Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 30.669666] audit: type=1800 audit(1539707036.437:33): pid=5323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 30.690779] audit: type=1800 audit(1539707036.437:34): pid=5323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 34.147923] audit: type=1400 audit(1539707039.907:35): avc: denied { map } for pid=5503 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.101' (ECDSA) to the list of known hosts. 2018/10/16 16:24:06 fuzzer started [ 41.047683] audit: type=1400 audit(1539707046.807:36): avc: denied { map } for pid=5514 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/10/16 16:24:08 dialing manager at 10.128.0.26:44929 2018/10/16 16:24:09 syscalls: 1 2018/10/16 16:24:09 code coverage: enabled 2018/10/16 16:24:09 comparison tracing: enabled 2018/10/16 16:24:09 setuid sandbox: enabled 2018/10/16 16:24:09 namespace sandbox: enabled 2018/10/16 16:24:09 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/16 16:24:09 fault injection: enabled 2018/10/16 16:24:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/16 16:24:09 net packed injection: enabled 2018/10/16 16:24:09 net device setup: enabled 16:27:07 executing program 0: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in6, @in=@remote, 0x4e20, 0x0, 0x4e21, 0x0, 0x2, 0x20, 0xa0, 0xbf, r1, r2}, {0x5f, 0x1, 0x9, 0x10000, 0x800000000000000, 0x4, 0x3f, 0xfffffffffffffffb}, {0xfffffffffffffffd, 0x1, 0x100000001, 0x5}, 0x101, 0x6e6bbc, 0x1, 0x0, 0x2, 0x3}, {{@in6=@mcast1, 0x4d2, 0x3c}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x10}, 0x0, 0x1, 0x1, 0x7, 0x10001, 0x1, 0x7f}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x7, 0x4, &(0x7f00000016c0)=[{&(0x7f00000004c0)="b8a1d68b5c03378a3885fbdad5822bcc36977f3d0ebe8260c0f1325ccf7a9b8ce9cf1faf36cc48bfddc1c81e6a7324d688033eb87aecf1f159104f40b1899cfa93d9e0ab7dbb0ebe6dc4e202248be4bcb5cefab559b8dbd5a54743453c9894637531a1dd82c0a3dd6f75b9a82b5396abaa3e09c7f89e315ab4612172d88a8bc8045c141c5aac1739dd521fc448456bc7116c1accd6d79171b21b10988d65ed00671c6e4024424a", 0xa7, 0xffff}, {&(0x7f0000000580)="a406565699a6764d474939396c6b9cbf45be28f388d4dd43616694d86e6a626724d0639fa8e02199c198584a2b01fdf31002598c32663f474548b4c30645fafdd5ba5bf4805cee4300e8f07afdc5c1357bdd7655edf160c700826570feb43d302002e3491db38775bd7400ddfed2f8f66f3ee9441d96b052b21f03c1597fb25be7dfaa9f356faf3f97b1e26b820f4d2fa790f95ebb0240abef0adf8f5afa81c585f8089769884305425eed7dc439af0608110217dee27e7601ebd315b3f5f25fb8de609078bf309decd586127a54ff67fbf98a8596f5841e08", 0xd9}, {&(0x7f0000000680)="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", 0x1000, 0x8001}, {&(0x7f0000001680)="46efd97ee753d5fe9da94dbd4f1f3c50685799f3a169a4b1cb5eef0653b0092c0f3401b1a3cf416c393830e0146777b7d349a7174cb6", 0x36, 0xffff}], 0x2000000, &(0x7f0000001740)={[{@norecovery='norecovery'}, {@noacl='noacl'}, {@lazytime='lazytime'}, {@nodiscard='nodiscard'}, {@sb={'sb', 0x3d, 0x9}}, {@nolazytime='nolazytime'}, {@debug='debug'}, {@abort='abort'}, {@dioread_lock='dioread_lock'}], [{@uid_gt={'uid>', r2}}, {@fowner_lt={'fowner<', r2}}]}) syncfs(r0) write$selinux_access(r0, &(0x7f0000001800)={'system_u:object_r:iptables_initrc_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x81}, 