] F2FS-fs (loop5): Unable to read 1th superblock [ 606.884156][T22453] F2FS-fs (loop5): Unable to read 2th superblock 16:47:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc020aa00, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:37 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 607.081615][T22506] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 607.089909][T22506] EXT4-fs (sda1): Remounting filesystem read-only 16:47:37 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x10000000, 0x0) 16:47:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc0505405, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 607.345497][T22577] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 607.356739][T22575] F2FS-fs (loop5): Unable to read 1th superblock [ 607.366761][T22577] EXT4-fs (sda1): Remounting filesystem read-only [ 607.373674][T22575] F2FS-fs (loop5): Unable to read 2th superblock 16:47:38 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[@ANYRES64=r1, @ANYRES16], 0xa) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:38 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x4c00, 0x0, 0x0, 0x20020, 0x0) 16:47:38 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x20000000, 0x0) 16:47:38 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x100, 0x200) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lgetxattr(&(0x7f0000000ac0)='./file0/../file0/file0\x00', &(0x7f0000000b00)=@random={'osx.', 'wlan0\x00'}, &(0x7f0000000b40), 0x0) setuid(r4) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000800)=0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r6, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r7) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r9 = dup(r8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8b1a, &(0x7f0000000040)='wlan0\x00') statx(r9, &(0x7f0000000840)='./file0\x00', 0x2000, 0x100, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000140)='./file0/../file0\x00', 0xfffffffffffff088, 0x8, &(0x7f0000000740)=[{&(0x7f0000000280)="057e3da331afbcb0bc28b9aa323bcb10e6f1e70f576284d8d914499f8a1872e807af15b603342cd7283600c443132dc2fb51a4fd8690984327445f7700868abe46c6200809e6cae41851a588e20ab01b28cb0a0697f3a15f82c6be79add27829fc37fe27fcb776054f3c4d292fbcb40eafbb01a19d454fc2ab378f9f9f6b6ab4df96e56ddb3456d6213e83ffa42666c65d1c95e7aded3922d65a9f1fdef82c4efae46752ec306a13ff7080a0f4f6f5edc706cb9451957177af8a00f39211aa48120687bfd3", 0xc5, 0x8}, {&(0x7f0000000180)="f7ff745e96d2430ae7707676eb04a4efbc34d3d8f64e1973ba6e8ffef5fdfb8adcc179ea373414cd27d01f438d3ce1d03eca0bc0b10cffc8b10b18ed1645897b4ec5c11286fb22d65915c50b0779cd4ad38c27ce9f46003a088ab8f3bf628334e3cfde846ac6c504dc061ca1b6adf703723695fcba0265c10195ad83d4eb689f9a8af1bea769d9a5a3191b42f47477", 0x8f, 0x71}, {&(0x7f0000000380)="011493f4b9a9382fe1d0980fb904363ff842f5f995c9b7a6a4fc9b35183661ff1e9cda0126af1daa65e775e15e88a42f9b20c556070287c02215df46e71221e56fb13c47db8d791ceba974100087614348c1ac1763c90910ecb308a8cd1819dfdd9234b3f6af8fe954dc12fb461f9d38eaccbc", 0x73, 0x9}, {&(0x7f0000000400)="1b76464b9517debaa4554dae445afbf2dd65794e8754abfb47657a49e25384e4a6a680b2f0f2e583e50bead648ba3213c1168fbfbf8ce15a66fcf97efe6a9495a576c0d98b192e65e2", 0x49, 0x81}, {&(0x7f0000000480)="7cba3441e8282b2212d9013be58ecaf9ee6d17649db294e96ee685423891266a257906665c4f81ead98d109f418f50f63de50d0b545fcad76aae1fa9286021969b0e3d93d586ec6c090249c24754b99fbfcebb397324191d2f968efbbad2be9787bc33e890b6df014685261e31f0a6bba87e90ad156505dda8ac8b69cbd3300712f219b9d81010be0e9a0627ef64d27147ffae5dfbbfc6fc53b1f238cca1c2b863cfbab6252c54dfea864f2e55", 0xad, 0x1}, {&(0x7f0000000540)="6d40a3dd5167d08a49db107893db33420418dc7bb0edcd22522840d849e1a17384160e47d6faead7497ad16dac4b47418857fb9595ebc9dbccdc5bd31c167e9295bcf6f347a90df56a08f33b4903e47289a4dbce76f0c520af491200fb952eefb07826201f0e64ddfc5f79012d033a3f34bdf622264fb7c40d", 0x79, 0x79}, {&(0x7f00000005c0)="3d983063085f6402a1d6f15fbc66201a6bd25138f8f2354f2fc0dc9b49461d8d79accf8c372d9226d8246684d397408fc6d0ca279901314fce7899ec7d357e3d39b3edae24c1a922ae4e25812334c731a8fa521f99207a7b7c57354e651bcd6c04c96846c9e7f887748c757e3ea69ff0b85cc60b58", 0x75, 0x7}, {&(0x7f0000000640)="cfd853ff2d7a8f0831b416caa0ee7a365b289a3296aae0d828f39f2821f88bb4c0a2f3405fb8082909b9cbc7394160aa25e935312d7211df0ad68a52229f86c62b24d3bc0af24524d51eb7dfd8a2f3ba4f685e51cfdac52dcc823f867f3987de1ac32c2ef9297cba4ac0138caf8c4f83e9daeaf7dda06a0261e8c1a305fab41ef620c21ac8e1f86f0ae9d7ce59e19635b12312d87237172ece9df4097961af7d79eacc038bb7a8b5b26e2c40fdab7b11dc316e48af8c85d1c71cbc5c20c6917ee97149d579", 0xc5, 0x1}], 0x40e1, &(0x7f0000000980)={[{@whint_mode_fs='whint_mode=fs-based'}, {@fastboot='fastboot'}, {@noflush_merge='noflush_merge'}, {@background_gc_off='background_gc=off'}, {@alloc_mode_def='alloc_mode=default'}, {@test_dummy_encryption='test_dummy_encryption'}, {@fastboot='fastboot'}, {@whint_mode_fs='whint_mode=fs-based'}], [{@euid_gt={'euid>', r4}}, {@euid_lt={'euid<', r5}}, {@uid_eq={'uid', 0x3d, r7}}, {@appraise_type='appraise_type=imasig'}, {@permit_directio='permit_directio'}, {@fowner_eq={'fowner', 0x3d, r10}}]}) 16:47:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='w#an0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:38 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x20100000, 0x0) [ 607.996181][T22699] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:38 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x23000000, 0x0) 16:47:38 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$VIDIOC_TRY_DECODER_CMD(r4, 0xc0485661, &(0x7f00000001c0)={0x4, 0x2, @stop_pts=0x3f}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @rand_addr=0x80}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e24, @remote}], 0x60) sendfile(r1, r2, 0x0, 0x7fffffff) 16:47:38 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6000, 0x0, 0x0, 0x20020, 0x0) 16:47:39 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:39 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="4844b108cbc3d8ba470e0f573f3e0496ed2c5bbd55e00c5e3309ce57cf92b5f7e71efaeb99a98fa021d9d1656eaff7cd01ef7462109c84f4462c5661f4e759f62eaef819fd7b0218a3144f8fac0df2baee0ad7b6582973cbe0369dcd8af65929be8a310b9a166d3407f58ec834742c087552d5fca93a7771ca007dde04aaf5b319427e6876361fc1af08b4c087a4417bb2fb01b4ac139836c1a5056683bde2da29e832ffd784f78a8324833d600e8d528b637276896334490b19573d5ff9455d920cc9625acd1f3c9edece06b16f2197602406ed4cb2eb1c8f5dfdfea7eefb3a9500"/235], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 608.356699][T22930] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 608.363108][ T2626] print_req_error: 4 callbacks suppressed [ 608.363125][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 608.384678][T22926] F2FS-fs (loop5): Unable to read 1th superblock 16:47:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='w%an0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 608.436197][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 608.447588][T22926] F2FS-fs (loop5): Unable to read 2th superblock [ 608.456325][T22937] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:39 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000380)) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r10) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x60, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x30, 0x2, [@TCA_BASIC_EMATCHES={0x2c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2e23}}, @TCA_EMATCH_TREE_LIST={0x20, 0x2, 0x0, 0x1, [@TCF_EM_META={0x1c, 0x2, 0x0, 0x0, {{}, [@TCA_EM_META_LVALUE={0x4}, @TCA_EM_META_HDR={0xc}]}}]}]}]}}]}, 0x60}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x1d, r9}, 0x10, &(0x7f00000001c0)={&(0x7f0000000140)={0x7, 0x420, 0x9f9, {r11, r12/1000+30000}, {0x0, 0x2710}, {0x3}, 0x1, @canfd={{0x3}, 0x1c, 0x2, 0x0, 0x0, "ea49f94b297e4122f42c78ed0c3d8dfef473d3c9b0cf4d5211cc56b8b80d693af791c9f0cba9ca8ccf0a0967da8d20defc48289fec924d56a87056b6b76bb488"}}, 0x80}, 0x1, 0x0, 0x0, 0x44800}, 0x800) [ 608.657986][T22937] EXT4-fs: 2 callbacks suppressed [ 608.657997][T22937] EXT4-fs (sda1): Remounting filesystem read-only 16:47:39 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') mq_timedsend(r2, &(0x7f0000000000)="b0cb553e06f722dee4927d94ce05ba226ea55abc3f8d6a58d5cd8f54df13ced58988945983252be7880d20ec7a", 0x2d, 0x100, &(0x7f0000000080)={0x0, 0x1c9c380}) 16:47:39 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6800, 0x0, 0x0, 0x20020, 0x0) 16:47:39 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x28040000, 0x0) 16:47:39 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, 0x0, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 609.218485][T23069] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 609.277052][T23069] EXT4-fs (sda1): Remounting filesystem read-only [ 609.451059][T23178] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:40 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x3f000000, 0x0) [ 609.497789][T23178] EXT4-fs (sda1): Remounting filesystem read-only 16:47:40 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6c00, 0x0, 0x0, 0x20020, 0x0) [ 609.663740][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 609.678443][T23186] F2FS-fs (loop5): Unable to read 1th superblock [ 609.702453][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:47:40 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8"], &(0x7f0000000080)=0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 609.714077][T23186] F2FS-fs (loop5): Unable to read 2th superblock 16:47:40 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x40000000, 0x0) [ 609.989683][T23301] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 610.046053][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 610.057269][T23307] F2FS-fs (loop5): Unable to read 1th superblock [ 610.063899][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 610.069368][T23301] EXT4-fs (sda1): Remounting filesystem read-only [ 610.076228][T23307] F2FS-fs (loop5): Unable to read 2th superblock 16:47:40 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:47:40 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000080)=0xe) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='w*an0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:41 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x45040000, 0x0) [ 610.355695][T23417] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:41 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="afe64619a73265b2a53716ea290a75ccb93b9b32cd0896a41a0ca241f8a3795295c1bb17ccba10a898ffc49ddcb949b57a7d61d924c96994744b53563cdd442481dec218a2c4724b68bdf684dda4f283ffe39998aea58297da8e9cf7b2ac4b5028cfdb717deba6fe1a92de4c0b3bedcf3d907ebebc5a81320b95d1d94b764ee7803d2b926db8ba66b0fd2bce49b5a93f1001aa57e05a0eedbb750f23e0465bcad075726d6fee4af82efde868e11bde6097c5a5e740dca95931603f2e53a4fa1f9055a1"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 610.441638][T23417] EXT4-fs (sda1): Remounting filesystem read-only 16:47:41 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') recvfrom$ax25(r3, &(0x7f0000000280)=""/4096, 0x1000, 0x20, &(0x7f0000000140)={{0x3, @bcast, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r4) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000040)='\x00', 0x0, r4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:47:41 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x7400, 0x0, 0x0, 0x20020, 0x0) 16:47:41 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='w+an0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:41 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) write$vhost_msg_v2(r0, &(0x7f0000000100)={0x2, 0x0, {&(0x7f0000000080)=""/116, 0x74, &(0x7f0000000000)=""/1, 0x2, 0x1}}, 0x48) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, 0xd, 0x6, 0x542579a2a9534333, 0x0, 0x0, {0xb, 0x0, 0x4}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000041}, 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:41 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x46040000, 0x0) [ 610.979390][T23549] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 611.050438][T23549] EXT4-fs (sda1): Remounting filesystem read-only [ 611.204891][T23630] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:41 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x500, 0x0) [ 611.267625][T23630] EXT4-fs (sda1): Remounting filesystem read-only 16:47:42 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x47040000, 0x0) 16:47:42 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x7a00, 0x0, 0x0, 0x20020, 0x0) 16:47:42 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x48040000, 0x0) 16:47:42 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0xfff9, 0x8000, 0x4, 0x3, 0x0}, &(0x7f00000000c0)=0x10) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r6 = creat(0x0, 0x0) r7 = accept(r6, &(0x7f0000000240)=@rc={0x1f, @fixed}, &(0x7f00000002c0)=0x80) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000000)={r10}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r7, 0x84, 0x23, &(0x7f0000000300)={r10, 0x596}, 0x8) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0xe, &(0x7f0000000180)={r10, 0xba1, 0x9, 0x9, 0x9, 0x800, 0x396c, 0x1000, {r3, @in6={{0xa, 0x4e22, 0x0, @ipv4, 0xf2f}}, 0x7, 0x9, 0x1000, 0x1f30f5ce, 0x8e2c}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={r3, 0xbf31}, &(0x7f0000000140)=0x8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x1a}, 0x33}) 16:47:42 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 611.899654][T23791] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 611.938456][T23791] EXT4-fs (sda1): Remounting filesystem read-only [ 612.078725][T23902] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 612.121830][T23902] EXT4-fs (sda1): Remounting filesystem read-only 16:47:43 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x1114008, &(0x7f0000000340)={[{@mode={'mode'}}, {@mode={'mode', 0x3d, 0x1ff}}, {@mode={'mode', 0x3d, 0x302a}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x1000}}, {@mode={'mode', 0x3d, 0x8da5}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x6}}]}) 16:47:43 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x49040000, 0x0) 16:47:43 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xff00, 0x0, 0x0, 0x20020, 0x0) 16:47:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='w-an0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:43 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000000)) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) setpriority(0x1, r4, 0x9) 16:47:43 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYRES32=0x0], &(0x7f0000000080)=0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:43 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4a040000, 0x0) [ 612.677695][T23914] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 612.750868][T23914] EXT4-fs (sda1): Remounting filesystem read-only 16:47:43 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) 16:47:43 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x20000, 0x0, 0x0, 0x20020, 0x0) 16:47:43 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4b040000, 0x0) 16:47:43 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r2, 0x0, 0x7fffffff) 16:47:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='w.an0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 613.136288][T24148] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:43 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r3 = openat(r2, &(0x7f0000000000)='./bus\x00', 0x800, 0x21) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000080)) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:44 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4cc002, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) write$binfmt_aout(r2, &(0x7f0000000280)={{0x108, 0x6, 0xe9, 0x277, 0x3b1, 0xe9, 0x1db, 0x7f}, "0da223116c94f9ac39532f09d2affc44d9a17e0d86d570876f7c25b10e43f953bf", [[], [], [], [], [], [], [], [], []]}, 0x941) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) futex(&(0x7f0000000040)=0x2, 0x8b, 0x2, 0x0, &(0x7f00000000c0), 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r7, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r8, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r9) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000003000)={0x0, 0x400, {r7}, {r9}, 0x2, 0x6}) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r12) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r13, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r14) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file1\x00', 0x3ea, 0x7, &(0x7f0000002f40)=[{&(0x7f00000001c0)="af13af0340dc2f0dbddc1f613f6be4fb6c313d4ec2c3995d81e53614ad8e15bbcf9de3167b7a27f0b9885edf8ed29c0017e35b294d3c4e6ce9470004caa02e103e250a448875f9315959994893dbb0809dd97f4297be891a936cd8e82b5af0e636488f3d5ce57aba20e9b33044ed583234b53e9f01189201b3c79a270f00f8", 0x7f, 0x7ff}, {&(0x7f0000000c00)="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", 0x1000, 0x81}, {&(0x7f0000001c00)="80012bf44b3e280ec51976943d75cb3192e8da28685e935c9f5de2e7510148a78ad9193a7ae2fe4f40bd470ee36b09e1d633072b61ac2bdf1ac49ce5644ccd33fa9e307600d58fb67765cf0e2997d2a41e2fcd82de5c5222ec9e1246323d8951a715de7c4d413a6d4ad42e686977d7f04fc198e7839805b3802bec5d346cd95f7be037fb3c6545cc69288b1272a69611ab9bd2ad5233990a9e6e6d068ce7ebc7b7654610769ca12af4f374b4f1bc8584e885ce29a706e77d0ed1378847f68568e3190db76cc7c05056c6d92e7acd", 0xce, 0x101}, {&(0x7f0000001d00)="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", 0x1000, 0x22}, {&(0x7f0000002d00)="10bb9cdccc40c87865e09bda5c5f3eb99b3357275d4372a4c08969ef15dcbeac08facd44faf4ebc50ff05515de6ac2c2e1d99a42caaf0bc575928b68439ecf3168492211c66f8ca7661ff1795f66fe9a0e9810b4aac5d7e7f45b2cb1b9efe0a3172b7ca2a16f030bc45b4b187194f0e51fcb9f824ac88e6479b018f4a90516808d6fd2cdd858f19edd0858a71865d0bdf90e71d974736ffddc760473726bbf00132a425d5ef014273bf70273faf10ed2ffe94fc945b8275a27a0c00e85ce4e9572ec642484447ad908f8226175ec37876ba11ed2356dc0399888ad8500c816c0fe08623fdfacefc290274032bb5cae6539fcdc5445c01b74b1", 0xf9, 0x5}, {&(0x7f0000002e00), 0x0, 0x10000}, {&(0x7f0000002e40)="75756e178a8245a2b4dce75143b64d7acd655ef1d64a948b5af46020483d8ee798a6ed5ee3d5098522e1a79b5b80f0e274dc05da6d85b3be98998c6c3d1ceff739d099b910fb9eb1972d729b86ab0752c2c231418a307da03d1daf1e6574f49aad8cf0a1513e7e486a2ada2ca66d667a1b253f9da763f0d16e1e4c7010decb4725a7bbd6b06a7eda921fb6e2cd14240223dfde37880522da802b2258a8cf76baf15bb3372ae94e470ce8fbedbb290d0079aec1406e956dd172540b2a4274d81416bced20c12f5eb73f2e09350f9d61e996afc8e1e2", 0xd5, 0x101}], 0x2000080, &(0x7f0000003040)={[{@nodiscard='nodiscard'}, {@whint_mode_off='whint_mode=off'}, {@whint_mode_fs='whint_mode=fs-based'}], [{@permit_directio='permit_directio'}, {@audit='audit'}, {@appraise='appraise'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'eth0\''}}, {@uid_eq={'uid', 0x3d, r10}}, {@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@uid_eq={'uid', 0x3d, r12}}, {@uid_lt={'uid<', r14}}, {@appraise_type='appraise_type=imasig'}, {@smackfsdef={'smackfsdef', 0x3d, ':'}}]}) sendfile(r0, r1, 0x0, 0x7fffffff) 16:47:44 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4c040000, 0x0) [ 613.514790][T24268] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:47:44 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x40000, 0x0, 0x0, 0x20020, 0x0) 16:47:44 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYRES32=0x0], &(0x7f0000000080)=0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 614.056082][T24281] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 614.087107][T24281] EXT4-fs: 2 callbacks suppressed [ 614.087118][T24281] EXT4-fs (sda1): Remounting filesystem read-only 16:47:44 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x80000, 0x0, 0x0, 0x20020, 0x0) 16:47:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='w0an0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:47:45 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x1c7) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:47:45 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x428c2, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) preadv(r2, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/30, 0x1e}], 0x1, 0x5) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 614.671770][T24299] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 614.721695][T24299] EXT4-fs (sda1): Remounting filesystem read-only 16:47:45 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) 16:47:45 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x801ffff) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$EXT4_IOC_ALLOC_DA_BLKS(r4, 0x660c) [ 614.765748][ T27] audit: type=1800 audit(1583081265.396:109): pid=24310 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17474 res=0 [ 614.975794][T24315] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 615.011602][T24315] EXT4-fs (sda1): Remounting filesystem read-only 16:47:45 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYRES32=0x0], &(0x7f0000000080)=0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:47:45 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000140)=@v2={0x5, 0x6, 0xd, 0x3ff, 0xe5, "400e65a0e514ef681d28762d017ef044fc4cb2d542751d930a61f3fa46fe390077c231213ea31acdb82622366b4fc89fafb5a810550711b8c3524162c8529f04ea69d13baf554b340dcdbca9e3ffe74962e332a54d654a97873ea8bdadd022a2e3a1b1cdb8fc8964e7acaae0c9cf6e9769bb9af54641b41938803240144a21789bc505a8e642ac26be10273a80a24e5430b3822e45934c1f4092c692a7a3d036f0bdd541a3e1cd7d2ca95146087b673784b488c6a65589012526c6edb77eabd5b5e706213b69aa18bd6cfd66d531202bee21d56d26c1d19a6d6f2b8b7a73cd26387531e779"}, 0xee, 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:47:45 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x20020, 0x0) [ 615.883807][T24343] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 615.918577][T24343] EXT4-fs (sda1): Remounting filesystem read-only [ 616.054411][T24346] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 616.082178][T24346] EXT4-fs (sda1): Remounting filesystem read-only [ 618.067173][T24353] IPVS: ftp: loaded support on port[0] = 21 [ 618.101038][T11060] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 618.108662][T11060] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 618.117867][T11060] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 618.125389][T11060] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 618.134785][T11060] device bridge_slave_1 left promiscuous mode [ 618.140948][T11060] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.193516][T11060] device bridge_slave_0 left promiscuous mode [ 618.199790][T11060] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.257522][T11060] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 618.265354][T11060] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 618.274831][T11060] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 618.282627][T11060] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 618.290931][T11060] device bridge_slave_1 left promiscuous mode [ 618.297513][T11060] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.343496][T11060] device bridge_slave_0 left promiscuous mode [ 618.349708][T11060] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.399007][T11060] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 618.406548][T11060] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 618.416206][T11060] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 618.424052][T11060] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 618.433173][T11060] device bridge_slave_1 left promiscuous mode [ 618.439310][T11060] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.492717][T11060] device bridge_slave_0 left promiscuous mode [ 618.498873][T11060] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.584073][T11060] device veth1_macvtap left promiscuous mode [ 618.590719][T11060] device veth0_macvtap left promiscuous mode [ 618.597707][T11060] device veth1_vlan left promiscuous mode [ 618.604140][T11060] device veth0_vlan left promiscuous mode [ 618.713274][T11060] device veth1_macvtap left promiscuous mode [ 618.719687][T11060] device veth0_macvtap left promiscuous mode [ 618.728545][T11060] device veth1_vlan left promiscuous mode [ 618.734960][T11060] device veth0_vlan left promiscuous mode [ 618.853913][T11060] device veth1_macvtap left promiscuous mode [ 618.860526][T11060] device veth0_macvtap left promiscuous mode [ 618.867830][T11060] device veth1_vlan left promiscuous mode [ 618.874213][T11060] device veth0_vlan left promiscuous mode [ 631.342571][T11060] device hsr_slave_0 left promiscuous mode [ 631.391832][T11060] device hsr_slave_1 left promiscuous mode [ 631.453851][T11060] team0 (unregistering): Port device team_slave_1 removed [ 631.468481][T11060] team0 (unregistering): Port device team_slave_0 removed [ 631.483200][T11060] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 631.536341][T11060] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 631.655049][T11060] bond0 (unregistering): Released all slaves [ 631.942232][T11060] device hsr_slave_0 left promiscuous mode [ 631.991642][T11060] device hsr_slave_1 left promiscuous mode [ 632.064492][T11060] team0 (unregistering): Port device team_slave_1 removed [ 632.081202][T11060] team0 (unregistering): Port device team_slave_0 removed [ 632.092678][T11060] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 632.126160][T11060] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 632.256040][T11060] bond0 (unregistering): Released all slaves [ 632.723282][T11060] device hsr_slave_0 left promiscuous mode [ 632.771606][T11060] device hsr_slave_1 left promiscuous mode [ 632.840004][T11060] team0 (unregistering): Port device team_slave_1 removed [ 632.855126][T11060] team0 (unregistering): Port device team_slave_0 removed [ 632.868521][T11060] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 632.919973][T11060] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 633.047110][T11060] bond0 (unregistering): Released all slaves [ 633.228477][T24353] chnl_net:caif_netlink_parms(): no params data found [ 633.276452][T24353] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.283822][T24353] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.292021][T24353] device bridge_slave_0 entered promiscuous mode [ 633.307618][T24353] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.314806][T24353] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.323465][T24353] device bridge_slave_1 entered promiscuous mode [ 