0x50) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001900)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000018c0)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000001940)='/dev/audio\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000001980)={0x12, 0x10, 0xfa00, {&(0x7f0000001880), r4, r5}}, 0x18) read$FUSE(r5, &(0x7f00000019c0), 0x1000) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000029c0), &(0x7f0000002a00)=0x6) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000002a40)={0x0, 0x3f, 0x30}, &(0x7f0000002a80)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000002ac0)={r6, 0x4}, &(0x7f0000002b00)=0x8) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000002b80)={0x1, 0x10, 0xfa00, {&(0x7f0000002b40), r4}}, 0x18) r7 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000002bc0)={'nr0\x00', 0x7fffffff}) fsetxattr$security_selinux(r5, &(0x7f0000002c00)='security.selinux\x00', &(0x7f0000002c40)='system_u:object_r:devicekit_power_exec_t:s0\x00', 0x2c, 0x3) setresgid(r3, r3, r3) r8 = accept(r7, 0x0, &(0x7f0000002c80)) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r8, 0x84, 0x4, &(0x7f0000002cc0)=0x2, 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000002d00)=0x4) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000002d40)='/dev/vga_arbiter\x00', 0x10000, 0x0) getsockopt$inet6_tcp_buf(r9, 0x6, 0x1f, &(0x7f0000002d80)=""/36, &(0x7f0000002dc0)=0x24) setresgid(r3, r3, r3) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000002e00)={0xf, 0x8, 0xfa00, {r4, 0xa}}, 0x10) execveat(r5, &(0x7f0000002e40)='./file0\x00', &(0x7f0000003100)=[&(0x7f0000002e80)='sb', &(0x7f0000002ec0)='norecovery', &(0x7f0000002f00)='\x00', &(0x7f0000002f40)='\x00', &(0x7f0000002f80)='system_u:object_r:devicekit_power_exec_t:s0\x00', &(0x7f0000002fc0)='posix_acl_access]S:eth0\x00', &(0x7f0000003000)='/usr/sbin/ntpd', &(0x7f0000003040)='system_u:object_r:devicekit_power_exec_t:s0\x00', &(0x7f0000003080)='uid>', &(0x7f00000030c0)='system_u:object_r:devicekit_power_exec_t:s0\x00'], &(0x7f00000032c0)=[&(0x7f0000003180)="73656375726974793ab52473656c667472757374656400", &(0x7f00000031c0)='.wlan1\x00', &(0x7f0000003200)='debug', &(0x7f0000003240)='system_u:object_r:devicekit_power_exec_t:s0\x00', &(0x7f0000003280)='{mime_type\x00'], 0x1800) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000003340)=&(0x7f0000003300)) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000003380)=0x15000) ioctl$TIOCNXCL(r0, 0x540d) [ 221.874549] audit: type=1400 audit(1539707227.637:37): avc: denied { map } for pid=5529 comm="syz-executor0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14705 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 221.965826] IPVS: ftp: loaded support on port[0] = 21 16:27:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x100000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)='u', 0x1, 0xffffffff}], 0x800408, &(0x7f0000000100)={[{@errors_recover='errors=recover'}, {@case_sensitive_yes='case_sensitive=yes'}, {@dmask={'dmask', 0x3d, 0xffffffff}}, {@errors_recover='errors=recover'}, {@errors_continue='errors=continue'}, {@case_sensitive_yes='case_sensitive=yes'}]}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x101000, 0x0) write$FUSE_LSEEK(r0, &(0x7f00000001c0)={0x18, 0xfffffffffffffff5, 0x2, {0x10000}}, 0x18) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000200)={0x7c, 0x80000000, 0x6, 0x0, 0x20, 0x4}) mkdir(&(0x7f0000000240)='./file0\x00', 0x15) ioctl$TCSBRKP(r0, 0x5425, 0x6) statfs(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/4096) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/zero\x00', 0x0, 0x0) utime(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)={0x39c}) write$FUSE_DIRENT(r0, &(0x7f0000001380)={0xf8, 0x0, 0x6, [{0x2, 0x5, 0x1, 0x4, '{'}, {0x3, 0x800, 0xe, 0x7, '-}-\\nodevppp0!'}, {0x0, 0x0, 0x5, 0x34fb, 'dmask'}, {0x2, 0x3, 0x2, 0x3, '-.'}, {0x6, 0xffff, 0x5, 0x80000000, 'dmask'}, {0x6, 0xfffffffffffffffe, 0x5, 0x1, 'dmask'}, {0x2, 0xd25, 0x1, 0xc8aa, '/'}]}, 0xf8) r2 = getpgid(0xffffffffffffffff) ptrace$peek(0x2, r2, &(0x7f0000001480)) inotify_add_watch(r1, &(0x7f00000014c0)='./file0\x00', 0x82000000) fcntl$getown(r0, 0x9) process_vm_writev(r2, &(0x7f0000001580)=[{&(0x7f0000001500)=""/78, 0x4e}], 0x1, &(0x7f0000001940)=[{&(0x7f00000015c0)=""/193, 0xc1}, {&(0x7f00000016c0)=""/186, 0xba}, {&(0x7f0000001780)=""/195, 0xc3}, {&(0x7f0000001880)=""/55, 0x37}, {&(0x7f00000018c0)=""/112, 0x70}], 0x5, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000019c0)={0x0, @in6={{0xa, 0x4e24, 0x3ff, @local, 0x2}}, 0x8, 0x3}, &(0x7f0000001a80)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000001ac0)={r3, @in6={{0xa, 0x4e23, 0x9, @empty, 0x1ff}}}, 0x84) lsetxattr$security_selinux(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)='security.selinux\x00', &(0x7f0000001c00)='system_u:object_r:modem_device_t:s0\x00', 0x24, 0x3) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000001c40)={0x8000000000000000, 0x6000, 0x0, 0x6, 0x1e}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000001c80)=0x6) ioctl$TCSBRKP(r1, 0x5425, 0x10000) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000001cc0)={'bcsh0\x00', 0x8}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000001d00)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000001d40)={r4}) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000001d80)=""/4096) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000002d80)={0x80, 0x7f, 0x2, 0x7, 0x0, 0xfffffffffffffff9}) socket$packet(0x11, 0x2, 0x300) setxattr$trusted_overlay_redirect(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)='trusted.overlay.redirect\x00', &(0x7f0000002e40)='./file0\x00', 0x8, 0x1) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000002e80)=""/98) open$dir(&(0x7f0000002f00)='./file0\x00', 0x26040, 0x28) [ 222.223369] IPVS: ftp: loaded support on port[0] = 21 16:27:08 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000040)=0x8, 0x4) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x88000, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x1, 0x0) renameat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00') ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000001c0)=0x1) fsetxattr$security_smack_entry(r1, &(0x7f0000000200)='security.SMACK64IPIN\x00', &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x15, 0x2) ustat(0x3, &(0x7f0000000280)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x11b000, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r3, &(0x7f0000000480)={0x78, 0x0, 0x6, {0xfffffffffffffffe, 0x4, 0x0, {0x6, 0x7, 0x7, 0xfffffffffffff801, 0x2, 0x20, 0x4, 0x3e, 0x4, 0x8, 0x9, r4, r6, 0x4, 0x7}}}, 0x78) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000500)={0x2, r3}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)={&(0x7f0000000540)='./file0/file0\x00', r1}, 