633.351591][T24353] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 633.363964][T24353] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 633.386219][T24353] team0: Port device team_slave_0 added [ 633.395325][T24353] team0: Port device team_slave_1 added [ 633.415713][T24353] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 633.422775][T24353] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 633.449710][T24353] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 633.463446][T24353] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 633.470400][T24353] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 633.496879][T24353] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 633.593552][T24353] device hsr_slave_0 entered promiscuous mode [ 633.631796][T24353] device hsr_slave_1 entered promiscuous mode [ 633.671623][T24353] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 633.679181][T24353] Cannot create hsr debugfs directory [ 633.768647][T24353] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.775753][T24353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 633.783148][T24353] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.790190][T24353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.854036][T24353] 8021q: adding VLAN 0 to HW filter on device bond0 [ 633.879098][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 633.888586][ T9959] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.896616][ T9959] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.913273][T24353] 8021q: adding VLAN 0 to HW filter on device team0 [ 633.925853][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 633.934943][ T9958] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.942055][ T9958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.956124][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 633.969648][ T9958] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.976747][ T9958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 634.006087][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 634.015288][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 634.035451][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 634.043766][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 634.052092][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 634.063978][T24353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 634.089389][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 634.097371][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 634.115261][T24353] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 634.188618][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 634.214275][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 634.222488][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 634.231315][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 634.239616][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 634.255246][T24353] device veth0_vlan entered promiscuous mode [ 634.271419][T24353] device veth1_vlan entered promiscuous mode [ 634.306691][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 634.315131][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 634.323904][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 634.333244][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 634.346278][T24353] device veth0_macvtap entered promiscuous mode [ 634.365891][T24353] device veth1_macvtap entered promiscuous mode [ 634.389083][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 634.400740][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.411428][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 634.422917][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.432988][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 634.443809][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.453694][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 634.464177][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.474530][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 634.484999][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.494871][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 634.505533][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.515976][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 634.526493][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.536386][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 634.547114][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.558988][T24353] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 634.567741][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 634.577132][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 634.585288][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 634.594182][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 634.606132][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 634.622812][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.632955][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 634.643562][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.653450][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 634.666157][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.676081][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 634.686526][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.696404][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 634.706944][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.717006][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 634.727598][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.737681][T24353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 634.748607][T24353] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 634.759868][T24353] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 634.769370][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 634.779126][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:48:05 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4d040000, 0x0) 16:48:05 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000200)) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$MON_IOCG_STATS(r5, 0x80089203, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x2, @loopback, 0x5}, {0xa, 0x4e20, 0x9, @mcast2, 0x6}, r2, 0x7}}, 0x48) 16:48:05 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:05 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="d6dbb7a5681485d572bc1be0292180d2e1bf1b5f12c7d16cb7ed509c3e4ae092551a32f86eaee8456ea3cca067df0095bbed2cffc9918ff884d1f6af83b3159c88d5db84c5c7ad2c44eec22ea452f4bc562531d73d6bf08a7e98"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:48:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wLan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:05 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x20020, 0x0) [ 635.115638][T24379] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 635.158261][T24379] EXT4-fs (sda1): Remounting filesystem read-only 16:48:05 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x40001) fallocate(r0, 0x51, 0x0, 0x8020003) [ 635.357647][T24393] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:06 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x2, 'batadv0\x00', {0x8}, 0x1}) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8d4402, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LISTALL(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="c8000000", @ANYRES16=r4, @ANYBLOB="200025bd7000fddbdf2504000000ac000c802c000b8008000a002e3f000008000900cb86b67808000900bdeac90908000a00fb5d0000080009005606dd3744000b8008000a000c79000008000900ee309f3b08000900fa673d23080020ad83cdec3fdb675adab3d00c0900bc41aa6608000900f463873208000a00dea8000008000a00ee8f8464080009007c2b07171c000b80080009005bae873608000900a671c56208000a0082cd00001c000b8008000abbaafe84383acd848590515000d3fe000008000900075e786808000a00803de2659533b06d303ddc15096ab96b40"], 0xc8}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_GET(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x30, r8, 0x1, 0x0, 0x0, {0x7}, [@L2TP_ATTR_IFNAME={0x14}, @L2TP_ATTR_SEND_SEQ={0x5}]}, 0x30}}, 0x0) sendmsg$L2TP_CMD_SESSION_CREATE(r6, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r8, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) sendfile(r0, r1, 0x0, 0x7fffffff) 16:48:06 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4e040000, 0x0) 16:48:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wXan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 635.552821][T24393] EXT4-fs (sda1): Remounting filesystem read-only 16:48:06 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x400000008020007) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:48:06 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x20020, 0x0) 16:48:06 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') sendfile(r0, r2, 0x0, 0x7fffffff) 16:48:06 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:06 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x22) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) [ 636.007558][T24423] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 636.070143][T24423] EXT4-fs (sda1): Remounting filesystem read-only [ 636.232019][T24435] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:06 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000000)) [ 636.294295][T24435] EXT4-fs (sda1): Remounting filesystem read-only 16:48:07 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x1000000, 0x0, 0x0, 0x20020, 0x0) 16:48:07 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(0xffffffffffffffff, 0x40084149, &(0x7f0000000040)=0x6) truncate(&(0x7f00000001c0)='./file0\x00', 0x1) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$SNDRV_PCM_IOCTL_STATUS64(r5, 0x80984120, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f00000000c0)={0x5, 0x4, 0x66, 0x6}, 0x10) [ 636.670177][T24444] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:07 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="88ce86116e60db618da713fe9e776c99c88089b5fd65b4f62e6cd8b08ffaafb15e3b8b99edfb6bd5bff49edc1b3c6239606b8c6d7b7af9024b3bb14568af5da6dfb5a429f63f9de39e8162aa4a56f85719d942cb7c545b000030a3d275e927e23c2cadf01daa086bd2437584a550f0e579272ebb5123e8eab0e5fdb274d0c6170ca673ecba6e4880ccb78da8cb8f3f93e2d38d2cec997be019643f349a51ff"], 0x9f) fallocate(r0, 0x13, 0x0, 0x8020003) 16:48:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wuan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 636.711996][T24444] EXT4-fs (sda1): Remounting filesystem read-only [ 636.814364][T24452] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 636.852371][T24452] EXT4-fs (sda1): Remounting filesystem read-only [ 639.108770][T24469] IPVS: ftp: loaded support on port[0] = 21 [ 639.205052][T24469] chnl_net:caif_netlink_parms(): no params data found [ 639.267751][T24469] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.275057][T24469] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.284011][T24469] device bridge_slave_0 entered promiscuous mode [ 639.293405][T24469] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.300540][T24469] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.309184][T24469] device bridge_slave_1 entered promiscuous mode [ 639.333826][T24469] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 639.352672][T24469] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 639.380504][T24469] team0: Port device team_slave_0 added [ 639.395769][T24469] team0: Port device team_slave_1 added [ 639.414528][T24469] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 639.421604][T24469] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 639.448034][T24469] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 639.462350][T24469] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 639.469310][T24469] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 639.495919][T24469] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 639.565009][T24469] device hsr_slave_0 entered promiscuous mode [ 639.602111][T24469] device hsr_slave_1 entered promiscuous mode [ 639.641674][T24469] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 639.649245][T24469] Cannot create hsr debugfs directory [ 639.753821][T24469] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.760921][T24469] bridge0: port 2(bridge_slave_1) entered forwarding state [ 639.768363][T24469] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.775503][T24469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 639.863490][T24469] 8021q: adding VLAN 0 to HW filter on device bond0 [ 639.884699][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 639.899450][T13530] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.924536][T13530] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.940720][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 639.964750][T24469] 8021q: adding VLAN 0 to HW filter on device team0 [ 639.983953][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 639.992549][T13530] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.999583][T13530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 640.025001][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 640.032235][T24475] IPVS: ftp: loaded support on port[0] = 21 [ 640.034741][ T9959] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.046034][ T9959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 640.066089][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 640.084890][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 640.093284][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 640.121473][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 640.129982][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 640.147683][T24469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 640.187542][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 640.196083][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 640.218116][T24469] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 640.308355][T24475] chnl_net:caif_netlink_parms(): no params data found [ 640.416531][T24475] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.423799][T24475] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.438499][T24475] device bridge_slave_0 entered promiscuous mode [ 640.448545][T24475] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.461764][T24475] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.469475][T24475] device bridge_slave_1 entered promiscuous mode [ 640.496735][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 640.511878][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 640.537226][T24475] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 640.550513][T24475] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 640.575735][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 640.590760][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 640.610143][T24469] device veth0_vlan entered promiscuous mode [ 640.619722][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 640.628518][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 640.640818][T24475] team0: Port device team_slave_0 added [ 640.659974][T24469] device veth1_vlan entered promiscuous mode [ 640.673150][T24475] team0: Port device team_slave_1 added [ 640.704678][T24475] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 640.711812][T24475] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 640.739142][T24475] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 640.764285][T24475] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 640.771237][T24475] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 640.803615][T24475] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 640.839122][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 640.860106][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 640.869981][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 640.878943][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 640.953721][T24475] device hsr_slave_0 entered promiscuous mode [ 641.001870][T24475] device hsr_slave_1 entered promiscuous mode [ 641.071600][T24475] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 641.079195][T24475] Cannot create hsr debugfs directory [ 641.089622][T24469] device veth0_macvtap entered promiscuous mode [ 641.115367][T24469] device veth1_macvtap entered promiscuous mode [ 641.199889][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 641.210560][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.220841][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 641.231873][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.241774][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 641.252511][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.262435][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 641.272975][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.282994][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 641.293661][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.303691][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 641.314333][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.324198][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 641.334728][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.344585][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 641.355104][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.365787][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 641.376291][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.389862][T24469] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 641.397659][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 641.407104][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 641.417324][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 641.426689][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 641.446318][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 641.457711][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.467679][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 641.479369][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.489268][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 641.499995][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.509909][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 641.520381][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.530302][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 641.542259][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.552152][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 641.562622][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.572550][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 641.583453][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.593550][T24469] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 641.604058][T24469] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 641.615866][T24469] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 641.640474][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 641.649855][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:48:12 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4f040000, 0x0) 16:48:12 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:48:12 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x20020, 0x0) 16:48:12 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan%\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:12 executing program 4: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000140)={0x3, 0xbd, "6b7beb634b174f827f233431371004fac67acefd9f734a57b7a17887272cbf2a4dec1591c7025822dc17fba398d3584cbf62d8ad5b154027b11163e9acafda231a392ea9b9dba0496772dd16052374a23c6d27d11df0ba78af8fb6ecbb74319efd04877e5b1f17d28f6f113c193f539e74d00f0c69b0259d24a5252c42638af6ac7b8f379554776ae7c623498fdd0fa23abac7ceade9ad9daf619be052a6f0e6e0c5207a398cf7fb5bc94d499a4a7bbc1996d31acee55d70aff16f1d29"}) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) [ 642.074494][T24475] 8021q: adding VLAN 0 to HW filter on device bond0 16:48:12 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x50040000, 0x0) [ 642.148329][T24501] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 642.242006][T24501] EXT4-fs (sda1): Remounting filesystem read-only [ 642.267784][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 16:48:12 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x51040000, 0x0) [ 642.287846][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 16:48:13 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0xa42, 0x85) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 642.382265][T24475] 8021q: adding VLAN 0 to HW filter on device team0 [ 642.431314][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 642.452660][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 642.461346][T13530] bridge0: port 1(bridge_slave_0) entered blocking state [ 642.468657][T13530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 642.488028][T24525] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 642.537741][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 642.538615][T24525] EXT4-fs (sda1): Remounting filesystem read-only [ 642.546683][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 642.561226][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 642.570237][ T9958] bridge0: port 2(bridge_slave_1) entered blocking state [ 642.577351][ T9958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 642.586498][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 642.595767][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 642.615260][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 642.625184][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 16:48:13 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x8cffffff, 0x0) [ 642.634476][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 642.653599][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 642.688642][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 642.698767][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 642.732176][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 642.748648][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 642.757131][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 642.770491][T24475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 642.882472][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 642.890008][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 642.969662][T24475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 643.169834][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 643.179621][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 643.203504][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 643.212586][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 643.221430][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 643.229708][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 643.245658][T24475] device veth0_vlan entered promiscuous mode [ 643.266359][T24475] device veth1_vlan entered promiscuous mode [ 643.295726][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 643.305217][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 643.313819][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 643.322882][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 643.336380][T24475] device veth0_macvtap entered promiscuous mode [ 643.352487][T24475] device veth1_macvtap entered promiscuous mode [ 643.386288][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 643.396795][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.407300][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 643.417799][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.427930][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 643.438637][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.448533][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 643.459028][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.469287][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 643.479769][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.490592][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 643.501289][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.511433][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 643.521966][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.531844][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 643.543005][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.553115][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 643.563666][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.573544][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 643.584079][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.597031][T24475] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 643.606465][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 643.615694][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 643.624531][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 643.633496][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 643.646019][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 643.657079][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.667458][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 643.678197][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.688128][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 643.698681][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.709138][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 643.719624][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.729620][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 643.740130][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.750022][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 643.760942][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.770847][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 643.783140][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.793048][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 643.803535][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.814422][T24475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 643.824991][T24475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 643.836198][T24475] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 643.848477][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 643.858383][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:48:14 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="ad4d354f303005f080542489da5839bd"], 0x1) sched_yield() fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000140)="7297d744d8e84dbdc3c6e582f86f1efd0318211c84516d0c99884905bef353fa0564a4285f6fe0556ed5a7808b4d8c0c6c7f32c751f8835eb36ff0b1fc1b", &(0x7f0000000180)=""/61}, 0x20) openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x10040) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x200004, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e24, 0x9, @empty, 0x80}, r3}}, 0x38) 16:48:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan\\\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:14 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xb4000000, 0x0) 16:48:14 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x3000000, 0x0, 0x0, 0x20020, 0x0) 16:48:14 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a40", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:14 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r4 = creat(0x0, 0x0) r5 = accept(r4, &(0x7f0000000240)=@rc={0x1f, @fixed}, &(0x7f00000002c0)=0x80) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000000)={r8}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000300)={r8, 0x596}, 0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000180)={r8, 0x10000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r9, 0x9, 0xfffb, 0x1}, &(0x7f0000000280)=0x14) creat(&(0x7f0000000000)='./file0\x00', 0x0) r10 = open(&(0x7f00000000c0)='./file0\x00', 0x42582, 0x0) r11 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r10, r11, 0x0, 0x504) r12 = gettid() ptrace$setopts(0x4206, r12, 0x0, 0x0) tkill(r12, 0x3c) ptrace$cont(0x18, r12, 0x0, 0x0) ptrace$setregs(0xd, r12, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r12, 0x0, 0x0) r13 = syz_open_procfs(r12, &(0x7f0000000340)='net/packet\x00') recvmsg$kcm(r13, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000540)=""/60, 0x3c}, {&(0x7f00000003c0)=""/122, 0x7a}, {&(0x7f0000000440)=""/52, 0x34}], 0x3}, 0x100) r14 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r14, 0x3b72, &(0x7f0000000140)={0x18, 0x2, 0x8001, 0x7f}) socket$kcm(0x29, 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x0) 16:48:14 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xc0ed0000, 0x0) [ 644.251245][T24571] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:15 executing program 4: creat(&(0x7f0000000040)='./file0/file0\x00', 0x80) r0 = open(&(0x7f0000000080)='./file0\x00', 0x25c300, 0x0) pivot_root(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)='./file0\x00') r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 644.476319][T24571] EXT4-fs (sda1): Remounting filesystem read-only [ 644.489683][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 644.501157][T24585] F2FS-fs (loop5): Unable to read 1th superblock [ 644.512821][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:48:15 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf3250000, 0x0) [ 644.524344][T24585] F2FS-fs (loop5): Unable to read 2th superblock [ 644.532197][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 644.543643][T24587] F2FS-fs (loop5): Unable to read 1th superblock [ 644.551575][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 644.562725][T24587] F2FS-fs (loop5): Unable to read 2th superblock 16:48:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x02') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 644.739236][T24599] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:15 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) dup(0xffffffffffffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r6) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r9) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r11 = dup(r10) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8b1a, &(0x7f0000000040)='wlan0\x00') write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRES32=r8, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRESDEC=r9, @ANYRES32], @ANYRES64=r11]], 0x8) fallocate(r0, 0x3, 0x0, 0x8020003) [ 644.891638][T24599] EXT4-fs (sda1): Remounting filesystem read-only 16:48:15 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf5ffffff, 0x0) 16:48:15 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$TIOCSTI(r2, 0x5412, 0xffffffffffffffe1) ioctl$KDENABIO(r0, 0x4b36) creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r10 = dup(r9) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8b1a, &(0x7f0000000040)='wlan0\x00') openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x42000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b1a, &(0x7f0000000180)='w\xd7af\x0fwo\xf2\xa6\xea-s\x04\xb84n0\x00') write$USERIO_CMD_SET_PORT_TYPE(r6, &(0x7f00000000c0)={0x1, 0x80}, 0x2) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0xfffff800, 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r12 = dup(r11) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$SG_GET_KEEP_ORPHAN(r12, 0x2288, &(0x7f0000000040)) sendfile(r3, r4, 0x0, 0x7fffffff) 16:48:15 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x4000000, 0x0, 0x0, 0x20020, 0x0) 16:48:15 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000001500)={0x200, 0xc, 0x7fff, 0x8, 0x0}, &(0x7f0000001580)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000015c0)={r6, 0x38c, 0x20}, 0xc) dup(r3) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r7) clock_gettime(0x1, &(0x7f0000001600)={0x0, 0x0}) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r11 = dup(r10) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x0, 0xb, 0x4, 0x200000, 0x2, {r8, r9/1000+10000}, {0x4, 0x2, 0x3, 0x40, 0x7f, 0x4, "4b978ba2"}, 0xd0, 0x4, @offset=0xf4, 0x7, 0x0, r11}) openat$vfio(0xffffffffffffff9c, &(0x7f0000001540)='/dev/vfio/vfio\x00', 0x4040, 0x0) r13 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) write$UHID_INPUT2(r11, &(0x7f0000001740)=ANY=[@ANYBLOB="10519e0c000000f2855f19eea4cb5741bafbb60faf6e27388a0c28d7c82c6937659463a91e3c800e2557cbe6b6933f949606000000678842b6e63f093304c2fb49435c5f72b822bd13e5a93957f500cd694da080f1f56d1b603b333c8add982be6e19eaed45a46e8204b9e981622d860f7ae70127ad0bab95ada588b57842f5b1af54caa9504aa791649db5614490f2fb6c9dafa02328862de99a2f65212ca40b2ca61428c7185257aa744043b86c1637cba6917ed9661bd00"/199], 0x1) dup(r13) r14 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r15 = dup(r14) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r15, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) lstat(&(0x7f0000000240)='./bus\x00', &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000014c0)='./bus\x00', &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r2, &(0x7f0000001480)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000300)="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", 0x1000}], 0x1, &(0x7f0000001400)=[@rights={{0x38, 0x1, 0x1, [r0, r0, r3, r5, r0, 0xffffffffffffffff, 0xffffffffffffffff, r12, r13, r0]}}, @cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}], 0x58, 0x800}, 0x20048800) 16:48:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x03') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:15 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf6ffffff, 0x0) 16:48:16 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:16 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf9fdffff, 0x0) [ 645.391682][T24633] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 645.412099][T24633] EXT4-fs (sda1): Remounting filesystem read-only 16:48:16 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xff000000, 0x0) [ 645.625147][T24659] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x04') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:16 executing program 1: ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={'veth1_virt_wifi\x00', {0x2, 0x4e21, @multicast1}}) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) fallocate(r0, 0x3, 0x0, 0x8020003) 16:48:16 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xff0f0000, 0x0) [ 645.803073][ T27] audit: type=1800 audit(1583081296.446:110): pid=24625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17457 res=0 [ 645.804215][T24659] EXT4-fs (sda1): Remounting filesystem read-only 16:48:16 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xffefffff, 0x0) 16:48:16 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:48:16 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x5000000, 0x0, 0x0, 0x20020, 0x0) 16:48:16 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) mount$9p_xen(&(0x7f0000000000)='syz\x00', &(0x7f0000000080)='./bus\x00', &(0x7f0000000180)='9p\x00', 0x40816, &(0x7f0000000100)={'trans=xen,', {[{@afid={'afid', 0x3d, 0xfffffffffffffffa}}, {@fscache='fscache'}, {@cache_loose='cache=loose'}], [{@appraise='appraise'}, {@measure='measure'}]}}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="436893079605c06c98bbd68026a0bfcb3909a029f1ca40d9a079bb9a93baac0c48d69e9aee397795bfd95192821e8aef8f78ba637fd8e806a9ff3f2545d2ac28ad6ebaabd0622b8f89f943589824d2a67708377c00003f918872f865999ed183870cfe5a7c411a99d8b50cae0cf259fb5eaf1b1c0c12587a"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x6123) 16:48:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x05') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:17 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xffffefff, 0x0) [ 646.513763][ T27] audit: type=1800 audit(1583081297.156:111): pid=24705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17515 res=0 [ 646.541883][T24704] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:17 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a40", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 646.570342][T24704] EXT4-fs (sda1): Remounting filesystem read-only 16:48:17 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) 16:48:17 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xfffff000, 0x0) 16:48:17 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000000)=0x10000, 0x4) fallocate(r0, 0x3, 0x0, 0x8020003) [ 646.722870][T24727] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 646.759769][T24727] EXT4-fs (sda1): Remounting filesystem read-only 16:48:17 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xfffffdf9, 0x0) 16:48:17 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6000000, 0x0, 0x0, 0x20020, 0x0) 16:48:17 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="84", @ANYRES64=r2, @ANYRESDEC, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYBLOB="9fc5a35094ad6d0e663e9e272c9d6ca1c5a1e754aa7a597a0fbb79d76d97dc694c3b183fabd0936956d19d4cb2a4e740f873c508f89a1d67cf19e822596f10e96cab4a522e46a53ff9c3e20fc0927c37fd1227a3a1ab6873a7c213dde4d433c616bd27cabd2be78d3cabe78c57c91fadda9d8796545c9fa5da95"]], 0x25) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r3) signalfd4(r3, &(0x7f0000000000), 0x8, 0x80000) fallocate(r0, 0x3, 0x0, 0x8020003) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r5, 0x8982, &(0x7f0000000140)={0x8, 'batadv0\x00', {'veth0_to_bridge\x00'}, 0x5}) 16:48:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x06') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 647.144251][ T27] audit: type=1800 audit(1583081297.786:112): pid=24748 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17485 res=0 16:48:17 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000280)={[0x1, 0x7fff, 0x6, 0x5, 0x80000001, 0x1, 0x7fff, 0xfc800000, 0x5, 0x5, 0x3, 0x101, 0x63fc, 0x800, 0x10001, 0x57, 0x2, 0x8, 0x5, 0x8, 0x4, 0x1ff, 0x40, 0x3, 0x9dee, 0x10000000, 0xa7a, 0x6, 0x1, 0xffffffff, 0xffffffc8, 0x7, 0xa8d2, 0x38, 0x886, 0x7, 0x3f, 0x7, 0x3f, 0xb17, 0x1, 0x800, 0x2, 0x10001, 0x0, 0x2, 0x8, 0x0, 0x4, 0x8, 0x6, 0x0, 0x61, 0x4, 0x6, 0x7, 0x6, 0x5, 0x10000, 0x5, 0x7, 0x5, 0x0, 0x1, 0x83f0, 0x7, 0xfff, 0xee, 0x401, 0x4, 0x1, 0x6, 0x0, 0xe1, 0xe54, 0x1, 0x0, 0x8, 0xffffff01, 0x3ff, 0x4, 0x2, 0x400, 0x6a, 0x3f, 0x3, 0x86, 0x80, 0x3f, 0x0, 0x0, 0xef7, 0x2, 0xfffffffe, 0x0, 0x264, 0x1, 0x1ff, 0x3ff, 0x1000, 0x6, 0x200, 0x1, 0xa8, 0x3, 0xfffffff7, 0x3, 0x9, 0x8, 0x9, 0x9, 0x800, 0x80000001, 0x9021, 0x7, 0x0, 0x0, 0xdb8, 0x1000, 0x20, 0xed00, 0x0, 0x8, 0x400, 0x9, 0x6, 0x3, 0xfffffffc, 0xc0000, 0x1, 0x9710, 0xd56, 0x1, 0xfff, 0x9, 0x1, 0x42f, 0x401, 0x7, 0x20, 0x8, 0x5, 0x8, 0x174, 0xfffffe00, 0x0, 0x8, 0x80000000, 0xff, 0x67, 0xfffffff9, 0x2, 0x9, 0x2, 0x10000, 0x1, 0x8, 0x7, 0x1ff, 0x5, 0x101, 0x80000000, 0x4, 0x4, 0x1, 0x4, 0x800, 0xa3, 0x8, 0x3, 0x2, 0x0, 0x5, 0x1, 0x1, 0x4, 0x3ff, 0x45, 0x0, 0x9, 0x3, 0x80000000, 0x4, 0x101, 0x10001, 0xc4000000, 0x7, 0x2, 0x4, 0x2, 0x46, 0x5, 0x1000, 0x3, 0x7, 0x3, 0x9, 0xffffffff, 0x7, 0x9, 0xffffffff, 0x5, 0xe1, 0xfff, 0x0, 0x5, 0x7, 0x10001, 0x3, 0x8, 0x9, 0x8f6d, 0x6, 0x6, 0x200000, 0xa0, 0x1466, 0xa6d, 0xa7, 0xff, 0x1, 0x1, 0x630, 0xa631, 0x7f2, 0x20, 0x80, 0x7, 0xae, 0x3, 0x9, 0x7, 0x5, 0x1ff, 0x0, 0x80, 0x4, 0x7, 0x3, 0x1, 0x20, 0xffffffc0, 0x3, 0x80, 0x401, 0x1, 0x28c, 0x2, 0xffffffff, 0x8, 0x80000001, 0x10001, 0xffffffff, 0xff, 0x0, 0x3938, 0x800, 0x3ff, 0x3, 0x4, 0x81, 0x2, 0x0, 0x8, 0x3, 0x5, 0x5, 0x3ff, 0x6, 0x7, 0x40, 0x0, 0x9, 0x1000, 0x4, 0x2, 0x8, 0x6, 0xa0, 0x3, 0x200, 0xa64, 0x8884, 0x4, 0x10e, 0x5, 0x1, 0x8, 0x1, 0x20d1, 0x0, 0x34, 0x8000, 0x7, 0x9, 0xca4, 0x1ff, 0x0, 0x7ff, 0x4, 0x17, 0x5, 0xffffffff, 0x7fffffff, 0x40, 0x5, 0x9, 0xffffffff, 0x3ff, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80000001, 0x8, 0x7fff, 0x10000, 0x7fffffff, 0x3, 0x64, 0x7, 0x1, 0x10000, 0x7fff, 0xff, 0x8, 0x9, 0x80000000, 0x9, 0xe1f4, 0x1, 0x3, 0x7f, 0x5, 0xce46, 0x3, 0x8, 0xfff, 0x9, 0x3ff, 0x200800, 0xfffffffd, 0x10001, 0xfffffffb, 0x3, 0x1000, 0x207f, 0x2, 0x1, 0x7, 0x1, 0x67, 0xfffffff7, 0x5, 0x8, 0x2, 0x2, 0x9, 0xe46a, 0x2, 0x63, 0x6, 0x6, 0x2, 0xce17, 0x1, 0x9, 0x9, 0x8001, 0x100, 0xf1, 0x4, 0x2, 0x4, 0x101, 0xfffffffc, 0x9, 0x3, 0xbb7, 0x1ff, 0x4231, 0x40c, 0xffffff80, 0xf6, 0x10000, 0x0, 0x7, 0x7, 0x101, 0x3, 0x2, 0xffff, 0x8, 0xfffffff7, 0x8001, 0x1, 0x101, 0x401, 0x7, 0x0, 0x4802, 0x1, 0x0, 0x6edc, 0x2, 0x101, 0xb23, 0x8, 0x4, 0x200, 0xffffffff, 0xcf1e, 0x1f, 0x1, 0x100, 0x401, 0x0, 0x65, 0x1, 0x2, 0x3ff, 0x4, 0x5, 0x5, 0x1ff, 0x9, 0xfffffff7, 0x4, 0x3806bac6, 0x3, 0x401, 0x1, 0x80, 0x9c9d, 0x5, 0x9, 0xfffffffc, 0xb5c, 0xd5, 0x3, 0x0, 0x101, 0x8, 0x7, 0x5, 0x3, 0x3f, 0x3ff, 0x2, 0x6, 0x4, 0x1, 0x0, 0x2, 0x6, 0x1, 0x80000000, 0xfd4, 0xffffffff, 0x70000000, 0x6, 0x461700ac, 0x9, 0x7fff, 0x80, 0x9dad, 0x1, 0x8, 0x100, 0x3, 0x7, 0x1a, 0x8, 0x2, 0x0, 0x8, 0x3, 0x9, 0x1, 0x1398, 0xc420, 0xfffffffe, 0x9, 0x1000, 0x5, 0x4, 0xa1, 0x6, 0x1f, 0x7ff, 0x0, 0x1, 0x7, 0xe1, 0x6, 0x0, 0x4, 0x1, 0xffffffff, 0x1, 0x101, 0x0, 0x5, 0x6, 0x5, 0xc1f, 0x5, 0x3fa, 0x8, 0xfffffffe, 0x6, 0x3, 0x8, 0xffffffff, 0x7, 0x5, 0x1000, 0x8, 0x10000, 0xaf, 0x46a, 0x0, 0x401, 0x2, 0x3f, 0x8, 0x6, 0x80000000, 0x2, 0x3, 0x4, 0xfffff475, 0x3, 0x1ff, 0x10001, 0x1, 0x401, 0xf55, 0x1, 0x8, 0x3eaa7a43, 0x84, 0x3f, 0x5, 0x7f, 0x8001, 0x4, 0xa9, 0x2, 0x3, 0x6, 0x9, 0x7, 0x5, 0x9, 0xe4, 0x8, 0x20, 0x8, 0x1, 0x6c6, 0x3, 0x0, 0x8, 0xd512, 0x6, 0x1, 0x1f, 0x9e32, 0x3, 0xfffffff8, 0x101, 0x7, 0x50a, 0x6, 0x5, 0x100, 0x747, 0x8d84, 0x7, 0x9, 0x0, 0x4, 0x7f, 0x0, 0xd4f7, 0x3, 0x1, 0x7fff, 0x0, 0x1, 0x9, 0x0, 0x5, 0x1ff, 0x0, 0x1000, 0x1, 0x3f, 0x1, 0x3ff, 0xcf1, 0x8, 0x80, 0xd6, 0x1, 0x80000000, 0x730a0b58, 0x8, 0x4, 0x2, 0x4, 0x2000000, 0x3e90, 0x1, 0xffffffff, 0x7fff, 0x8, 0x4, 0x3ff, 0x3b, 0x3f, 0x2, 0x22e1, 0x1750, 0x800, 0x7, 0x85f, 0x4, 0x1f, 0x100, 0x80, 0x83, 0x1, 0x3c4, 0x1, 0x1, 0x7, 0x20, 0x200, 0x3, 0x1, 0x6, 0x7, 0x6, 0x3, 0x1, 0x8, 0x80, 0x5, 0x200, 0xffff, 0xff, 0x58, 0x5618, 0x6, 0x593, 0x7, 0x2, 0x4, 0x401, 0x6, 0xffffffff, 0x9, 0x4, 0x7, 0x1, 0x75cd, 0xfffffff8, 0x9a7, 0x7, 0x3ff, 0x5, 0x7518, 0x1, 0x1000, 0x1, 0x2, 0x10001, 0x9, 0x2, 0x6, 0x2, 0x39896a9a, 0xfffff69e, 0x0, 0x4, 0xffffffff, 0x4, 0x1, 0x5828, 0x1fe, 0xffffffff, 0x7cf, 0x29, 0x729, 0x8, 0x6, 0x9, 0xd7f5, 0x5, 0x54, 0x1, 0x4, 0xff, 0x20, 0x24, 0x10000, 0xff5b, 0x4, 0x100, 0x7fff, 0xffffffff, 0xffff, 0xca, 0x7, 0x0, 0x8a89, 0x6, 0x400, 0xeb, 0x2, 0x5, 0x5, 0x2, 0x5, 0x6, 0x0, 0xa8d, 0x200, 0x80, 0xd0f, 0x20, 0x3, 0x3ff, 0x9, 0x1, 0x200, 0xbbf, 0x6, 0x200, 0x9, 0x6, 0xffff, 0x5, 0x8, 0x0, 0x3, 0x1, 0x6, 0xa3, 0xcf, 0x80000000, 0x56, 0x1, 0xfffffeff, 0x72, 0x80, 0x80000000, 0x0, 0x783, 0x9e4d, 0x13, 0x199, 0x1000, 0x8001, 0x5, 0x1, 0x6, 0x200, 0x81, 0x0, 0x5, 0x1f, 0x5, 0x81, 0x4, 0xffffffff, 0x839, 0x7ff, 0x4, 0x8, 0x5, 0x1f, 0x7, 0x7, 0x4, 0x1000, 0x101, 0x2, 0xff, 0x101, 0x7, 0x6, 0x0, 0x8dd5, 0x400, 0xfffffffa, 0x9, 0x4, 0x7, 0x4, 0x0, 0x401, 0x5, 0x8, 0x7, 0xd4, 0x3, 0x2, 0x2, 0x0, 0x101, 0x0, 0x3, 0x8f1c, 0x200, 0x101, 0x0, 0x6, 0x3ff, 0x3, 0xff, 0x1, 0x3, 0x7ff, 0x3f, 0x1, 0x5, 0xfffeffff, 0x400, 0x0, 0x3, 0x4, 0x4, 0x7, 0x9, 0x6, 0x8, 0x2, 0xe62, 0x2, 0x0, 0x8, 0xffff, 0x0, 0x2, 0x800, 0x318, 0x8a, 0x4c, 0x45, 0x100, 0x2, 0x9, 0x2, 0x101, 0x101, 0xcf7, 0x1, 0xe5e, 0x8, 0x7c0, 0x401, 0x2, 0x8bf, 0x1, 0x0, 0xffff, 0x3, 0x9, 0x3f, 0x6dfb8000, 0x9, 0x4be10527, 0x3ff, 0x7f, 0x7fff, 0x0, 0x8, 0x6, 0x8, 0x80000000, 0x1f, 0x7, 0x4, 0x4, 0x0, 0x4, 0xaf52, 0x2, 0x1, 0x0, 0x1ff, 0x1, 0x2, 0xfa, 0x0, 0x8001, 0x6, 0x10000, 0x7, 0x3, 0x100, 0x3, 0x8, 0x7fff, 0xed, 0x9, 0x0, 0x4, 0x4, 0x80, 0x2, 0x1ff, 0x0, 0x3, 0xfffffffc, 0x2, 0x1000, 0x6, 0x6, 0x7, 0x5, 0x3ff, 0xffffffe0, 0x5, 0x3, 0x3, 0x7, 0x6, 0x20, 0x2, 0x0, 0x20, 0x8, 0x4, 0x7f, 0x7fff, 0xfffffffd, 0x30c9b49, 0x3, 0x80000000, 0x7, 0x401, 0x6, 0x0, 0xd47, 0x6, 0x1, 0x6, 0x9, 0xfffffffd, 0xf31, 0x6, 0x2, 0x401, 0x4, 0x400, 0xb9, 0x1, 0x8722, 0x5, 0x1000, 0x3, 0x8, 0xfffffff9, 0x5799, 0x7ff, 0x400, 0x3, 0xd64, 0x80, 0x5, 0x8, 0x2, 0x0, 0x9, 0xc2, 0x7, 0x6, 0x2, 0x2, 0xffff, 0x79, 0x3, 0x7, 0x10000, 0x5, 0x7, 0x1, 0xf7, 0x5a98dab9, 0x7ff, 0xfffffffb, 0x3, 0x5, 0x6, 0x442, 0xe9a, 0x2, 0x9, 0x6, 0x9, 0x54, 0xfffffffb, 0x7a, 0x8, 0x4, 0x81, 0x9, 0x9, 0x5c, 0xfffffcf7, 0xffff, 0x18, 0x6, 0x1, 0x5, 0x7, 0x7fffffff, 0x401]}) 16:48:17 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xfffffe00, 0x0) 16:48:18 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xffffff7f, 0x0) [ 647.379661][T24762] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:18 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xffffff8c, 0x0) [ 647.506270][T24762] EXT4-fs (sda1): Remounting filesystem read-only [ 647.709025][ T27] audit: type=1800 audit(1583081298.346:113): pid=24794 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17425 res=0 [ 647.734838][T24796] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:18 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:18 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xfffffff5, 0x0) 16:48:18 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2000, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7, 0x4d, 0x7f}, 0x7) 16:48:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\a') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:18 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x341803, 0x112) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x8000, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) [ 647.805878][T24796] EXT4-fs (sda1): Remounting filesystem read-only 16:48:18 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x7000000, 0x0, 0x0, 0x20020, 0x0) 16:48:18 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="009bc0a519d2cadf11f26d9d738bee4867743a99508d578ff29ea861c2837d69ee99d26b006e0456d2e115621c832f431eb5ec87221f5922582c6fac94097a17ded65f3c2b1b6633b61f22fcb91b863fd06ed1c4af0c9de379d8927058467c0d2727c66c68702da99da2d5f481f752880999100162108e6f7a448e212a807452fc31c1"], 0x1) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r3 = openat(r2, &(0x7f0000000080)='./bus\x00', 0x80181, 0x104) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000500)=[@in6={0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x3f}, 0x7}, @in6={0xa, 0x4e21, 0x6, @empty, 0x7fffffff}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e22, 0x3, @local, 0x81}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e23, 0x5, @loopback, 0x7}, @in6={0xa, 0x4e23, 0x7fffffff, @local}, @in6={0xa, 0x4e21, 0xff, @mcast2, 0x8000}], 0xd8) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r6 = openat(r5, &(0x7f0000000280)='./bus\x00', 0x15d843, 0x50) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f00000002c0)={0x3a, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2, 'nq\x00', 0x10, 0x7, 0x13}, 0x2c) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) setsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, &(0x7f0000000240)={0x20, 0x5, 0x0, 0x0, 0x40, 0xa8, 0xff, 0x4, 0xf0, 0x0, 0x1, 0x9, 0x0, 0x2}, 0xe) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"/539, @ANYRES32=r3, @ANYBLOB="2e0019807451401da8c84d86509c03d103fb1fe2c409965f65ed08004500", @ANYRES32=r9, @ANYBLOB="0c006e00010000000000000000007800318008c6f9d768b402c891d2c6fa6b5fd92a7896ad7a377b998672e6636a3a459db0f11f33501d912cd7ced2bd60342ced2b6b4ac943f51f835dfbee30fb433742deb8ce25980e5dcf3f9d6f3f34e194f9f53b98028430b2df8e1c2508805942ca7ad7ad3247bf13cadc0c0042009b0000000000000000"], 0x284}, 0x1, 0x0, 0x0, 0x4008040}, 0xc0) fallocate(r0, 0x3, 0x0, 0x8020003) [ 648.048514][ T27] audit: type=1800 audit(1583081298.686:114): pid=24814 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17441 res=0 16:48:18 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') fsconfig$FSCONFIG_SET_PATH(r3, 0x3, &(0x7f0000000040)='nodev\x00', &(0x7f00000000c0)='./file0\x00', r5) truncate(&(0x7f0000000240)='./file0\x00', 0x2) sendfile(r0, r1, 0x0, 0x7fffffff) [ 648.155687][ T27] audit: type=1800 audit(1583081298.706:115): pid=24815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17441 res=0 [ 648.396767][T24826] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 648.479540][T24826] EXT4-fs (sda1): Remounting filesystem read-only 16:48:19 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x8000000, 0x0, 0x0, 0x20020, 0x0) 16:48:19 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:19 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = semget(0x0, 0x2, 0xe326d8000a4e3f0) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') fchmod(r4, 0x8) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000280)={0x8, @capture={0x1000, 0x1, {0x4, 0x8}, 0x3, 0x2}}) sendfile(r0, r1, 0x0, 0x7fffffff) 16:48:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\b') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:19 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="f8"], 0x1) fallocate(r0, 0x1b, 0xfffffffffffffffd, 0x20000801fffd) [ 648.971852][T24839] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 649.025067][T24839] EXT4-fs (sda1): Remounting filesystem read-only [ 649.250365][ T27] audit: type=1800 audit(1583081299.886:116): pid=24856 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17513 res=0 [ 651.469632][T24872] IPVS: ftp: loaded support on port[0] = 21 [ 651.549141][T24872] chnl_net:caif_netlink_parms(): no params data found [ 651.598902][T24872] bridge0: port 1(bridge_slave_0) entered blocking state [ 651.606166][T24872] bridge0: port 1(bridge_slave_0) entered disabled state [ 651.614915][T24872] device bridge_slave_0 entered promiscuous mode [ 651.626015][T24872] bridge0: port 2(bridge_slave_1) entered blocking state [ 651.633592][T24872] bridge0: port 2(bridge_slave_1) entered disabled state [ 651.642647][T24872] device bridge_slave_1 entered promiscuous mode [ 651.669117][T24872] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 651.682534][T24872] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 651.712927][T24872] team0: Port device team_slave_0 added [ 651.722439][T24872] team0: Port device team_slave_1 added [ 651.741164][T24872] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 651.748331][T24872] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 651.775129][T24872] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 651.788936][T24872] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 651.796298][T24872] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 651.822730][T24872] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 651.884821][T24872] device hsr_slave_0 entered promiscuous mode [ 651.932365][T24872] device hsr_slave_1 entered promiscuous mode [ 651.981620][T24872] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 651.989249][T24872] Cannot create hsr debugfs directory [ 652.084934][T24872] bridge0: port 2(bridge_slave_1) entered blocking state [ 652.092095][T24872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 652.099373][T24872] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.106517][T24872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 652.175699][T24872] 8021q: adding VLAN 0 to HW filter on device bond0 [ 652.189892][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 652.200788][ T9946] bridge0: port 1(bridge_slave_0) entered disabled state [ 652.209632][ T9946] bridge0: port 2(bridge_slave_1) entered disabled state [ 652.218270][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 652.233829][T24872] 8021q: adding VLAN 0 to HW filter on device team0 [ 652.258741][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 652.267892][ T9958] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.275055][ T9958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 652.302857][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 652.311298][ T9946] bridge0: port 2(bridge_slave_1) entered blocking state [ 652.318424][ T9946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 652.345149][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 652.355038][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 652.374100][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 652.390392][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 652.402592][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 652.414031][T24872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 652.439830][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 652.453675][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 652.470030][T24872] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 652.549234][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 652.558905][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 652.585602][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 652.594964][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 652.606960][T24872] device veth0_vlan entered promiscuous mode [ 652.616950][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 652.625181][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 652.651712][T24872] device veth1_vlan entered promiscuous mode [ 652.681272][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 