0x10) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000005c0)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000006c0), &(0x7f0000000700)=0x4) r8 = mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000001, 0x8010, r2, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000740)={r8}) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000780)={0x8, 0x4, 0x3, 0x0, 0x0, [{r3, 0x0, 0x3c9a}, {r0, 0x0, 0x4}, {r1, 0x0, 0x8}]}) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000840)={0x3, &(0x7f0000000800)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f0000000880)={r9, 0x3}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000008c0)={0x81, 0x401, 0x3, 0xfffffffffffffffa, 0xb134}) mount$9p_fd(0x0, &(0x7f0000000900)='./file0\x00', &(0x7f0000000940)='9p\x00', 0x40000, &(0x7f0000000980)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@debug={'debug', 0x3d, 0x2}}], [{@euid_gt={'euid>', r7}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fowner_gt={'fowner>', r4}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x34, 0x3f, 0x37, 0x77, 0x64, 0x64, 0x30], 0x2d, [0x35, 0x0, 0x39, 0x77], 0x2d, [0x30, 0x38, 0x75, 0x35], 0x2d, [0x36, 0x62, 0x37, 0x31], 0x2d, [0x36, 0x30, 0x31, 0x65, 0x33, 0x63, 0x77, 0x73]}}}, {@euid_eq={'euid', 0x3d, r5}}, {@measure='measure'}, {@fowner_gt={'fowner>', r4}}, {@subj_type={'subj_type', 0x3d, '/dev/rfkill\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x32, 0x62, 0x37, 0x39, 0x77, 0x31, 0x73], 0x2d, [0x33, 0x39, 0x0, 0x34], 0x2d, [0x37, 0x73, 0x71, 0x79], 0x2d, [0x7f, 0x62, 0x7f, 0x63], 0x2d, [0x30, 0x77, 0x37, 0x0, 0x36, 0x77, 0x33]}}}, {@obj_type={'obj_type', 0x3d, 'security.SMACK64IPIN\x00'}}]}}) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/net/pfkey\x00', 0x181001, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r10, 0xc06864a2, &(0x7f0000000b80)={&(0x7f0000000b40)=[0x10001, 0x2, 0xfffffffffffffffb, 0x6, 0x400, 0x200, 0x0], 0x7, 0x8000, 0x1, 0xffffffffffffffb2, 0x7, 0x5, {0x10001, 0x5, 0xffffffff, 0x5, 0x7e79, 0x1, 0x5, 0x4f92, 0xf4e, 0x5, 0xfffffffffffffffb, 0xcf573d6, 0xff, 0x7, "ed7cd09185a51e57c71af1bb57162a103498969366e158cb25197456f29585a1"}}) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000c00)) memfd_create(&(0x7f0000000c40)='vboxnet0:selfppp0\x00', 0x4) [ 222.580355] IPVS: ftp: loaded support on port[0] = 21 16:27:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000040)=0x6) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000080)={0x1f, 0x3, 0x1, 0x6, 0x1, 0x7, 0x8}, 0xc) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000000c0)=""/57) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x1000) r1 = socket$packet(0x11, 0x0, 0x300) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0xff, 0x8, 0xfffffffffffffff7, 0x64, 0x10001}) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000140)) lsetxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@md5={0x1, "7ad99356f1e5a13b80743d33d5c9ac09"}, 0x11, 0x0) finit_module(r1, &(0x7f0000000240)='security.ima\x00', 0x1) ioctl$RTC_WIE_OFF(r0, 0x7010) open_by_handle_at(r0, &(0x7f0000000280)={0x24, 0x100, "1f9eeb17e510774356be7ae2ff1820371c277362f83ac51bf5065e1d"}, 0x80) r2 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$KDSETLED(r0, 0x4b32, 0x8000) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000002c0)={0x33, @broadcast, 