652.689682][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 652.698589][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 652.708039][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 652.720800][T24872] device veth0_macvtap entered promiscuous mode [ 652.734731][T24872] device veth1_macvtap entered promiscuous mode [ 652.759365][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 652.770159][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 652.780431][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 652.791685][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 652.805896][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 652.817564][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 652.828006][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 652.839514][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 652.849457][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 652.860060][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 652.870187][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 652.880710][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 652.890622][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 652.901138][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 652.912655][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 652.924363][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 652.934821][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 652.946293][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 652.956476][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 652.967419][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 652.977647][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 652.988692][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 653.000867][T24872] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 653.011666][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 653.021304][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 653.031271][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 653.040220][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 653.052796][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 653.065073][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 653.075462][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 653.087497][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 653.097534][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 653.108130][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 653.118133][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 653.128801][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 653.138651][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 653.149725][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 653.159693][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 653.170192][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 653.180492][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 653.191039][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 653.200904][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 653.211399][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 653.221296][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 653.233200][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 653.243103][T24872] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 653.253629][T24872] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 653.265438][T24872] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 653.276647][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 653.286211][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:48:24 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xfffffff6, 0x0) 16:48:24 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') dup(r2) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r3) fallocate(r3, 0xe58e5f39f9bcb45b, 0x8, 0x8020009) 16:48:24 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x20020, 0x0) 16:48:24 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$VIDIOC_PREPARE_BUF(r4, 0xc058565d, &(0x7f0000000140)={0x401, 0x2, 0x4, 0x100, 0x1, {0x77359400}, {0x0, 0xc, 0x3, 0x80, 0x3, 0x81, "31134785"}, 0x1ff, 0x3, @offset=0x80, 0x3ff, 0x0, r0}) readlinkat(r5, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r8 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x3, 0x2001) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r8, 0x28, 0x2, &(0x7f0000001280)=0x9, 0x8) accept$inet(r7, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 16:48:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0!') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:24 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:24 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000001300)=0xe8) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./bus\x00', 0x101, 0x3, &(0x7f0000000140)=[{&(0x7f00000000c0)="d38c773aa6165e0fb2e4685e2689fae06d1bbaeba34abed512dbafbe41469be7749b2d965a9f748b8b", 0x29}, {&(0x7f0000000100)="d7dff6aa06ce7cd7ae7dcf6ad9239d2edb83c3ebf746a655aab47d3d9b0d56f2fee6db593dca268806b66693638a3a63f8db8de5", 0x34, 0x100}, {&(0x7f0000000300)="9482044afd916974668654177056b553da088d178cdf513d6896a79101e634fff0ec80c086aa0258675c2795482776c32224b896afc759d5cf80e28e8443e615e0423b02945a20d6120bfa559c9f2b5a0869b0068515ebb47ca0386cdc3b1a22e9390b214bd5d9e573bf9237b8b5314b026ea5d6fe712abfa62b408054b24c3e57b045b110cf46e8a4239b9b1d53971e31f2d13cdd88453e908fa87237eb36503a22d2a0c6ee4bcde2cd384272d395d8481ff71a492cf937c327f2e30f3c7cf625fe338cdb472ca1c702a38be3930094f7a01d55fad77bf87cf3351010d252d04df5d4250501609e7fcf44cc02b5da4af642e48c6d904c0ad659abcefcf896956db1701dddc6a0b9fcb4a28814e10d7cc67c509aae84bd0b9033502f141390238ead6b8d09030e32ebe1a031b9860d24439835d224f6561b478db4d5d848d28909c457b39e7932fe3e013fdbd54c30e5e446b1028b961e7007000af2f849e5f155af6d7ce25fdfc3d67f6687120dc3825382c2c2b24f2db442f4cc280c4e717ffdcec7d36d8a758d0a061c227a354a4ec5f249a33fcb90c46a1db9dcac8a14b142e694d394491baae049ea018af61a6c59fed45cc16e9bdb796594c0fc8c9e5ab840544548500b37dc28bade24d510aa0dfc39557a0b151953a886471e6bffbd501247102cfc7e67506f9c8abf8f937ca4d96d0ecb1c6070506438a3f38bb0bbb711fdcf30b74e221db209690f43937e0a08de06787c3b2c44313fe1932db40ea9fb532f91598b8b8867e1ceff7eedb4c0bc88ef50f5fb55d9418c54aff7221b7b36961cad7d332141cf946a3b6bab5cc46dbc324183dd451136fa6dcd523dc568e991ae93f40a84f75c187a48ae9cc0fae2c6fa5b339c48597d10676e470db46fd342496cb5a79511698a144f831293a4b664769ac75f440eed95a166604a2a9100f5ddfd5fa1a2cf6473557cd8e51c1bf3ec1ae87ffe974a18b5c73da51903a6642020329b530f9a0b9c4d762ed8a0c85e1752b7720fb2631da80e917113685a52ae4a25c0f3ba3cee43a49bb58931b0214f2498713a0ef6f8e2d376f6dfce9f767a33fc17e9433d88a6ab778964f9dbaf2c46fc29ef1249109519a68c39b87c3d95b94ea51e022fe8bc237594c1acaec6514e060d51087ebe78f2a0524f3aaa95e28ef1b1937a251d0e8e098a41185d5fc204acfa880a7bec9d9062d201190d348a99f9e13cdaf9b3bf0f4edbce0441b9833f3351009ab7478b2d8dd9d12a6d6570d0fd6a66882afaafcaee7c6c504ca5a56640c3d0ef22c63e625d220c1c57fb6a02efcdc59d464ec86aed96462e71420381731cd0a8a3d9566c9e62ca3acb896fce79c742d416b0a0c8d501276c866826d36f5f5095036734a99be8add66e8f3284dd2c0019b97f402344dbc0d85ba4f6ed15b5855dd8f6cbf02eaf67cc1845f5e36db31b1a58e1fa6dca906338cd73d33ca198f363a8d249a33815e31c3930f475970861cc3b03efbaeeb63646b5b6930fc464be71aab530db8e745212bef6d67d4a8574a1771a48388134cef41417a3adaa5121e3de5ec1011aba46f92a5b2ff2bbfb1ca6bd8455add3f5500c21eb3b0216340e810b3994523c03e9780095e81598bfdc890299158bab7a8e92e6f654c1c5f8c03fcab64e5fc11097e786e3c153e474e411beb6307acd087ed089142eab86cd12d7d441bb95bd2a5baf1703f197767da1c704bb549f1a3b22c41d9283cb0216109c5127180e10e2b59740c8b2938817f462ff8e7c832cad7c518dd305cd4c3c700e064e20a6848e0651d95181f34db65854c24b4b47c914cb83bf045fde636c4b66330ea83812e394099ded9406d8f5a78e6e451fbfd110b6ab7b5083abe8a6bbc4e9e412812b021f91996300b8d0b81ffb60ee59cb9118a602340e1a6fef85946b9a5aeebf2e60036e6a8f4aa0c594945e6c8409388a7eb321a857a22b1cab0d66b6539efb390caecd4ab7a589a734363d69c85c0ae6fdaf983f52e4ef23eac75b477b8cb6ddfbb53827c88445725972e65dd84558e90329f44649e76e4e6d7e60fe5b47934dcf218c0513ad278dc2a70c8b935009708c2f9d689b4225e87718580f90e9e279eb6590298e638036689e3a9601f1068a7c32023ce62ef257580617283df0d9a639c9d44df7d6f59a12dab75ccfb90d3ccabd7894ddd2f50f1e5ffb2e18b7eaaa934f970d2ed3d8a5a5406116d4d77e393a501a72c4c00366288babf6a2eebaa77fe7253badd560d8e8c074432a07565cebdb7a358f51166e5516f7f12bde887af8e4bf4729f188220b9fec4c95c7b9509199d0e13ecbec38b9f73c31b527414e6d9bec519dcc39337d77496aa60d8db26f536484ddc76aee66a6e1f399a3eb7f39106e8e15cf2e74978c3f7690b30eebacefc94fcb762e96943d50441ed960122ffc5450753ca3696a133ce553091a889edb43784016c45b9c43b34520e58c0c5a04303250b1dbe4c5001bf2251b955c077e4c867e502879f6a868f1e560b3162263b8e6fe3a13673b6ac5ce58b8bee2240a52e87ba35cc2aceaaef8176476389879d57b85754873b0e663b783b8d125cc576d2a90fad6eeb64292892ee2e760eed291e32457481b5a8b8a3972261b6823d075f8407a219d49f7c6c264d08ce5633cb4cbb7839fccc6aad8423d73a79c457ca4c3a60754f46d71d3faf5cdda9ce49b36bd7645a4e2e04865825075f9520419173dd449b5e0ee41612d7c27388fd101ecc7849597230d6107cf4d643404253b447ca985bfb309032799654fe16fee1a5a589a6b3cc22bf2a9d54e5764dec651a5abf2a1584e77d1ca8f834f4226376b25fa1ecabef992daad7ca22acc8abcf243821740d4c6ab2148967fdbf9901240a6150ac4c382ebdc0540373d4ab64016aa01cd6d8880e59c682115eb058d03b10f6696a2311e69b975414821d5026835e171beaa5dbf8c09f5f4a06531bd8b5d81fb8d11303e8df0d9937b356d6492f10f771117aea12272b3c8294ccc5432f71e6cce361434770054967c720d56a3dbd0929eac92bd2bc2d9f1fa271d3becdc89d3977fadfa35cf88a7d2730615edff0dfb7e79abcc6d8b3e08700b1d783a2954c41235219da063858b35d384246a4c367c199a03ed39045332aed5df2de8e4826e6e32a8cb53f54fbc611e9f7308befc992487a3f5b967235ffd8fa5d17ab2a342782cd5d5c6c13b709c1002b27a9bf002c288b825a074cd461f8da9069a2a81595245b56c52ea97d84a8dc7a580db90718c385b57bf3c21241a974f7ab39467203d70d6f3942281bc2a3074a36947294f7d5afecd621dfe9527d52e2f07986832239a8f23c0a7fc1a1035c2393bd7e3004cb68a27e7f6e2bef32e4c90c74bd70db1257eea0be7400c80e82ef15e85e099102af8c11e26f86cfaf2aba5d079575607e61f43a38f7a5ca9cb4dea9359061acd6d6e633dc758b78ab9d3f5e77ee23252c6950657f8c5b02f8b734149af21953f34d26a956726ea5bc1b9e7611f18edffb867ca98124790a6567224aa8da82975c327153d26f0448a3cbb840e3f7c72dec86a833d1fe974d5f6e2a9eb91f0788b2d0dc41727eeb797d59fd3b36663749859abc587a7431bab5491cf41dfa72ade11f9be6f7984fc282cfcb5c0da342bddc8fb864969126f7b7e7615cb583f5ac296bf4ec45fb1040c6d57ab0f8f4247193c5490a70f99a0c0f45fea224a1a7f73f7603a44083e7bf609c6d479e1ededc40f387603ec3619fb3ee58ca7724da57a3aa66486730856f7867532a26dec763b4149627a9367418dd0f513dbb2ea150165a6ab4d99841bc1db89d8471555942bfeacfb54165ad3ecf81d66e7f6f5f44a0167b7780bc0effdfce0a639671bf0cb54694a6be9fda25c68185cc332b1b6999276928c710441b8c4915e01336040a823be5ce5c5cdc2b79152a8841c3afaec8995d70f7c285a7ff26f1cd23f5603adaccbae279db3248a1cfa0a20eae27c0f9c47e5cadadaf2f18a827ab4c34d155d86dd4db4bf36e61bc79f0574bc7358b281beb5ee6dc90fff2050f0c86e9bb886976b850fffcf4e150e1fd147ff9204d0d161f4047556b92e69fafa15a3a46dc52864b325dce08808beaf46af0a5379261f66f8b3251051b04bb899200e938b16512d3a86083033866c2adf79ccbd69d0390fac8079298f16bcfffcac44e50daf9088675349b494518314c5b02b15a14ab62593f137d44e023888e5b2bf04a71ac9ec739fb91741d72bed3e2b19002c1bc41587706455f894080ee9d51a88b99db9d5192206cdad0d05af25b8084e2dad1687fb233e7d587c8b873927674e8dc1818fedd0d42c57e6f334b9cbf4d595387f1760164d870ee544035b2a38d7e2357666dff8116b814864ae2c075cecc2d9849c1a73a404c022d74cae45f02e52211c05fcd5d8e19e06e1c93b82b9e626e5945b83acfeb76723b5e2d337aa742a5e7c97e89c4890010dc0383bd9bcce837fbfe7d32da9d909b405736f21e435304221a5b061c5948ccf266184f160685521d5a0f299380c3ca0dd18396ebc14d6a525cab6bc1919e98475a72247c7c3580510cbcd6f91c4ab9e17588ea69d18dab0822d29802850d08ce7c52f58ff647fe2c02e73e7a80f0fc84c5e90ab178f3c6d6527901bd8a5e3c88a1be99bc0308a1e436523b3a6218f8996def73a0d9c7a2b5912dc127e126a509af16e301d5c988f293908f891c32a54c6996d20e7e5a1e9a1ca834a14efe477fea0c78ddcef7174ab09f250fc532345dac3b060689c95e697e182df4167bb527480d1ca80eb1bdcb6f41478fd32619175fe9c7ad8bc93d3b14283205f2242831dbf02bd1a2783c6a56162c2763a818b903aedff27d22c0a5c0c9b926490f4d0540ae72b953ce7b101d7931d2ad493ac1f172af28d18efed8d5aaff16986224abfae5f3900c0e4a80619cf2c12d248527e70bcc5eb34898169c3f1a9501acd694d5e0898fa173ff9167ae04e917a011b4580e53deb8b7ad010fab47b17db967bf22cd85d698060767c11a70a4468bb9fc886c82e81cee01ba7abb86c673b73129e5b8f2250aee63151ed0413e6cd14a2d880a42e35c576617b9dd8c20fd39a564104c48721140066ff283ae7a00c84ec86e776e216958c2a4ac52cf91ea96029f4ff7bb8ae954aac6d9205c05d99e447d9aea738190ead9d6ba4c4e9a5551955c52fca91506ef413eb1258d0a86e08868779e93b95fc5cfa2c8559742ef782e63abc424aece9abb0a67680409625b2cc1d0250d85ae75e04b6fdac6bffc9da75765b99e3d9b4fe84481007aea8d1aad72c93e60aad2b1f6140efb517bd13e0088bba4a79946eb348683df19a8359ced2dcbc7feccd2a59619fc6dca5e31d49287dc97246a641ac50710294ed88537b74942b9a94723f26854133cdc1232dec3147eacd8ff2d9d4f0e6741a4a3112d98a6b2d022c3a2a5e695e7a6d2d64b75afc6707d8a392b4a7368fee8480d11f9be7b4d2b0dc165e82658d9044128d84d50e0870833712a0b3d08f6d78d31bad33f708ec39885529c1a4bf49a583d2c7ea7e3948dfc494b19dd7d6749c56add0a9dfee3350b176f15896dd6f5c6cc08ce607264f06c52a067107041fd555c7513d5da9eb1daae682d042922956c2a85277274ceecdd0c476c314f9cb76a99e615b507413d672a06d88afc6cb3167d1ea54c8962f50013131f2c4c2a2b12c523e9f704378ba714cc0780f5404d0552b772a23ddc4e81429b5dc5a3833e4077977ca693fa7bc005e96", 0x1000, 0x638c}], 0x2000, &(0x7f0000001340)={[{@errors_continue='errors=continue'}, {@journal_async_commit='journal_async_commit'}, {@test_dummy_encryption='test_dummy_encryption'}, {@stripe={'stripe', 0x3d, 0x6}}, {@data_err_abort='data_err=abort'}, {@nodelalloc='nodelalloc'}, {@noload='noload'}], [{@hash='hash'}, {@fsname={'fsname'}}, {@pcr={'pcr', 0x3d, 0x7}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL'}}, {@dont_appraise='dont_appraise'}, {@smackfsdef={'smackfsdef', 0x3d, ')-keyringuser],nodevcpuset$.'}}, {@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@euid_eq={'euid', 0x3d, r1}}, {@hash='hash'}]}) [ 653.685176][T24894] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 653.749506][T24894] EXT4-fs (sda1): Remounting filesystem read-only [ 653.850880][ T27] audit: type=1800 audit(1583081304.486:117): pid=24903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17551 res=0 16:48:24 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xedc000000000, 0x0) 16:48:24 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:24 executing program 1: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xfc) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="84a5e8a3e9d3045a664cdecf173867397b170ae27d55f36a48e64661de4829d12f90f86b8f221ea1877b25321daf9290d4156e21bd747a369f0a4e4ae8"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) io_setup(0x3, &(0x7f0000000000)=0x0) r4 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) io_cancel(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x12, r4, &(0x7f0000000180)="96434811bb9d99992f6a5028638cd851c933cc989754caa52c86ab92d6893f07268f6911a94fd02f7b10369d73966aa964dadb7baa14ddb282c25f860c9ce244a12a95dba2c93702c35d7caf17b00feee4ccbe85132df5501c749efbc77a28c5b5b694814d0c03aa7c0d9438b8200fca22f3cacbb59b521d77684e49bd9d7ba04ea820bb1f7ed88bf31099500136def1c6f53bd1539445fa0045242d6fb281738b99f95b1a17ba", 0xa7, 0x100000000, 0x0, 0x2, r5}, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000080)) 16:48:24 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x20000000, 0x0, 0x0, 0x20020, 0x0) 16:48:24 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f00000001c0)='./file0\x00', 0x3ff) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x74, 0x4, 0x31, "2625720760d3fe23131cdccad0b01125", "b328a8955be61cc6bb48dfb6eb46ca51830c8eb604e8d37bff544b3bd146ea2f025edcbc2990b490972522779d94224782a92b8cfd0572049428d5fff6c40bd92354bb9e339db4e558b067ed94044659252404126e65d844556cc645dfa0e8"}, 0x74, 0x2) sendfile(r0, r1, 0x0, 0x7fffffff) 16:48:24 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb4", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:25 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x1000000000000, 0x0) [ 654.487008][T24943] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:25 executing program 1: keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={0x0, 0xd2, 0x1000}, 0x0, &(0x7f0000000080)="3cddbc9f21fabcefa05b8fd645c17e9b477848c39430c28da1c45060e41cbae374a5bb9a8aab4a3c9bc82022bb2bfd708432352751c83c93c514c5804f08903bdd239103765f5eeed26414f3a4928609c7008e21f0cebe1de8862d2acaed5f1ed8bf8b8cb061152c33f206d745793bb9c0b40e05a5bc9d04eb598533a63281d803325567106a2402ae8b5927989497341ed562c1117232a1eaf8a1f41376a75cc6ff2e1342ac1210f0ce30924206df88489be509a7b9ac3150c672bc161d52d69a4081574f1cab52dbb11d6f5fd4a3be74b3", &(0x7f0000000300)=""/4096) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:48:25 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf0ffffffffffff, 0x0) 16:48:25 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40042, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 654.701630][T24943] EXT4-fs (sda1): Remounting filesystem read-only 16:48:25 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xfeffff00000000, 0x0) 16:48:25 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 16:48:25 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) pipe(&(0x7f00000012c0)={0xffffffffffffffff}) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000001300)={0x81, 0x72}) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x6003, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x90000) sendfile(r0, r2, 0x0, 0x7fffffff) [ 654.879249][T24976] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 654.911077][T24976] EXT4-fs (sda1): Remounting filesystem read-only 16:48:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 655.002856][ T27] audit: type=1804 audit(1583081305.646:118): pid=24987 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir403714374/syzkaller.QljxTt/58/file0" dev="sda1" ino=17534 res=1 16:48:25 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x20020, 0x0) 16:48:25 executing program 4: setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "2cd683fceee6d8a8d4afb86a33afced544ef26cf"}, 0x15, 0x3) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) [ 655.163031][ T27] audit: type=1804 audit(1583081305.696:119): pid=24988 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir403714374/syzkaller.QljxTt/58/file0" dev="sda1" ino=17534 res=1 16:48:26 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:26 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x1) 16:48:26 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x100000000000000, 0x0) 16:48:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 655.522787][T25014] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 655.544829][ T27] audit: type=1800 audit(1583081306.186:120): pid=25016 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=17563 res=0 [ 655.561930][T25014] EXT4-fs (sda1): Remounting filesystem read-only 16:48:26 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x7) 16:48:26 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x200000000000000, 0x0) 16:48:26 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x40000000, 0x0, 0x0, 0x20020, 0x0) 16:48:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x8b') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:26 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) r1 = socket$rds(0x15, 0x5, 0x0) fchmod(r1, 0xa) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000000)={0x6}) 16:48:26 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x300000000000000, 0x0) 16:48:26 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:26 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = creat(0x0, 0x0) r4 = accept(r3, &(0x7f0000000240)=@rc={0x1f, @fixed}, &(0x7f00000002c0)=0x80) r5 = getgid() syz_mount_image$jfs(&(0x7f0000000400)='jfs\x00', &(0x7f0000000440)='./file0\x00', 0xb7af, 0x7, &(0x7f00000008c0)=[{&(0x7f0000000480)="2505419f0bddd0e8ac293eb51f25fca0e237a4c09d52ac49f092bdb5ab361c7188443287e519289388009f3e9e58e073f3ae48160ce9909a47379d21b4d46a99d9dd3065ab52b305332eebce", 0x4c, 0x7b0a}, {&(0x7f0000000500)="af21caf66b8f02515a0fa0903e72c6a7a349528a4cc1b22c829875c881bbf2663e8aab86e7a85185ed5bdfb3ffa2b4513c37fa7f065360078907358774d0a0b0568de404ccc53445756fef827a86935da9a5ce1e447117dadcf7b8e90a88a949fb13094762359ddb5510cef1adfe35aeca3e15d0a4a34301332771bed6bdb9e40e3a1f8de29692211dcd5bb7d0b01b9335c9ef9c3b2e49f3515a3ff7ceace0c7ac8731ca883420667cb6c7bba25b75af6d1576099582", 0xb6, 0x5}, {&(0x7f00000005c0)="fdc6c8648113e290492b3129cce0", 0xe, 0x6}, {&(0x7f0000000600)="4ae7e11c0098dcfe92bcc8da103a9a2dfa3d82d8041deb8e8e81d98dfe71eaa6636928a0861f160b521a70faa9287f952017a94fb0fe0727b29ac714c31e5c710cabb4ccc550fefa73f505d738d2f5982ca5257eebcb2419141fb1e74fbcb2211bd102c2875e20bbdae83ba82f4d1b1321fdbd36514fd3d72f0c089b9d2b3faba517406bb41cf9aa0530a8fcef02ac29c6893bbe472d7ea9d6e6611b9e4037cadbcbc162b228b355184de573f5f69d1b7d1e8756233aaa8c9461a181bfdd2f6eec40daf62c13eee42dc7379ec4b3ba4b3423d5d2bfb12b233465e3db3c26b47917d5ccf947", 0xe5, 0x4}, {&(0x7f0000000700)="8b8372ff1af1aec4ddb1d66c1ebab1bcc6baa4", 0x13, 0x8}, {&(0x7f0000000740)="be50d6b5741b716eac14d8997bd43bf551b0d74a82bc62099b675b48e95c1f9428476944d34469545fd3cc34ecf18ad3451b4cf1264ecb92d5a9d3d537cf4c50e03ecb73371ac10c0fee2ec156ebe936d9422cfada1effcc5bf5376b447d5e5ebed2612b2c9b77e903eabf3d86d62d2038fdeb3f948d5c348049fff01339926cc0e4d85740b8514d4d0aa211a742bc0e2c993a44a36fa4934cffb3124aeeeac9c5f47158a15382dccae351c37312e7a084930817f09ac5322e979b8472e75ead42e0", 0xc2, 0x9}, {&(0x7f0000000840)="1372b9050f3ba182de67a74ecbfb6e5888697894ecad9ba8e30d3fed8c25383abec1790a69d49d57048ce87bdec255c287cfbe94f1c611d9482af4776aa1d5f4c35db88b08ab8e901908a7668fafa6389cb113c8c4c88c5090a7a6f662840f90cc32e47c0ac39b4af002", 0x6a, 0x80}], 0x2000020, &(0x7f0000000980)={[{@grpquota='grpquota'}, {@quota='quota'}, {@integrity='integrity'}, {@gid={'gid', 0x3d, r5}}, {@errors_continue='errors=continue'}, {@errors_continue='errors=continue'}, {@discard_size={'discard', 0x3d, 0x3}}], [{@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0xa9}}, {@smackfshat={'smackfshat'}}]}) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="8678c063ce6d1c42166801000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r9 = msgget$private(0x0, 0x10) msgctl$IPC_RMID(r9, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r11 = dup(r10) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000b80)=0xe8) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fstat(r13, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r14) r15 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000001380)=0xc) setresgid(0x0, r16, 0xffffffffffffffff) r17 = gettid() ptrace$setopts(0x4206, r17, 0x0, 0x0) tkill(r17, 0x3c) ptrace$cont(0x18, r17, 0x0, 0x0) ptrace$setregs(0xd, r17, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r17, 0x0, 0x0) msgctl$IPC_SET(r9, 0x1, &(0x7f0000000bc0)={{0x3, r12, 0x0, r14, r16, 0x8, 0x8}, 0x0, 0x0, 0x400, 0x101, 0x34, 0xfffffffffffff801, 0x7, 0x169, 0x0, 0x100, r17, 0xffffffffffffffff}) r18 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r19 = dup(r18) ioctl$PERF_EVENT_IOC_SET_FILTER(r19, 0x8b1a, &(0x7f0000000040)='wlan0\x00') setsockopt$inet6_tcp_buf(r19, 0x6, 0xd, &(0x7f0000000380)="007d8bd8ff087ff3c5f7c1ee503f09b6b280f7a8596cefe3ab02234a5fb2204d149580ccc75f6c80cd149726156a333897906837d1da25ec0d9046edcd8fa401701326cf1e84b6ee70300dc291047aa42f5be8309684690cadc9f3db6b54e193f927978d270ad542a84fea3b90f24f94f21ef4b8d3d9b8c6f4", 0x79) r20 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r21 = dup(r20) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f0000000200)=0x9, &(0x7f0000000340)=0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r21, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$PIO_UNIMAPCLR(r21, 0x4b68, &(0x7f00000001c0)={0xd9, 0x7, 0xb18}) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000000)={r8}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000300)={r8, 0x596}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000a40)={r8, 0x7, 0x51c4, 0x5, 0x8080, 0x7fffffff}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r22, 0x5}, 0x8) [ 656.273837][T25053] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 656.294220][T25053] EXT4-fs (sda1): Remounting filesystem read-only 16:48:27 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'veth0_to_team\x00', 0x7}) 16:48:27 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x400000000000000, 0x0) [ 656.451781][T25071] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 656.460073][T25071] EXT4-fs (sda1): Remounting filesystem read-only 16:48:27 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x500000000000000, 0x0) 16:48:27 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x39) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') chroot(&(0x7f0000000080)='./file0\x00') ioctl$KVM_GET_API_VERSION(0xffffffffffffffff, 0xae00, 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) 16:48:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:27 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x48000000, 0x0, 0x0, 0x20020, 0x0) [ 657.022865][T25097] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 657.059231][T25097] EXT4-fs (sda1): Remounting filesystem read-only 16:48:27 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x20020, 0x0) 16:48:28 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda06", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:28 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x100) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x84ce) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59", 0x60}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f00000001c0)) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r6, 0x0, 0x0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r7, 0x0, 0x0) tkill(0x0, 0x80000f) ptrace$cont(0x18, r2, 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r10 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x13a) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r12 = dup(r11) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r13 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r14 = dup(r13) ioctl$PERF_EVENT_IOC_SET_FILTER(r14, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r15 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r16 = dup(r15) ioctl$PERF_EVENT_IOC_SET_FILTER(r16, 0x8b1a, &(0x7f0000000040)='wl:5\xf80') bind$isdn(r16, &(0x7f00000000c0)={0x22, 0x3, 0x2, 0x3, 0x3}, 0x6) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r10, 0x0, 0x7fffffff) [ 657.761688][T25105] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 657.791757][T25105] EXT4-fs (sda1): Remounting filesystem read-only [ 657.884207][ T27] audit: type=1804 audit(1583081308.526:121): pid=25113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir403714374/syzkaller.QljxTt/61/file0" dev="sda1" ino=17576 res=1 16:48:28 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x60000000, 0x0, 0x0, 0x20020, 0x0) [ 658.001112][ T27] audit: type=1804 audit(1583081308.526:122): pid=25113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir403714374/syzkaller.QljxTt/61/file0" dev="sda1" ino=17576 res=1 16:48:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:28 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000040)}, 0x10) [ 658.312596][T25120] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 658.382793][T25120] EXT4-fs (sda1): Remounting filesystem read-only 16:48:29 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda06", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 658.598042][T25133] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 658.635841][T25133] EXT4-fs (sda1): Remounting filesystem read-only 16:48:29 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000140)=@l2={0x1f, 0x0, @none}, &(0x7f0000000040)=0x80) r1 = creat(0x0, 0x0) accept(r1, &(0x7f0000000240)=@rc={0x1f, @fixed}, &(0x7f00000002c0)=0x80) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000)={r4}, 0x8) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b1a, &(0x7f0000000040)='wlan0\x00') setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000300)={r4, 0x59a}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={r4, 0x8}, 0x8) r7 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r8 = open$dir(&(0x7f0000000100)='./file0\x00', 0x94402, 0x85) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r7, r8, 0x0, 0x7fffffff) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r10 = dup(r9) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r12 = dup(r11) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8b1a, &(0x7f0000000040)='wlan0\x00') setsockopt$inet6_MRT6_ADD_MFC_PROXY(r12, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}, {0xa, 0x4e21, 0xffffffff, @remote, 0x5}, 0x6, [0x2, 0x5, 0x8, 0xe8, 0x80, 0x1ff, 0x32a5, 0x10000]}, 0x5c) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8b1a, &(0x7f0000000040)='wlan0\x00') setsockopt$IP_VS_SO_SET_EDIT(r10, 0x0, 0x483, &(0x7f00000001c0)={0x0, @local, 0x4e24, 0x2, 'rr\x00', 0x2, 0x3, 0x5a}, 0x2c) [ 661.067263][T25142] IPVS: ftp: loaded support on port[0] = 21 [ 661.201332][T25142] chnl_net:caif_netlink_parms(): no params data found [ 661.313868][T25142] bridge0: port 1(bridge_slave_0) entered blocking state [ 661.331263][T25142] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.361787][T25142] device bridge_slave_0 entered promiscuous mode [ 661.393801][T25142] bridge0: port 2(bridge_slave_1) entered blocking state [ 661.413150][T25142] bridge0: port 2(bridge_slave_1) entered disabled state [ 661.431685][T25142] device bridge_slave_1 entered promiscuous mode [ 661.495908][T25142] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 661.532116][T25142] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 661.581502][T25142] team0: Port device team_slave_0 added [ 661.591051][T25142] team0: Port device team_slave_1 added [ 661.645857][T25142] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 661.652942][T25142] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 661.680387][T25142] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 661.694327][T25142] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 661.701309][T25142] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 661.749235][T25142] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 661.870475][T25142] device hsr_slave_0 entered promiscuous mode [ 661.932010][T25142] device hsr_slave_1 entered promiscuous mode [ 661.971585][T25142] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 661.979196][T25142] Cannot create hsr debugfs directory [ 661.997157][T25148] IPVS: ftp: loaded support on port[0] = 21 [ 662.161377][T25148] chnl_net:caif_netlink_parms(): no params data found [ 662.270831][T25148] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.279059][T25148] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.287517][T25148] device bridge_slave_0 entered promiscuous mode [ 662.304377][T25148] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.312479][T25148] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.320255][T25148] device bridge_slave_1 entered promiscuous mode [ 662.378474][T25148] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 662.392748][T25148] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 662.448140][T25148] team0: Port device team_slave_0 added [ 662.459043][T25142] 8021q: adding VLAN 0 to HW filter on device bond0 [ 662.469677][T25148] team0: Port device team_slave_1 added [ 662.500007][T25142] 8021q: adding VLAN 0 to HW filter on device team0 [ 662.514930][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 662.525859][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 662.551904][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 662.560788][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 662.571074][ T2696] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.578208][ T2696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 662.594729][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 662.610165][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 662.618695][ T2696] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.625809][ T2696] bridge0: port 2(bridge_slave_1) entered forwarding state [ 662.634210][T25148] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 662.641171][T25148] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 662.677412][T25148] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 662.699254][T25148] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 662.706935][T25148] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 662.734026][T25148] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 662.766099][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 662.800521][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 662.829041][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 662.875392][T25148] device hsr_slave_0 entered promiscuous mode [ 662.942017][T25148] device hsr_slave_1 entered promiscuous mode [ 662.971660][T25148] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 662.979260][T25148] Cannot create hsr debugfs directory [ 663.001822][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 663.010973][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 663.015177][T25154] IPVS: ftp: loaded support on port[0] = 21 [ 663.019580][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 663.033748][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 663.059067][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 663.067929][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 663.076584][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 663.113675][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 663.124037][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 663.140814][T25142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 663.256304][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 663.264451][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 663.322745][T25142] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 663.341147][T25154] chnl_net:caif_netlink_parms(): no params data found [ 663.486710][T25154] bridge0: port 1(bridge_slave_0) entered blocking state [ 663.494045][T25154] bridge0: port 1(bridge_slave_0) entered disabled state [ 663.503107][T25154] device bridge_slave_0 entered promiscuous mode [ 663.512677][T25154] bridge0: port 2(bridge_slave_1) entered blocking state [ 663.519811][T25154] bridge0: port 2(bridge_slave_1) entered disabled state [ 663.528549][T25154] device bridge_slave_1 entered promiscuous mode [ 663.545463][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 663.556231][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 663.618533][T25154] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 663.637545][T25148] 8021q: adding VLAN 0 to HW filter on device bond0 [ 663.656655][T25154] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 663.685423][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 663.702011][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 663.726243][T25154] team0: Port device team_slave_0 added [ 663.737855][T25154] team0: Port device team_slave_1 added [ 663.753075][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 663.760691][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 663.778214][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 663.787364][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 663.801119][T25148] 8021q: adding VLAN 0 to HW filter on device team0 [ 663.832105][T25142] device veth0_vlan entered promiscuous mode [ 663.839358][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 663.850321][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 663.859492][T14014] bridge0: port 1(bridge_slave_0) entered blocking state [ 663.866598][T14014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 663.883540][T25154] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 663.890504][T25154] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 663.917537][T25154] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 663.938907][T25142] device veth1_vlan entered promiscuous mode [ 663.952966][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 663.962249][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 663.970311][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 663.979116][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 663.987961][T13674] bridge0: port 2(bridge_slave_1) entered blocking state [ 663.995065][T13674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 664.003671][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 664.013323][T25154] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 664.020279][T25154] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 664.047120][T25154] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 664.071689][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 664.079865][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 664.145254][T25154] device hsr_slave_0 entered promiscuous mode [ 664.212169][T25154] device hsr_slave_1 entered promiscuous mode [ 664.251618][T25154] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 664.259232][T25154] Cannot create hsr debugfs directory [ 664.277665][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 664.288158][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 664.333179][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 664.341125][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 664.350871][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 664.360312][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 664.369709][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 664.378868][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 664.387657][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 664.403928][T25142] device veth0_macvtap entered promiscuous mode [ 664.444510][T25148] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 664.456462][T25148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 664.464785][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 664.473362][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 664.482061][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 664.493369][T25142] device veth1_macvtap entered promiscuous mode [ 664.580022][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 664.601889][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 664.609358][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 664.632286][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.643055][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.653496][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.665045][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.674983][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.685669][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.696101][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.707293][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.717727][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.729346][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.739434][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.751096][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.761527][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.772074][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.781989][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.792534][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.802479][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.813074][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.823695][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.835945][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.846050][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.856674][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.866559][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 664.877084][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 664.890224][T25142] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 664.904057][T25148] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 664.925253][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 664.935073][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 664.964429][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 664.992523][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 665.002531][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 665.013017][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 665.022918][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 665.033410][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 665.043393][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 665.054728][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 665.065654][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 665.076175][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 665.086041][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 665.097496][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 665.109253][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 665.119753][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 665.129659][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 665.140235][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 665.151064][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 665.162425][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 665.172358][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 665.182889][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 665.192810][T25142] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 665.203303][T25142] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 665.215183][T25142] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 665.229202][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 665.239095][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 665.473089][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 665.483054][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 665.568789][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 665.578296][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 665.594720][T25148] device veth0_vlan entered promiscuous mode [ 665.603149][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 665.612546][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 665.634652][T25148] device veth1_vlan entered promiscuous mode [ 665.682149][T25154] 8021q: adding VLAN 0 to HW filter on device bond0 [ 665.744442][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 665.752815][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 665.760882][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 665.769634][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 665.778869][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 665.787553][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 665.799926][T25148] device veth0_macvtap entered promiscuous mode [ 665.816203][T25154] 8021q: adding VLAN 0 to HW filter on device team0 [ 665.824462][T25148] device veth1_macvtap entered promiscuous mode [ 665.848397][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 665.856951][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 665.866079][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 665.881445][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 665.890562][ T9958] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.897699][ T9958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 665.931339][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 665.939848][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 665.949188][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 665.958884][ T9959] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.965999][ T9959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 665.980790][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 665.991808][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.001789][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.012269][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.022170][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.032671][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.042595][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.053982][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.064256][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.074783][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.085522][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.096041][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.106336][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.116906][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.126821][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.137298][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.147223][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.157750][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.167644][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.178496][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.190077][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.201143][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.212120][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.222632][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.232490][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 666.243895][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.255850][T25148] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 666.280719][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 666.301109][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 666.310661][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 666.320288][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 666.337303][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 666.350288][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 666.360179][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 666.371960][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.392868][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.411180][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.431177][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.441124][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.452305][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.463122][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.473614][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.483541][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.494042][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.504354][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.514872][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.525018][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.536059][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.546873][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.557382][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.567463][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.577948][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.589516][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.600125][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.610100][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.620616][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.630577][T25148] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 666.642743][T25148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 666.654604][T25148] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 666.668613][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 666.678300][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 666.688845][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 666.697619][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 666.730068][T25154] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 666.743232][T25154] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 666.756223][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 666.765199][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 666.773808][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 666.782503][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 666.790846][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 666.920934][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 666.928776][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 16:48:37 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x600000000000000, 0x0) 16:48:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 667.005569][T25154] 8021q: adding VLAN 0 to HW filter on device batadv0 16:48:37 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda06", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:37 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x68000000, 0x0, 0x0, 0x20020, 0x0) 16:48:37 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x88, 0x464, 0x200, 0x70bd25, 0x25dfdbfd, "99adb5987abf0f05752380a2a5610d7fc0cbc5209874592999822a5418f7d4e94fefe80244761bda272990b1054a600f7fd0158b8413607a34a423ef5858bd0b39d8030989fefd9234ee6be2346002e149a7d19e8cebf57de6db4650120076bc108348fe545e5a7d9f5fecdf23767956df7c81e978", ["", "", "", "", "", ""]}, 0x88}, 0x1, 0x0, 0x0, 0x4000041}, 0x41) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000080)) 16:48:37 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = getpgid(0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000000)) [ 667.172961][T25188] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 667.211766][T25188] EXT4-fs (sda1): Remounting filesystem read-only [ 667.330964][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 667.360120][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 667.391669][T25200] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 667.399993][T25200] EXT4-fs (sda1): Remounting filesystem read-only 16:48:38 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x700000000000000, 0x0) 16:48:38 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x20020, 0x0) 16:48:38 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x800000000000000, 0x0) 16:48:38 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$RTC_AIE_ON(r2, 0x7001) r3 = dup(r0) dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000100)='wlan0\x00') fdatasync(0xffffffffffffffff) signalfd4(r3, &(0x7f0000000000)={[0x4]}, 0x8, 0x800) mq_getsetattr(r3, &(0x7f0000000080)={0x8d80, 0x0, 0x0, 0x1}, &(0x7f00000000c0)) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="84"], 0x1) fallocate(r4, 0x3, 0x0, 0x8020003) [ 667.661159][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 667.683824][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.754286][T25154] device veth0_vlan entered promiscuous mode [ 667.796607][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 667.810556][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 16:48:38 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x900000000000000, 0x0) [ 667.925112][T25154] device veth1_vlan entered promiscuous mode [ 668.015534][T25230] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 668.074856][T25230] EXT4-fs (sda1): Remounting filesystem read-only [ 668.249748][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 668.283164][T25243] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 668.291179][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 668.301815][T25243] EXT4-fs (sda1): Remounting filesystem read-only [ 668.349888][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 668.422657][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 668.470524][T25154] device veth0_macvtap entered promiscuous mode [ 668.512577][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 668.542955][T25154] device veth1_macvtap entered promiscuous mode [ 668.649018][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.689084][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.719361][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.751624][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.771636][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.790977][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.812082][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.831556][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.841406][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.876723][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.896695][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.931390][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.951564][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 668.971553][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 668.991546][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 669.017695][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.041861][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 