0x4e23, 0x3, 'rr\x00', 0x2, 0x100000000, 0x13}, 0x2c) ioctl(r1, 0x2, &(0x7f0000000300)="c1f22829ce62a1346c62eed05d98acf9a223fb0bcf6a15bf2a0c2c6e537ec5ea495fcd7fa01553749d1e16cf6e99b2e52fb9de4c4b199223778a5e024d6408475ef75d93df1ccf45da490adaccc0a9e179432b15e55a0ff41fb5b4fb66991d8efe99") sendfile(r2, r1, &(0x7f0000000380)=0xc, 0x1) r3 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_buf(r3, 0x1, 0x1a, &(0x7f00000003c0)=""/108, &(0x7f0000000440)=0x6c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000580)=0xe8) connect$packet(r3, &(0x7f00000005c0)={0x11, 0x1d, r4, 0x1, 0x100000000, 0x6, @local}, 0x14) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000600)=[0x0, 0x3f]) r5 = fcntl$getown(r1, 0x9) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000640)={[], 0x5, 0x8, 0xffffffff, 0x8, 0xc2c8, r5}) accept(r2, &(0x7f00000006c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000740)=0x80) accept4$alg(r6, 0x0, 0x0, 0x0) sched_getaffinity(r5, 0x8, &(0x7f0000000780)) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f00000007c0)={0x288, 0xfffffffffffffffa, 0x4, 0x4, [], [], [], 0x6, 0xaa, 0x800, 0x6, "bb4e9ed33b6223b285949391edca390c"}) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000000900)=""/119, &(0x7f0000000980)=0x77) fcntl$getflags(r0, 0x40a) [ 223.067562] IPVS: ftp: loaded support on port[0] = 21 16:27:09 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80) r1 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f00000000c0)) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000140)) write$binfmt_misc(r1, &(0x7f0000000180)={'syz1', "87ce4ccbb6c0acf6e34a7dc4316ed3ca268eebad3217699f3b32eb6987780d0688c04fb28aa58b8fb58e84d82f5e64bfdf33e4c50b8e8aca3095fb3f9dd14e98d2b2c9ae489b8939b97f139b2910ac"}, 0x53) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="75f3b9823f130540ebb3b49338be96f976dff54dd819e6e1319ad9e002c6ab92039ad85fd334584a19a88eef8a1cb4c90ada3fe556eab0e44324756f404281b8cfe0a54e0dfe10fce0cde6eda4aafcd4ab4e972241e9c919552863a63ec8c4572ee0704c470e9d20a6916f5c46fc320b2cfdb9e966eacd76ff95e5171ca98d574ed094974b5f06ae0a8dfcd9388f13c81ff3639c85ee75582b6431cb965fde869d7e3a7e0272fdc02ba3d6c83d8be4c5f78ebf665ee5194c9fd47ed32e9333d24d1718", 0xc3, 0xfffffffffffffffa) keyctl$describe(0x6, r2, &(0x7f0000000380)=""/4096, 0x1000) fchmodat(r0, &(0x7f0000001380)='./file0\x00', 0x0) syz_mount_image$jfs(&(0x7f00000013c0)='jfs\x00', &(0x7f0000001400)='./file0\x00', 0x3, 0x1, &(0x7f0000001480)=[{&(0x7f0000001440)="3d52d5d69c8a872d7ab88c05602d8f8f72fe691ffe6beef08072efd90dd52262155a818f", 0x24, 0x1}], 0x40, &(0x7f00000014c0)={[{@iocharset={'iocharset', 0x3d, 'iso8859-13'}}, {@nodiscard='nodiscard'}, {@errors_continue='errors=continue'}], [{@subj_role={'subj_role', 0x3d, 'syz'}}, {@hash='hash'}]}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000001540)=0xff) syz_genetlink_get_family_id$nbd(&(0x7f0000001580)='nbd\x00') r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000017c0)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x110000}, 0xc, &(0x7f0000001780)={&(0x7f0000001640)={0x124, r3, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3ff}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7f}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8001}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x27ca}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x10}}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3f}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8000}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffffffffff32}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x80}, 