669.070483][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.091548][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 669.111573][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.121407][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 669.132308][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.143010][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 669.153804][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.164418][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 669.175210][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.185435][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 669.196253][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.208606][T25154] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 669.221453][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 669.230779][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 669.241238][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.252171][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.263180][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.274217][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.284159][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.294645][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.305592][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.316293][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.326209][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.336963][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.346879][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.357370][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.367263][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.377984][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.388429][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.399019][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.408915][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.419412][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.429262][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.439760][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.449628][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.460128][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.471689][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.482198][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.492553][T25154] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 669.503036][T25154] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 669.515317][T25154] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 669.526623][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 669.536478][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:48:40 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xa00000000000000, 0x0) 16:48:40 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 670.312336][T25264] IPVS: ftp: loaded support on port[0] = 21 [ 670.442735][T25264] chnl_net:caif_netlink_parms(): no params data found [ 670.512120][T25264] bridge0: port 1(bridge_slave_0) entered blocking state [ 670.519289][T25264] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.527964][T25264] device bridge_slave_0 entered promiscuous mode [ 670.537275][T25264] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.544828][T25264] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.553431][T25264] device bridge_slave_1 entered promiscuous mode [ 670.579705][T25264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 670.592693][T25264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 670.622873][T25264] team0: Port device team_slave_0 added [ 670.632785][T25264] team0: Port device team_slave_1 added [ 670.648957][T25264] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 670.656074][T25264] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 670.683303][T25264] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 670.696959][T25264] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 670.704440][T25264] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 670.731092][T25264] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 670.805524][T25264] device hsr_slave_0 entered promiscuous mode [ 670.862190][T25264] device hsr_slave_1 entered promiscuous mode [ 670.901746][T25264] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 670.909330][T25264] Cannot create hsr debugfs directory [ 671.087884][T25264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 671.112348][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 671.125127][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 671.133379][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 671.145500][T25264] 8021q: adding VLAN 0 to HW filter on device team0 [ 671.167900][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 671.184174][T14014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 671.193004][T14014] bridge0: port 1(bridge_slave_0) entered blocking state [ 671.200071][T14014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 671.218859][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 671.228237][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 671.242056][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 671.250515][ T9946] bridge0: port 2(bridge_slave_1) entered blocking state [ 671.257649][ T9946] bridge0: port 2(bridge_slave_1) entered forwarding state [ 671.288334][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 671.297489][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 671.325023][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 671.334418][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 671.348606][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 671.360647][T25264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 671.399469][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 671.408011][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 671.424645][T25264] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 671.520887][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 671.551120][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 671.567008][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 671.575449][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 671.587365][T25264] device veth0_vlan entered promiscuous mode [ 671.606273][T25264] device veth1_vlan entered promiscuous mode [ 671.646360][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 671.656487][T13530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 671.676095][T25264] device veth0_macvtap entered promiscuous mode [ 671.694466][T25264] device veth1_macvtap entered promiscuous mode [ 671.719947][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.732960][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.742978][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.753478][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.763374][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.773860][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.785058][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.795615][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.805541][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.816649][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.826658][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.837206][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.847141][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.857658][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.868369][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.878930][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.888820][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.899355][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.909193][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.919712][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.929960][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.940656][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.951998][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.962475][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.972376][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 671.982989][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 671.992930][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 672.003384][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.013304][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 672.025012][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.037771][T25264] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 672.048098][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 672.057248][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 672.067724][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 672.076522][ T2696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 672.089072][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.100178][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.114923][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.125503][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.135443][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.146363][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.156267][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.166751][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.176651][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.187481][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.197425][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.209106][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.219521][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.230036][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.239966][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.250520][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.260864][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.272332][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.282308][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.292827][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.302681][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.313185][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.323091][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.333710][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.353274][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.364513][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.374443][T25264] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 672.384942][T25264] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 672.396964][T25264] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 672.409882][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 672.420211][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:48:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x1a') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:43 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = creat(&(0x7f0000000180)='./bus\x00', 0xbb) ioctl$TCSETX(0xffffffffffffffff, 0x5433, &(0x7f0000000140)={0x6, 0x4, [0x800, 0x0, 0x800, 0x5, 0x1], 0x80}) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[@ANYRESDEC], 0x14) syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) fallocate(r2, 0x3, 0x0, 0x8020003) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40, 0x0) ioctl$SNDCTL_DSP_RESET(r2, 0x5000, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 16:48:43 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x74000000, 0x0, 0x0, 0x20020, 0x0) 16:48:43 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) dup3(r0, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r6 = accept(r0, &(0x7f0000000240)=@rc={0x1f, @fixed}, &(0x7f0000000200)=0x80) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="01000000aadefb653ff79f168fb29cdd6f412cdf9ff226b718b8f8987cb0fc46172454749e38cd16cc0eb6c6cc7f5b19f653635232951f495c8af1e15ba5e4cb69239d573a6de341f17124bb8143773b46189964c03f101dffa4db7b4c19260963677902fd03675e634a0577cfd6c141c2cabdca776089d2da6871", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000000)={r9}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f0000000300)={r9, 0x596}, 0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000140)={r9, @in={{0x2, 0x4e20, @loopback}}}, &(0x7f0000000040)=0x84) creat(&(0x7f0000000000)='./file0\x00', 0x0) r10 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000340)) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) r11 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4482, 0x1b) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r10, r11, 0x0, 0x7fffffff) r12 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r13 = dup(r12) ioctl$PERF_EVENT_IOC_SET_FILTER(r13, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$PPPIOCCONNECT(r13, 0x4004743a, &(0x7f00000000c0)=0x2) 16:48:43 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xc00000000000000, 0x0) 16:48:43 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:43 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x1000000000000000, 0x0) [ 672.999410][T25286] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 673.112843][T25286] EXT4-fs (sda1): Remounting filesystem read-only 16:48:43 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000040)) 16:48:43 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="9e5a313828c903def28237585c7698ba84c108000000bc2c01"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r3 = fcntl$dupfd(r2, 0x0, r0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, &(0x7f0000000000)=0x2, 0x4) [ 673.358676][T25312] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:44 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x2000000000000000, 0x0) [ 673.456225][T25312] EXT4-fs (sda1): Remounting filesystem read-only 16:48:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:44 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x2010000000000000, 0x0) 16:48:44 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x20020, 0x0) 16:48:44 executing program 1: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb4", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:44 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0xc4) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000480)={0x5, 0x0, [{0x4, 0xb6, &(0x7f0000000280)=""/182}, {0x5000, 0xe7, &(0x7f0000000340)=""/231}, {0x5000, 0x37, &(0x7f00000001c0)=""/55}, {0xd000, 0x0, &(0x7f0000000200)}, {0x3000, 0x24, &(0x7f0000000440)=""/36}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') bind(r3, &(0x7f0000000140)=@l2={0x1f, 0x5, @none, 0x7}, 0x80) setrlimit(0x6, &(0x7f0000000200)={0xb26b, 0x80}) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f0000000540)={0x1, 0x7f}) sendfile(r1, r4, 0x0, 0x7fffffff) 16:48:44 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x2300000000000000, 0x0) 16:48:44 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x2804000000000000, 0x0) [ 673.972983][T25344] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 674.091619][T25344] EXT4-fs (sda1): Remounting filesystem read-only 16:48:44 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:44 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x3f00000000000000, 0x0) 16:48:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:44 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) 16:48:45 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x20020, 0x0) 16:48:45 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4000000000000000, 0x0) 16:48:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 674.621077][T25387] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 674.644001][T25387] EXT4-fs (sda1): Remounting filesystem read-only 16:48:45 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={0x44, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_ADDR={0x14}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x6}]}]}, 0x44}}, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r3, 0x0, 0x7fffffff) [ 674.863001][T25403] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 674.883074][T25403] EXT4-fs (sda1): Remounting filesystem read-only [ 674.930867][ T27] audit: type=1800 audit(1583081325.566:123): pid=25406 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16564 res=0 16:48:45 executing program 1: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x7b, &(0x7f0000000ac0), 0x8) close(0xffffffffffffffff) 16:48:45 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4504000000000000, 0x0) 16:48:45 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') accept4$tipc(r1, 0x0, &(0x7f0000000040), 0x800) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) 16:48:45 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x20020, 0x0) 16:48:45 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:45 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg$inet6(r0, &(0x7f0000000c00)=[{{&(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4}, 0x1c, 0x0}}], 0x1, 0x0) [ 675.380903][T25425] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 675.453054][ T27] audit: type=1800 audit(1583081326.096:124): pid=25417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16536 res=0 [ 675.461861][T25425] EXT4-fs (sda1): Remounting filesystem read-only 16:48:46 executing program 1: getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x8, 0x30, 0xffffffffffffffff, 0xb6fe7000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000840)) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10500, 0x0, 0x102, 0x8000003}, 0x20) fcntl$dupfd(r2, 0x203, 0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) getsockopt$inet_buf(r3, 0x0, 0x29, 0x0, &(0x7f0000000400)) fallocate(0xffffffffffffffff, 0x100000003, 0xfb7d, 0x28120001) 16:48:46 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x20020, 0x0) 16:48:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:46 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) socket$nl_crypto(0x10, 0x3, 0x15) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r4 = creat(0x0, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @remote}, &(0x7f00000004c0)=0xc) sendmsg$nl_route_sched(r4, &(0x7f00000006c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000500)=@delqdisc={0x158, 0x25, 0x200, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, {0xf, 0xffe0}, {0xd, 0x69d16fc93273f7f8}, {0xe, 0xa}}, [@TCA_STAB={0xd4, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x4, 0x0, 0x1, 0x7, 0x2, 0x96, 0x6, 0x7}}, {0x12, 0x2, [0xca4, 0x7, 0x9, 0x2c28, 0x9, 0x1, 0x6]}}, {{0x1c, 0x1, {0x5, 0xa9, 0x7fff, 0x20000, 0x2, 0x200, 0x0, 0x2}}, {0x8, 0x2, [0x5, 0x8]}}, {{0x1c, 0x1, {0x6, 0x6, 0x8, 0xe805, 0x0, 0x5, 0xc09e, 0x6}}, {0x10, 0x2, [0x1, 0x6, 0xa625, 0x7ff, 0x6, 0x8000]}}, {{0x1c, 0x1, {0xf8, 0x1, 0x4, 0x77e, 0x1, 0x5, 0x5, 0x3}}, {0xa, 0x2, [0x0, 0x9, 0x2]}}, {{0x1c, 0x1, {0x5, 0x4, 0x0, 0x13e1, 0x2, 0x80, 0x7, 0x3}}, {0xa, 0x2, [0xca5, 0x6, 0x4]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}, @TCA_STAB={0x50, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x1f, 0x8, 0x401, 0x0, 0x2, 0x81, 0x5, 0x1}}, {0x6, 0x2, [0x5]}}, {{0x1c, 0x1, {0x81, 0x16, 0x7, 0x9, 0x0, 0x4, 0x0, 0x3}}, {0xa, 0x2, [0x4, 0x43, 0x1ff]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x5}]}, 0x158}}, 0x4000) r8 = accept(r4, &(0x7f0000000240)=@rc={0x1f, @fixed}, &(0x7f00000002c0)=0x80) socket$inet6_sctp(0xa, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0100be79435df7970978f3c80000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r8, 0x84, 0x23, &(0x7f0000000300)={r10, 0x596}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000040)={r10, 0x1}, &(0x7f00000000c0)=0x8) [ 676.014484][T25450] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:46 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="050000000000000000000f00000005002f000000000008000300", @ANYRES32=r6, @ANYBLOB="659cec41ecabd667afc8112899cb95fecd28590430f00d53353a3e505cba3817a4af2100946cb91932696318029056100a5fc3ff6b5c03e01709f6c580f926e94921bd8e03eb69d0021548ec256506cba276a92aec123a58f812b727aa48c1ba2807c3aa47ff28c195363f73da48888097cbd93db550d6185b61db0c48289e6004d9899185158f4ce6f281e1175e3a4a902321c38a4f85be3c3487ca9977db153aeb2aaab3ae1964"], 0x24}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000000c0)=0xe8) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x40, r7, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="943fa5eccf39"}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x4010005}, 0x8001) sendfile(r0, r1, 0x0, 0x7fffffff) [ 676.062497][T25450] EXT4-fs (sda1): Remounting filesystem read-only 16:48:46 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 676.350571][ T27] audit: type=1800 audit(1583081326.986:125): pid=25466 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16560 res=0 [ 678.594587][T25475] IPVS: ftp: loaded support on port[0] = 21 [ 678.781708][T25475] chnl_net:caif_netlink_parms(): no params data found [ 678.924612][T25475] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.941613][T25475] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.962115][T25475] device bridge_slave_0 entered promiscuous mode [ 678.973995][T25475] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.991625][T25475] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.992898][T25475] device bridge_slave_1 entered promiscuous mode [ 679.052493][T25475] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 679.083417][T25475] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 679.138682][T25475] team0: Port device team_slave_0 added [ 679.156262][T25475] team0: Port device team_slave_1 added [ 679.178940][T25475] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 679.186455][T25475] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 679.213054][T25475] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 679.231785][T25475] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 679.231804][T25475] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 679.231813][T25475] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 679.345309][T25475] device hsr_slave_0 entered promiscuous mode [ 679.402698][T25475] device hsr_slave_1 entered promiscuous mode [ 679.451611][T25475] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 679.459214][T25475] Cannot create hsr debugfs directory [ 679.653848][T25475] bridge0: port 2(bridge_slave_1) entered blocking state [ 679.660938][T25475] bridge0: port 2(bridge_slave_1) entered forwarding state [ 679.668337][T25475] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.675453][T25475] bridge0: port 1(bridge_slave_0) entered forwarding state [ 679.754616][T25475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 679.776098][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 679.788523][T13674] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.799756][T13674] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.833489][T13674] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 679.861395][T25475] 8021q: adding VLAN 0 to HW filter on device team0 [ 679.896614][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 679.912288][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 679.920622][ T2907] bridge0: port 1(bridge_slave_0) entered blocking state [ 679.927743][ T2907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 679.954716][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 679.964368][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 679.973328][ T9958] bridge0: port 2(bridge_slave_1) entered blocking state [ 679.980387][ T9958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 679.989808][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 680.011303][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 680.026868][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 680.036310][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 680.054756][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 680.063004][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 680.072444][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 680.092886][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 680.103220][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 680.112137][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 680.120611][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 680.131244][T25475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 680.164571][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 680.174673][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 680.192448][T25475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 680.282802][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 680.293184][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 680.322121][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 680.330429][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 680.343338][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 680.351146][ T2907] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 680.376628][T25475] device veth0_vlan entered promiscuous mode [ 680.410517][T25475] device veth1_vlan entered promiscuous mode [ 680.483489][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 680.502297][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 680.510681][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 680.532578][ T2897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 680.545462][T25475] device veth0_macvtap entered promiscuous mode [ 680.558731][T25475] device veth1_macvtap entered promiscuous mode [ 680.587128][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.599913][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.610865][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.622691][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.632890][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.643733][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.653905][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.665311][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.676284][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.701590][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.711419][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.731536][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.741360][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.761315][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.772039][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.783815][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.793699][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.804200][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.814105][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.825080][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.835022][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.845499][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.855423][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.865886][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.875798][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.886728][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.897865][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.908816][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.918779][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.929247][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.939127][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 680.949618][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 680.961143][T25475] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 680.972299][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 680.981143][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 680.990616][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 680.999528][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 681.016757][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.027677][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.038183][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.049013][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.058980][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.071728][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.081647][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.092160][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.102238][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.113645][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.123583][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.134246][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.145290][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.155860][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.165870][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.176394][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.186289][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.196796][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.206758][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.217263][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.228699][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.239255][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.249098][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.259606][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.269483][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.280577][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.290476][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.301009][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.311831][T25475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 681.322528][T25475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 681.334719][T25475] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 681.348599][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 681.359219][ T9946] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 16:48:52 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4604000000000000, 0x0) 16:48:52 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x20020, 0x0) 16:48:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:52 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x80, 0x140) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:48:52 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score\x00') r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r5, r0, 0x0, 0x10001ff) 16:48:52 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 681.707090][ T27] audit: type=1804 audit(1583081332.346:126): pid=25503 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir933694894/syzkaller.tx25vD/9/file0" dev="sda1" ino=16529 res=1 16:48:52 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4704000000000000, 0x0) [ 681.767791][T25506] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 681.860368][T25506] EXT4-fs (sda1): Remounting filesystem read-only 16:48:52 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4804000000000000, 0x0) [ 681.957370][ T27] audit: type=1804 audit(1583081332.596:127): pid=25520 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir933694894/syzkaller.tx25vD/9/file0" dev="sda1" ino=16529 res=1 16:48:52 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xff000000, 0x0, 0x0, 0x20020, 0x0) 16:48:52 executing program 4: r0 = msgget$private(0x0, 0x40) msgsnd(r0, &(0x7f0000000100)={0x2, "4d55c0a022dd83a9a3183104849edfbeb6f9123539d22ecbc3b5c6b614a5d8c333645489a26afd406ad8faa93bd7"}, 0x36, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x80) connect$ax25(r1, &(0x7f0000000140)={{0x3, @bcast, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.events\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000200)=0xc6) r4 = open$dir(&(0x7f0000000240)='./file0\x00', 0x43d082, 0x0) truncate(&(0x7f00000000c0)='./file0/file0\x00', 0x90002) sendfile(r2, r4, 0x0, 0x7fffffff) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsa\x00', 0x4000, 0x0) ioctl$SNDCTL_DSP_SETFMT(r5, 0xc0045005, &(0x7f00000002c0)=0x3) 16:48:52 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4904000000000000, 0x0) 16:48:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 682.211649][T25531] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 682.275369][T25531] EXT4-fs (sda1): Remounting filesystem read-only 16:48:53 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4a04000000000000, 0x0) 16:48:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'interleave', '=relative', @void}}}], [{@context={'context', 0x3d, 'system_u'}}]}) 16:48:53 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x20020, 0x0) 16:48:53 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:53 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x90002) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x980, 0x0) sendfile(r0, r1, 0x0, 0x8007fff7fff) 16:48:53 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4b04000000000000, 0x0) [ 682.696888][T25568] tmpfs: Unknown parameter 'context' [ 682.768874][ T27] audit: type=1804 audit(1583081333.406:128): pid=25574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir933694894/syzkaller.tx25vD/11/file0" dev="sda1" ino=16593 res=1 [ 682.829703][T25572] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 682.875822][ T27] audit: type=1804 audit(1583081333.436:129): pid=25577 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir933694894/syzkaller.tx25vD/11/file0" dev="sda1" ino=16593 res=1 16:48:53 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4c04000000000000, 0x0) [ 682.959126][T25572] EXT4-fs (sda1): Remounting filesystem read-only 16:48:53 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, r0, 0x0) 16:48:53 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:53 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x20020, 0x0) 16:48:53 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4d04000000000000, 0x0) 16:48:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:53 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003e40)={0x16, 0x0, 0x75, 0x1}, 0x2a) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0xd, 0x1, 0x0, &(0x7f0000000100)=[0x0], 0x1}, 0x20) r2 = openat$cgroup_subtree(r1, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'cpu'}, {0x2d, 'rdma'}, {0x2b, 'pids'}, {0x0, 'pids'}]}, 0x17) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000280), 0x2}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r0, 0x0, 0x0}, 0x18) 16:48:54 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r2, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x3c, r3, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008040}, 0x4010) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x4c, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x24000000}, 0x80) [ 683.445886][T25607] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:54 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4e04000000000000, 0x0) [ 683.518199][T25607] EXT4-fs (sda1): Remounting filesystem read-only 16:48:54 executing program 1: 16:48:54 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4f04000000000000, 0x0) 16:48:54 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x2300, 0x24) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x90003) sendfile(r0, r1, 0x0, 0x7fffffff) [ 683.709446][T25618] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 683.743986][T25618] EXT4-fs (sda1): Remounting filesystem read-only 16:48:54 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x20020, 0x0) 16:48:54 executing program 1: 16:48:54 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:54 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x5004000000000000, 0x0) [ 683.984536][ T27] audit: type=1804 audit(1583081334.626:130): pid=25636 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir933694894/syzkaller.tx25vD/13/file0" dev="sda1" ino=16578 res=1 [ 684.113407][T25643] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:54 executing program 1: [ 684.157540][T25643] EXT4-fs (sda1): Remounting filesystem read-only [ 684.164454][ T27] audit: type=1804 audit(1583081334.656:131): pid=25636 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir933694894/syzkaller.tx25vD/13/file0" dev="sda1" ino=16578 res=1 [ 684.196775][ T27] audit: type=1804 audit(1583081334.686:132): pid=25636 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir933694894/syzkaller.tx25vD/13/file0" dev="sda1" ino=16578 res=1 [ 684.269315][ T27] audit: type=1804 audit(1583081334.706:133): pid=25641 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir933694894/syzkaller.tx25vD/13/file0" dev="sda1" ino=16578 res=1 16:48:55 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:55 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') write$FUSE_NOTIFY_INVAL_INODE(r3, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x4, 0x800, 0x7}}, 0x28) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:48:55 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x5104000000000000, 0x0) 16:48:55 executing program 1: [ 684.417502][T25653] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:55 executing program 1: 16:48:55 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x5) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) [ 684.541711][T25653] EXT4-fs (sda1): Remounting filesystem read-only 16:48:55 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x8cffffff00000000, 0x0) 16:48:55 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffff5, 0x0, 0x0, 0x20020, 0x0) 16:48:55 executing program 1: [ 685.020234][T25693] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 685.051896][T25693] EXT4-fs (sda1): Remounting filesystem read-only 16:48:55 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:55 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xb400000000000000, 0x0) 16:48:55 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x0, @host}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x0, 0x0) close(r1) msgget$private(0x0, 0x510) msgsnd(0x0, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(0x0, &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)="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", 0x131, r2) socket(0x2000000011, 0x4000000000080002, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000200), 0x8) [ 685.217841][T25706] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 685.337140][T25706] EXT4-fs (sda1): Remounting filesystem read-only 16:48:56 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:56 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r5, 0x200, 0x401, 0x25dfdbfe, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x4004000) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x3c, r6, 0xf01, 0x0, 0x0, {0xb}, [@IPVS_CMD_ATTR_SERVICE={0x1c}, @IPVS_CMD_ATTR_SERVICE={0xc}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20060880}, 0x0) sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10810240}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r6, 0x11, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xed}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40851}, 0x20004081) 16:48:56 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf325000000000000, 0x0) 16:48:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b200080000001028e6c467144d2fa833"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x54, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x20, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x14, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0x10, 0x0, 0x0, 0x0, {{0x0, 0x7}, '\x00'}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x401}}]}]}}]}, 0x54}}, 0x0) 16:48:56 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x20020, 0x0) 16:48:56 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf5ffffff00000000, 0x0) [ 685.605393][T25721] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 685.639411][T25725] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 16:48:56 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf6ffffff00000000, 0x0) [ 685.779320][ T27] audit: type=1800 audit(1583081336.416:134): pid=25724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16577 res=0 16:48:56 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 685.927564][T25741] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 686.057397][T25741] EXT4-fs (sda1): Remounting filesystem read-only 16:48:56 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xf9fdffff00000000, 0x0) 16:48:57 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x20000000000, 0x0, 0x0, 0x20020, 0x0) 16:48:57 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xff00000000000000, 0x0) 16:48:57 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7ffffffb) [ 686.744904][T25783] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:57 executing program 1: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) r2 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) fcntl$getownex(r2, 0x10, &(0x7f0000000100)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) close(r0) 16:48:57 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x20020, 0x0) 16:48:57 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xff0f000000000000, 0x0) [ 687.233792][ T27] audit: type=1800 audit(1583081337.876:135): pid=25801 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16573 res=0 [ 687.318676][T25804] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:58 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xffefffff00000000, 0x0) 16:48:58 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 687.452380][T25804] EXT4-fs: 1 callbacks suppressed [ 687.452417][T25804] EXT4-fs (sda1): Remounting filesystem read-only 16:48:58 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000280)={'syz1\x00', {0x5, 0x6, 0x20, 0x3f}, 0x47, [0x57d, 0x1, 0x1, 0xffffffff, 0x5, 0xffff, 0x4, 0x20, 0x64be, 0x7, 0x4, 0x1, 0x80000001, 0x1, 0x0, 0xfffffffc, 0x8, 0x80000000, 0x2, 0x25, 0x10000, 0x842f, 0x2, 0x34b, 0x20, 0x81, 0x0, 0x8001, 0x1, 0x6, 0x1000, 0x80000000, 0x9, 0x3, 0xfffff001, 0x2, 0x1, 0xfffeffff, 0x4312, 0x400, 0x7, 0xfffffc00, 0x8, 0x7, 0x465, 0x7, 0x400, 0x3, 0x4, 0xe7, 0x101, 0x7fffffff, 0x5, 0x0, 0xffffffff, 0x9, 0x70, 0xa2, 0x6, 0xffffffff, 0x8001, 0x3, 0xd1d, 0xffff], [0x5aa, 0x5, 0x59a, 0x5, 0x1f, 0x800, 0x23f0, 0x0, 0x8, 0x4, 0x9, 0xfffffff9, 0x3, 0xffffffff, 0x1, 0x7, 0x31c, 0xe0, 0xd5a8, 0x140f, 0x3, 0x4, 0x2, 0x3, 0x7, 0x7, 0x3, 0x1ff, 0x1000, 0x140000, 0x1, 0x5, 0x98f, 0x8, 0x3, 0xffff, 0x6, 0x6, 0x97c3, 0x1000, 0x1, 0x8, 0x7fffffff, 0x80, 0xfff, 0x59d, 0x9, 0x4, 0x9, 0x1, 0x7, 0x0, 0xfffffffb, 0x0, 0x7, 0x8001, 0x2, 0xfffffffa, 0x9, 0x401, 0x8e4, 0x41b, 0x8, 0x6], [0x7, 0x101, 0x0, 0x3, 0x0, 0xc92, 0x5, 0x8, 0xff, 0x3ff, 0x1, 0x5, 0x0, 0xffffffe0, 0xff, 0x2, 0x8, 0xff, 0xffff, 0x0, 0x4, 0x2, 0xa3, 0x401, 0xff, 0x5c1, 0x40, 0x5, 0x7fff, 0x6a, 0x9, 0x5, 0x5, 0x8d7, 0x5, 0xc1, 0x4, 0x1, 0x5, 0x1, 0x3ff, 0x6, 0x80000000, 0x3, 0x800000, 0x9, 0x9, 0xfffffffa, 0x2, 0x8, 0x80000000, 0x1f, 0x2, 0x101, 0x5, 0x1, 0x800, 0x6, 0x1ff, 0x0, 0x80000001, 0xfffffffa, 0x800, 0x4], [0x8, 0x3, 0x80, 0x81, 0x8001, 0x5, 0x8001, 0x1, 0x0, 0x0, 0x800, 0x5c1, 0x8, 0x6, 0x7fff, 0x4cf, 0x1, 0x101, 0x6, 0x1, 0x40, 0x9b, 0xffff7fff, 0x80000000, 0x800, 0x8001, 0x7ff, 0x40, 0x267, 0xe9b, 0x6, 0x0, 0x7fff, 0x3, 0x6, 0x7fffffff, 0x5, 0x1, 0x5, 0x82, 0x5, 0x7, 0x3, 0x1, 0x0, 0x614a, 0x1, 0x93, 0xffff, 0x7, 0x1, 0x8, 0x3, 0xffffffff, 0xa5, 0x9, 0x1ff, 0xfffffff9, 0x20, 0x8000, 0x9, 0x1, 0x1ff, 0x7ff]}, 0x45c) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:48:58 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000680)="120000001200e1ef077b1a3fcd00e8907b7d", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) r1 = socket(0x2, 0x3, 0x67) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x52c) sendto$unix(r1, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0000e0}, 0x6e) 16:48:58 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xffffff7f00000000, 0x0) [ 687.680953][T25823] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:48:58 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xffffffff00000000, 0x0) [ 687.823503][T25823] EXT4-fs (sda1): Remounting filesystem read-only 16:48:58 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x20020, 0x0) 16:48:58 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xfffffffffffff000, 0x0) 16:48:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:59 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockname$ax25(r5, &(0x7f00000002c0)={{0x3, @null}, [@netrom, @rose, @null, @null, @rose, @bcast, @bcast, @default]}, &(0x7f0000000340)=0x48) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x1411, 0x800, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x3}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x3}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x8080) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = dup(r6) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8b1a, &(0x7f0000000040)='wln0\x00\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='GPL$%cgroup\x00', r7}, 0x10) [ 688.384719][T25854] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 688.402897][T25854] EXT4-fs (sda1): Remounting filesystem read-only 16:48:59 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0xffffffffffffffff, 0x0) 16:48:59 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x14) close(r2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffffa6fffff7", @ANYRES32, @ANYBLOB="0000000bf1ffffff0000000008000100636271"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 16:48:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:48:59 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:48:59 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x20020, 0x0) 16:48:59 executing program 5: mknod$loop(&(0x7f00000001c0)='./file1\x00', 0x4862, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8700, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x19223486}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) [ 689.018014][T25888] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 689.100335][T25888] EXT4-fs (sda1): Remounting filesystem read-only [ 689.154536][T25889] netlink: 2212 bytes leftover after parsing attributes in process `syz-executor.1'. 16:49:00 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x484000, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:49:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\xff') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 689.387936][T25900] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 689.402488][T25900] EXT4-fs (sda1): Remounting filesystem read-only 16:49:00 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x5, 0x8) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:49:00 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x20020, 0x0) 16:49:00 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) [ 689.663526][ T27] audit: type=1800 audit(1583081340.306:136): pid=25915 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16581 res=0 [ 689.889101][T25925] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 689.915437][T25925] EXT4-fs (sda1): Remounting filesystem read-only 16:49:00 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0xffff, 0x4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:49:00 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x20020, 0x0) 16:49:00 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x1000180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) prctl$PR_MCE_KILL_GET(0x22) dup(r2) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000480)={0x4, 0x1f, 0x0, 0xffffffffffffffff}) dup(r7) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000340)={0x3, @default, r8}) dup(r5) mount(&(0x7f0000000200)=ANY=[@ANYRESDEC=0x0, @ANYRES16, @ANYBLOB="b8bb2d94bbb947345eb527f60f36a20afd2f001f3e4bd9185b0171dadd16033ba3744ff5755bd3ee4d359308eaf63a10530726c3ffe9707197c61af6663cb1ae873c0c4649b39e3bae0ef74ac1b90039d78612e5a82bb8eb5459d8c9ce4804", @ANYRES16=0x0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES64=r0, @ANYRES32=r2, @ANYRESDEC, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES16, @ANYRESDEC, @ANYPTR, @ANYRESDEC, @ANYRES16, @ANYBLOB="30a9fd5ac5f8b66ce3cec68f667349f86adda9c6f4c98d3e0c3e6cbbb96804920cea8e2d518d98822702a18119ce8db9f82d36ef3807463e4c042f4c53eb982d77bf08ee674c0d6747d48d916a377b5154fcd1b461b9d3e49be178ca44bcad8a8377e6ddc3eaf04a113c2ae7053dfcb9ab70849427109a62a21c3083edd7e5a2b307c1a4be069de7785190c773172675a8f22a2fe95c701c2e799da19bddb943dfa88cb84a59f3c0ff4387feb5caafef126462bb7512eed00cc15449001fceda0e8a3c41681181c0affed4ebe1597f1f7316fa6622255f9b1b8ba66e6707875d7140714773a07765137457c1289b8b4e7c79d2"], @ANYRES16, @ANYRESHEX=r3, @ANYRES64, @ANYRES64], @ANYRESHEX, @ANYRES32=r4, @ANYRES16=r5], &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x20, 0x0) 16:49:00 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:49:01 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000380)={'batadv_slave_1\x00', 0x0}) sendmsg$NL80211_CMD_DEL_STATION(r2, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x10, 0xbd, [0xff81, 0x7, 0x9, 0x97, 0x7, 0x3]}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x6}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r4}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x44090) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x80, r0, 0x100, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY_SEQ={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @multicast}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "d5d78114107f013488e39e620a"}, @NL80211_ATTR_KEY_SEQ={0xe, 0xa, "18466329433a58ee4a6e"}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "ff2f20d8e2b531ba2ce917ac99"}]}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x20000002) r5 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v1={0x1000000, [{0x1, 0x1c}]}, 0xc, 0x3) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r5, r6, 0x0, 0x7fffffff) [ 690.444887][T25944] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 690.502097][T25944] EXT4-fs (sda1): Remounting filesystem read-only [ 690.642561][T25958] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 690.655208][T25958] EXT4-fs (sda1): Remounting filesystem read-only 16:49:01 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:49:01 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x20020, 0x0) 16:49:01 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:49:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\xff') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:49:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "000400", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [0x7]}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) [ 691.018347][T25969] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 691.035456][T25969] EXT4-fs (sda1): Remounting filesystem read-only 16:49:01 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x14, 0x200, 0x70bd25, 0x25dfdbff, {0x29, 0xfe}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x404404c) sendfile(r0, r1, 0x0, 0x7fffffff) [ 691.183420][ T2625] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 691.198713][T25971] F2FS-fs (loop5): Unable to read 1th superblock [ 691.259176][ T2625] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 691.272762][T25971] F2FS-fs (loop5): Unable to read 2th superblock 16:49:02 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x20020, 0x0) 16:49:02 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000040)={{0x80, 0x3}, {0xfc, 0x3f}, 0x4, 0x2, 0x7}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:49:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x17, &(0x7f0000001e40)=@raw={'raw\x00', 0x8, 0x3, 0x1e0, 0x0, 0x140, 0x140, 0x0, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x240) [ 691.679976][ T27] audit: type=1800 audit(1583081342.316:137): pid=26000 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16578 res=0 16:49:02 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r4 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r5 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r5, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 691.876251][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 691.887414][T26023] F2FS-fs (loop5): Unable to read 1th superblock [ 691.896844][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 691.908160][T26023] F2FS-fs (loop5): Unable to read 2th superblock 16:49:02 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0xc000, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:49:02 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) [ 691.917937][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 691.929221][T26027] F2FS-fs (loop5): Unable to read 1th superblock [ 691.936987][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 691.950912][T26027] F2FS-fs (loop5): Unable to read 2th superblock [ 692.042855][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 692.054299][T26034] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 