0x44800) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000001800)=""/147, &(0x7f00000018c0)=0x93) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000001900)={0x2ef8, 0x10000, 0x4, 0x2, 0x6e, 0x8, 0x3, 0x100, 0x6, 0x9e7b}) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000001940), 0xffffffffffff6e1a, 0x3) r4 = request_key(&(0x7f0000001980)='trusted\x00', &(0x7f00000019c0)={'syz', 0x1}, &(0x7f0000001a00)='\'vboxnet1wlan0-cpusetGPL\x00', 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000001a40)='cifs.spnego\x00', &(0x7f0000001a80)='em0cpuset(mime_type-/cgroup(em0&wlan0\x00') mkdirat$cgroup(r0, &(0x7f0000001ac0)='syz0\x00', 0x1ff) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000001b00)={{0x21, @local, 0x4e24, 0x3, 'dh\x00', 0x1, 0x1ff, 0x6f}, {@remote, 0x4e22, 0x7, 0x140000000000, 0x8, 0x8000}}, 0x44) fstat(r0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)='bpf\x00', 0x0, &(0x7f0000001c80)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x10000}}, {@mode={'mode', 0x3d, 0x3}}], [{@hash='hash'}, {@smackfsfloor={'smackfsfloor'}}, {@obj_role={'obj_role', 0x3d, 'syz0\x00'}}, {@uid_eq={'uid', 0x3d, r5}}]}) r6 = getpgid(0x0) r7 = getpid() kcmp(r6, r7, 0x5, r1, r1) ioctl(r0, 0x90, &(0x7f0000001d40)="195c4c9e97edf948c24c5b559933468ad28b0f764124ea022eb1a61eb430d67f16104bb95526a878df116a3ebf048f6d394aad1702c5054d364e69b7062a575d547a0d1f2b3a90e0c031e8148bd2053a2e20cb3ce11f446a16492885aaa2df244e3c9347426faad9cbe483309fe4937ad4ec2f0033e7efbe6dd8b7867a722a8312c986a6e21f31421216e89fa96112bcebf8c2efb9a2cd9f31896a930aa802d73e693658f3fef2afe0fdef99178791e7b1b5f703ee2cee919120d5798b9095ddc0ab605453c9d3b278f2951e570a6a224fb2ff06d52b950f34b815a7bcf4") r8 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000006, r8) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000001e40)={0x7f, @multicast1, 0x4e23, 0x1, 'wlc\x00', 0x1, 0x20, 0x68}, 0x2c) getsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000001e80), &(0x7f0000001ec0)=0x4) [ 223.612846] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.639309] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.647059] device bridge_slave_0 entered promiscuous mode [ 223.703739] IPVS: ftp: loaded support on port[0] = 21 [ 223.835367] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.846031] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.860685] device bridge_slave_1 entered promiscuous mode 16:27:09 executing program 5: r0 = memfd_create(&(0x7f0000000000)='vmnet1bdevvboxnet0:\x00', 0x1) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x3, 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'yam0\x00', {0x2, 0x4e21, @loopback}}) r1 = accept4$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x800) recvfrom(r0, &(0x7f00000000c0)=""/179, 0xb3, 0x10061, &(0x7f0000000200)=@ll={0x11, 0x19, r2, 0x1, 0x80000000}, 0x80) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000280)={r2, 0x1, 0x6, @remote}, 0x10) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f00000002c0)) r3 = semget(0x0, 0x7, 0x200) semctl$GETZCNT(r3, 0x0, 