692.062773][T26035] F2FS-fs (loop5): Unable to read 1th superblock [ 692.070383][T26034] EXT4-fs (sda1): Remounting filesystem read-only [ 692.077798][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 16:49:02 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2200cf7d, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) sendmsg$inet(r0, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000002ac0)=[{&(0x7f0000000180)="bd51", 0x2}], 0x1}, 0x1400c0c9) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf32(r0, &(0x7f0000001600)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) sendto$inet(r0, &(0x7f0000001480)='F', 0x1, 0xe803, 0x0, 0x0) 16:49:02 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') [ 692.089513][T26035] F2FS-fs (loop5): Unable to read 2th superblock [ 692.097514][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 692.109034][T26038] F2FS-fs (loop5): Unable to read 1th superblock [ 692.116695][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 692.127857][T26038] F2FS-fs (loop5): Unable to read 2th superblock [ 692.179836][T26044] F2FS-fs (loop5): Unable to read 1th superblock [ 692.189638][T26044] F2FS-fs (loop5): Unable to read 2th superblock [ 692.199104][T26046] F2FS-fs (loop5): Unable to read 1th superblock [ 692.211675][T11060] tipc: TX() has been purged, node left! 16:49:02 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x10, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) 16:49:02 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 692.242805][T26046] F2FS-fs (loop5): Unable to read 2th superblock [ 692.316487][T26050] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 692.462935][T11060] tipc: TX() has been purged, node left! 16:49:03 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x20020, 0x0) 16:49:03 executing program 1: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="179b5bb218d22814f11cfecb00b14932e88ecba15da258516fc55b699f8819c9d120f170b25472e4c5d9ab3369dffa73cad312abff1a8707729e7343fd7aba19d3e7fe5f18087f8272af40a091aa54d2320f644304387295510f"], 0x44}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) 16:49:03 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r3 = dup(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r4 = creat(0x0, 0x0) r5 = accept(r4, &(0x7f0000000240)=@rc={0x1f, @fixed}, &(0x7f00000002c0)=0x80) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000000)={r8}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r5, 0x84, 0x23, &(0x7f0000000300)={r8, 0x596}, 0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000040)={r8, 0x16}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r9, 0x4) 16:49:03 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) getsockname$l2tp(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0xfffffffffffffedb) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x20, 0x800100) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000100)={0x9d0000, 0x8, 0x1, r2, 0x0, &(0x7f00000000c0)={0x980903, 0x9d, [], @value=0x401}}) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) [ 692.802361][T11060] tipc: TX() has been purged, node left! 16:49:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\xfd') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 692.991620][T11060] tipc: TX() has been purged, node left! [ 693.120256][T26079] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 693.130154][ T27] audit: type=1800 audit(1583081343.766:138): pid=26075 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16629 res=0 [ 693.197848][T26079] EXT4-fs: 1 callbacks suppressed [ 693.197860][T26079] EXT4-fs (sda1): Remounting filesystem read-only [ 693.211623][T26086] F2FS-fs (loop5): Unable to read 1th superblock [ 693.271767][T11060] tipc: TX() has been purged, node left! [ 693.390634][T26086] F2FS-fs (loop5): Unable to read 2th superblock [ 693.579425][T26096] F2FS-fs (loop5): Unable to read 1th superblock [ 693.586014][T26083] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 693.586033][T26083] EXT4-fs (sda1): Remounting filesystem read-only [ 693.681679][T11060] tipc: TX() has been purged, node left! [ 693.731893][T26096] F2FS-fs (loop5): Unable to read 2th superblock 16:49:04 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:49:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)={0x14, 0x2, 0x7, 0x301}, 0x14}}, 0x0) 16:49:04 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x20020, 0x0) 16:49:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x7f') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 693.863840][T11060] tipc: TX() has been purged, node left! 16:49:04 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x4, 0x0) [ 694.071875][T11060] tipc: TX() has been purged, node left! 16:49:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000009804000000000000d000000000000000d000000000000000c8030000c8030000c8030000c8030000c80300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a4543540000000000000000000000000000000000000000000000000000000000000000fe88000000000000000000000000000100000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000726f73653000000000000000000000006e657464657673696d3000000000000000000000000000000000000000000000ff000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000228020000000000000000000000000000000000000000000000005801686173686c696d697400000000000000000000000000000000000000000365727370616e3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eaff0000ff7fffffffffffff000000000000000000000000c576000003ffffff000000000000000000000000000000000000000028004e465155455545000000000000000000000000000000000000000000000100000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 16:49:04 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000040)) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000140)="2572674a9f1e705b49c9a4e5b9a92a8b1a532da70a6ab1b03ef383ed604552da1e58a7c19aadd078697f5e27dbb2a82b6ce19a37d4492af62469820e846cc673fb439e317a9c85c76e24b215623429a425c337a7975b37fd8cdaafc0b2066dd3584c1a5334774740c2d9546bb1") r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x34, r6, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x34}}, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r8 = dup(r7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockopt$inet6_mreq(r8, 0x29, 0x1b, &(0x7f00000001c0)={@mcast2, 0x0}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv_slave_0\x00', 0x0}) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r12 = dup(r11) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8b1a, &(0x7f0000000040)='wlan0\x00') r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r17, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r17, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x60, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r17, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x30, 0x2, [@TCA_BASIC_EMATCHES={0x2c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x2e23}}, @TCA_EMATCH_TREE_LIST={0x20, 0x2, 0x0, 0x1, [@TCF_EM_META={0x1c, 0x1, 0x0, 0x0, {{}, [@TCA_EM_META_LVALUE={0x4}, @TCA_EM_META_HDR={0xc}]}}]}]}]}}]}, 0x60}}, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000002c0)={'wg1\x00', r17}) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) r21 = socket$netlink(0x10, 0x3, 0x0) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r21, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r23, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r20, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r23, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB='`\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r23, @ANYBLOB="00000000000000000f0000000a000100626173696300000030c9ec604900028008000100232e0000200002801c0001000000040000747400040002000c0001000000000000000000c1d2cbc77280325bca5e"], 0x60}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r4, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x88, r6, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r18}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r23}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}]}, 0x88}}, 0x10) sendfile(r1, r2, 0x0, 0x7fffffff) [ 694.232012][T26117] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 694.281713][T11060] tipc: TX() has been purged, node left! [ 694.331771][T26117] EXT4-fs (sda1): Remounting filesystem read-only 16:49:05 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2f6465b911f2624c05b079"], &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) r0 = semget(0x1, 0x0, 0x382) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x8, 0x8}, 0xc) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x10500) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x100, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r6 = dup(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b1a, &(0x7f0000000040)='wlan0\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r6, 0xc0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x7, 0x4}, 0x0, 0x0, &(0x7f00000003c0)={0x1, 0x7, 0x9320, 0x3000000}, &(0x7f0000000400)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=0x8d86}}, 0x10) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r9 = dup(r8) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8b1a, &(0x7f0000000040)='wlan0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ef4, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0x2, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x74}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x7b, &(0x7f0000000100)=""/123, 0xe0c28d9370f411b, 0xb, [], r3, 0xc, r4, 0x8, &(0x7f0000000280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x2, 0x5, 0x6}, 0x10, r7, r9}, 0x78) [ 694.482972][T11060] tipc: TX() has been purged, node left! [ 694.484906][T26130] x_tables: duplicate underflow at hook 2 [ 694.508863][T11060] tipc: TX() has been purged, node left! 16:49:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x8d') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 694.526286][T26131] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 694.580224][T26131] EXT4-fs (sda1): Remounting filesystem read-only [ 694.589162][T26137] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.4'. [ 694.645771][ T27] audit: type=1800 audit(1583081345.286:139): pid=26135 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16654 res=0 16:49:05 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x20020, 0x0) [ 694.822000][T26143] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.4'. [ 695.128080][T26156] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:49:05 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 695.172064][T26156] EXT4-fs (sda1): Remounting filesystem read-only 16:49:05 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r1) r2 = dup2(r0, r1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r5 = dup(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$KVM_GET_CLOCK(r5, 0x8030ae7c, &(0x7f00000000c0)) r6 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8b1a, &(0x7f0000000040)='wlan0\x00') renameat(r2, &(0x7f0000000040)='./file0\x00', r6, &(0x7f0000000080)='./file1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="8d00170000000000"], &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) [ 695.254366][T26161] x_tables: duplicate underflow at hook 2 [ 695.327861][T26163] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 695.351850][T26163] EXT4-fs (sda1): Remounting filesystem read-only 16:49:06 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x20020, 0x0) [ 695.939561][T26182] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 695.961808][T26182] EXT4-fs (sda1): Remounting filesystem read-only 16:49:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000003740)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, &(0x7f0000003800)=""/53, 0x35}, 0x0) [ 696.168602][T26185] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 696.350203][T26185] EXT4-fs (sda1): Remounting filesystem read-only 16:49:07 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x20020, 0x0) 16:49:07 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="05ffffe09e16f5b3ac6ea7fe11cbba3a5285564a94cfb3f3c005fdb252672fa7c51f00000000000000f9ff6e3081b256e9798a6231ba2e3cefb88577fbd93a035c2753546fb7c50eb63442c8373ef41c1e5304b69edd43b3994bc2e784b4a53c3db27158368b91c93308fcc92da1c02576455b34edd2f03ddea1988b8176b1fa423f49108c76ad07c4409471cfaa0b3206cff1c123f1d8f81aff359aa74c076abb96723efbd112489e10bce630d4f2363f0149d38f5a8e3c063f747230eebffbbea53bfcd80960407e949cc6cc7a8b8853a8bf92db493fa204f924d4a4508ea04d15a0aea0d5c68bf6f2e17acaecc659017f603361736715c2702a4085117ba51f6731d8ec1200061d146cde275d5816eafc65aba9570fa3c6f8e7883eb121006c9cb9ed23b5284e58d2ea4a2568e7b415e9ea38137b4c7eedd64807d1b768af1475ef0fa3d1b73d7afc4ecba0e2ea415e3e845788076c48e0fa95b8334519528921892073a2aac97dfdee12df5d03317f6a1d67a7285417aae9c4a609d2424e37a924a1e0dbcb6141c18e8784ea6abec74f3950c5453cdeedd987c9ad7d6293373bcb4733a7d8743b1c1e5239ce475363fe5f51dfc36daeb47dae3b5f666dbc053ce652a244fd5f9409503e7d0e10e2bc311dac3bdafbda065f4ccf89cd60645d933342263a483c606c18c8f92aa6193cad49601a15eef8", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xffffffff}, 0x9c) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 696.742000][T26198] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 696.853163][T26198] EXT4-fs (sda1): Remounting filesystem read-only [ 696.969102][T26205] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 697.012885][T26205] EXT4-fs (sda1): Remounting filesystem read-only 16:49:07 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x20020, 0x0) 16:49:07 executing program 1: r0 = semget(0x1, 0x0, 0x0) semctl$GETZCNT(r0, 0x2, 0x7, 0x0) [ 697.420864][T26210] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:49:11 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8b1a, &(0x7f0000000040)='wlan0\x00') setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f00000002c0)=0x3, 0x2) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x703, 0x0, 0x0, {0x7, 0x0, 0x8}, [@CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x4}, @CTA_LABELS={0x4}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x82}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x30}}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4e080}, 0x4080) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) lsetxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x5) sendfile(r0, r3, 0x0, 0x7fffffff) 16:49:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0xc8, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff1}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x9c, 0x2, [@TCA_U32_MARK={0x10}, @TCA_U32_SEL={0x74, 0x5, {0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, [{}, {}, {}, {}, {}, {}]}}, @TCA_U32_INDEV={0x14, 0x8, 'geneve0\x00'}]}}]}, 0xc8}}, 0x0) 16:49:11 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:49:11 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x20020, 0x0) 16:49:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 16:49:11 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) umount2(&(0x7f0000000000)='./file0\x00', 0x1) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000340), &(0x7f00000003c0)=0x8) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='f2fs\x00', 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) dup(r2) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) recvmsg$can_j1939(r3, &(0x7f0000000300)={&(0x7f0000000040)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/201, 0xc9}], 0x1, &(0x7f0000000240)=""/186, 0xba}, 0x12003) [ 700.620964][T26253] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user 16:49:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r3, &(0x7f00000000c0), 0xe) r4 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r5, &(0x7f00000000c0), 0xe) listen(r5, 0x0) poll(0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r6, &(0x7f00000000c0), 0xe) poll(&(0x7f0000000040)=[{r6}], 0x1, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r7, &(0x7f00000000c0), 0xe) listen(0xffffffffffffffff, 0x1fc) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r8, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), 0xe) poll(&(0x7f0000000040)=[{}], 0x1, 0x0) [ 700.674550][T26253] EXT4-fs: 1 callbacks suppressed [ 700.674562][T26253] EXT4-fs (sda1): Remounting filesystem read-only 16:49:11 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r3, &(0x7f00000000c0), 0xe) r4 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r5, &(0x7f00000000c0), 0xe) listen(r5, 0x0) poll(0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r6, &(0x7f00000000c0), 0xe) poll(&(0x7f0000000040)=[{r6}], 0x1, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r7, &(0x7f00000000c0), 0xe) listen(0xffffffffffffffff, 0x1fc) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r8, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), 0xe) poll(&(0x7f0000000040)=[{}], 0x1, 0x0) 16:49:11 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB='/dev\'loop0\x00'], &(0x7f0000000d80)='./file0\x00', &(0x7f0000000000)='f2fs\x00', 0x0, 0x0) [ 700.824784][ T2626] print_req_error: 8 callbacks suppressed [ 700.824802][ T2626] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 700.842872][T26261] F2FS-fs (loop5): Unable to read 1th superblock [ 700.850334][ T2626] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 700.864087][T26261] F2FS-fs (loop5): Unable to read 2th superblock 16:49:11 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0xc4) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) 16:49:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 701.125346][T26280] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 701.144011][T26280] EXT4-fs (sda1): Remounting filesystem read-only 16:49:11 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x42042, 0x88) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000280)={'filter\x00', 0x7, 0x4, 0x3f0, 0x110, 0x220, 0x220, 0x308, 0x308, 0x308, 0x4, &(0x7f0000000040), {[{{@arp={@broadcast, @multicast2, 0xff, 0xff000000, 0x0, 0xa, {@empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}}, {@mac=@random="852771e87661", {[0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}}, 0x8, 0x43a, 0xa2e, 0x421d, 0x9, 0x1, 'batadv_slave_0\x00', 'caif0\x00', {}, {}, 0x0, 0x40}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@local, @local, @dev={0xac, 0x14, 0x14, 0x38}, 0x4, 0x1}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0xf, 0x1}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x7}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) setns(r1, 0x8000000) sendfile(r1, r2, 0x0, 0x7fffffff) 16:49:11 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000d80)='./file0\x00', &(0x7f0000000380)='ext3\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="3900000006000000000000000000000002000000000000000200000000000000100000000000000073656c696e75782a2573656c662928f151a53d0e5c94eaf8f496cd792b00"], 0x39) 16:49:12 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r3, &(0x7f00000000c0), 0xe) r4 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r5, &(0x7f00000000c0), 0xe) listen(r5, 0x0) poll(0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r6, &(0x7f00000000c0), 0xe) poll(&(0x7f0000000040)=[{r6}], 0x1, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r7, &(0x7f00000000c0), 0xe) listen(0xffffffffffffffff, 0x1fc) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r8, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), 0xe) poll(&(0x7f0000000040)=[{}], 0x1, 0x0) 16:49:12 executing program 3: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) inotify_init1(0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f0000000080)=0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x20000000021) poll(0x0, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x1ff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESDEC], 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000440)="1ee9bb3cbc93c8b0b379c5cf05e766ae2e30be71e37a1e85f6c01b4b54917ca25dd02a2f373cf0ad0478f5df8143761b188b27c5bdfb970c32d4299628be95c54784c66259bd386b7c4b0eb566b3fd53dd84dbb9cbc926720acdbd72079c5ab37f71a664fc047352a46bc95690b64098d8b18d5c0f0d31a904d1fab92bd7b9d32148d1836f5837203b1d8ba498ea8e34878d825feaa10e205210e5758622", 0x9e}], 0x1, 0x1) bind$packet(r4, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 16:49:12 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x20020, 0x0) 16:49:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 701.436169][ T2625] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 701.453924][T26302] EXT4-fs (loop5): unable to read superblock 16:49:12 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x542, 0x4100) ioctl$int_out(r2, 0xe4eb8c34c0702f09, &(0x7f00000000c0)) [ 701.598844][ T2626] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 701.611994][T26304] EXT4-fs (loop5): unable to read superblock 16:49:12 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x14602, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 16:49:12 executing program 5: mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='exfat\x00', 0x0, 0x0) [ 701.704569][T26318] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 701.722028][T26318] EXT4-fs (sda1): Remounting filesystem read-only 16:49:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b1a, &(0x7f0000000040)='wlan0\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 701.853299][T26327] EXT4-fs error (device sda1): ext4_remount:5436: Abort forced by user [ 701.863716][T26327] EXT4-fs (sda1): Remounting filesystem read-only [ 701.917647][T26331] [EXFAT] trying to mount... 16:49:12 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) listen(r0, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r3, &(0x7f00000000c0), 0xe) r4 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r5, &(0x7f00000000c0), 0xe) listen(r5, 0x0) poll(0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r6, &(0x7f00000000c0), 0xe) poll(&(0x7f0000000040)=[{r6}], 0x1, 0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r7, &(0x7f00000000c0), 0xe) listen(0xffffffffffffffff, 0x1fc) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r8, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), 0xe) poll(&(0x7f0000000040)=[{}], 0x1, 0x0) 16:49:12 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x20020, 0x0) [ 702.009566][ T2626] block nbd5: Attempted send on invalid socket [ 702.016926][ T2626] blk_update_request: I/O error, dev nbd5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 702.049538][T26331] ------------[ cut here ]------------ [ 702.091636][T26331] [EXFAT] No bh, device seems wrong or to be ejected. [ 702.099181][T26331] WARNING: CPU: 1 PID: 26331 at drivers/staging/exfat/exfat_blkdev.c:62 exfat_bdev_read+0x24f/0x2b0 [ 702.109953][T26331] Kernel panic - not syncing: panic_on_warn set ... [ 702.116557][T26331] CPU: 1 PID: 26331 Comm: syz-executor.5 Not tainted 5.6.0-rc3-next-20200225-syzkaller #0 [ 702.126446][T26331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.136512][T26331] Call Trace: [ 702.139818][T26331] dump_stack+0x197/0x210 [ 702.144170][T26331] ? exfat_bdev_read+0x1b0/0x2b0 [ 702.149192][T26331] panic+0x2e3/0x75c [ 702.153103][T26331] ? add_taint.cold+0x16/0x16 [ 702.157805][T26331] ? __kasan_check_write+0x14/0x20 [ 702.162950][T26331] ? __warn.cold+0x14/0x3e [ 702.167389][T26331] ? exfat_bdev_read+0x24f/0x2b0 [ 702.172335][T26331] __warn.cold+0x2f/0x3e [ 702.176589][T26331] ? exfat_bdev_read+0x24f/0x2b0 [ 702.181535][T26331] report_bug+0x289/0x300 [ 702.185942][T26331] do_error_trap+0x11b/0x200 [ 702.190555][T26331] do_invalid_op+0x37/0x50 [ 702.194980][T26331] ? exfat_bdev_read+0x24f/0x2b0 [ 702.199930][T26331] invalid_op+0x23/0x30 [ 702.204115][T26331] RIP: 0010:exfat_bdev_read+0x24f/0x2b0 [ 702.209670][T26331] Code: 00 00 31 ff 41 bc fb ff ff ff 89 de e8 9a ba 74 fb 85 db 0f 85 5d ff ff ff e8 0d b9 74 fb 48 c7 c7 60 ef ed 88 e8 30 d9 44 fb <0f> 0b e9 45 ff ff ff e8 15 e6 b3 fb e9 ad fe ff ff e8 cb e5 b3 fb [ 702.229285][T26331] RSP: 0018:ffffc900089cfae0 EFLAGS: 00010286 [ 702.235361][T26331] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 702.243341][T26331] RDX: 0000000000020250 RSI: ffffffff815ef766 RDI: fffff52001139f4e [ 702.251327][T26331] RBP: ffffc900089cfb18 R08: ffff88805aeae600 R09: ffffed1015d245c9 [ 702.259332][T26331] R10: ffffed1015d245c8 R11: ffff8880ae922e43 R12: 00000000fffffffb [ 702.267317][T26331] R13: ffff88801c820000 R14: 0000000000000001 R15: 0000000000000000 [ 702.275400][T26331] ? vprintk_func+0x86/0x189 [ 702.281696][T26331] sector_read+0x140/0x1f0 [ 702.286138][T26331] exfat_fill_super.cold+0x2e4/0x895 [ 702.291474][T26331] ? exfat_read_root+0x8f0/0x8f0 [ 702.296475][T26331] ? vsprintf+0x40/0x40 [ 702.300660][T26331] ? wait_for_completion+0x440/0x440 [ 702.305956][T26331] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 702.311736][T26331] ? set_blocksize+0x25a/0x2d0 [ 702.316533][T26331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.322794][T26331] mount_bdev+0x304/0x3c0 [ 702.327148][T26331] ? exfat_read_root+0x8f0/0x8f0 [ 702.332120][T26331] exfat_fs_mount+0x35/0x40 [ 702.336714][T26331] ? exfat_remount+0x50/0x50 [ 702.341348][T26331] legacy_get_tree+0x108/0x220 [ 702.346144][T26331] vfs_get_tree+0x8e/0x300 [ 702.350579][T26331] do_mount+0x135a/0x1b50 [ 702.354946][T26331] ? copy_mount_string+0x40/0x40 [ 702.359896][T26331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 702.366210][T26331] ? _copy_from_user+0x12c/0x1a0 [ 702.371175][T26331] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 702.378394][T26331] ? memdup_user+0x80/0xd0 [ 702.382843][T26331] __x64_sys_mount+0x192/0x230 [ 702.387629][T26331] do_syscall_64+0xfa/0x790 [ 702.392150][T26331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.398047][T26331] RIP: 0033:0x45c479 [ 702.401960][T26331] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 702.421576][T26331] RSP: 002b:00007fde7ba38c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 702.430012][T26331] RAX: ffffffffffffffda RBX: 00007fde7ba396d4 RCX: 000000000045c479 [ 702.438006][T26331] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00000000200000c0 [ 702.446087][T26331] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 702.454073][T26331] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 702.462055][T26331] R13: 000000000000074a R14: 00000000004c9d34 R15: 000000000076bf2c [ 702.471435][T26331] Kernel Offset: disabled [ 702.475977][T26331] Rebooting in 86400 seconds..