0xf, &(0x7f0000000300)=""/245) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000400)=0x1) faccessat(r0, &(0x7f0000000440)='./file0\x00', 0x81, 0x200) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x18}, 0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000500)={0x0, 0x78}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000580)={r5, @in6={{0xa, 0x4e20, 0xa876, @local, 0x8}}, 0x47a, 0x10001, 0x1, 0x400, 0x10001}, &(0x7f0000000640)=0x98) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000680)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000006c0)={r5, 0xffff, 0x30}, &(0x7f0000000700)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000740)={r5, 0x6}, 0x8) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e20, 0x2, @mcast2, 0x32}, 0x1c) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x10001, 0x16, 0x9, 0x4, "51ad92026d398c8d02b1823fdc5d83dac1c7d0381beb074acb56b2e89425bf7454f9a5f570e28b8bb7e5f3f562b73cb22428a04ba6c6dc48f6d4c9cb472f17c8", "5104a658bc6f09cff071d45abb7da48fa046a8c8559ffa3270b1a657391e75a5", [0x8]}) io_setup(0x1, &(0x7f0000000880)=0x0) io_submit(r8, 0x5, &(0x7f0000000d40)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x7522, r0, &(0x7f00000008c0)="0a8dffb0f01191be2f57c8b2107c1c20e1bcb8e47a1daf94c5475358ad15dfb3af1c05c356f786266fe60ad05d08cc89351e49e0b1387eb76cccaeb1faa98bb9572fd782b074754a1b482c7ea67a6a797cf5469a9c6319a1d9", 0x59, 0x1}, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x8, 0x5, r1, &(0x7f0000000980)="b5c7937828006ffb4da400151c136bbda60727cb569f8ba4921533e62e6187d7c66f643ad298edfe7b8ee48e86ec75c1a1e7a762626738ec719b2a29a6dd0e2c9f273c6996e6c4cd9dc88ae58f547eeadad7e53b50fde8032e8318bc79fbe1e688aa6aea4dee5b612dd57998adb699130ccb21089b3a2e00b25b3f9f7e3be9aeb4e4acff66dadfc3d2faf91ff994422d4f8becaec4afb7d0d3b576a4bd0cf3fdaf8fb32b22c86a189ada54a7134b0266b0d434b153aafcca05b40877b3b674f5cee61fee680b241c8c5ff587c720cdcbfee82c2b55e5c6ecf3", 0xd9, 0x80000001, 0x0, 0x2, r0}, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x5, 0x200, r4, &(0x7f0000000ac0)="46fe98b31d8a05dd4452bf6b3e1811835562ec56b54051150b32fdf8cd4987ddc83ce6a6024c80cba37d2c602687e23e20dfce6a3ab9f971223e74ccfb3180beb9cbf0ee22104eaed04c785016e8f9c7958d2e93ba4379c73ad75518e840d7bdc6385bbffd18ce211f1a8a6287d0aeca7bae69de3e479350d21061045092aa8e75c408d42cc4da7aa6793887955305b5f5e4fc75ca0f1c31c77852b58e0363339f23e5a82b683e58167b7dcc43b73e63ae56e6ec4a986ddc2b3e5ba804ce8269f5d85e9476aa0548eb8cbcb95b707a47e352", 0xd2, 0x8, 0x0, 0x2, r0}, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0xb, 0x8, r1, &(0x7f0000000c00)="411472ade9ac125a104f695968e70ea8e7f74e070ba78312e9969df61eda8c7110ada15b8bf473375a64079a6a0d220c00c705db88b125785e5f78b05bf01e94ad4a4af897daa27d29d8bc43e70b14ab0d3e4aa7430696b2b3dd18aec7", 0x5d, 0x7fff, 0x0, 0x1, r0}, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x3, 0xffff, r1, &(0x7f0000000cc0)="5200b8c40fa87439e0e83c762b450fdfb69ee7f1c6544c761d276a3c64b04c15d1a3de64a37fa5dc314d925b8fdcb9f9525ee10a0ded3e", 0x37, 0x4c, 0x0, 0x2, 0xffffffffffffff9c}]) recvmmsg(r1, &(0x7f0000005200)=[{{&(0x7f0000000d80)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000e00)=""/224, 0xe0}, {&(0x7f0000000f00)=""/165, 0xa5}, {&(0x7f0000000fc0)=""/164, 0xa4}, {&(0x7f0000001080)=""/58, 0x3a}, {&(0x7f00000010c0)=""/30, 0x1e}, {&(0x7f0000001100)=""/144, 0x90}, {&(0x7f00000011c0)=""/98, 0x62}], 0x7, &(0x7f00000012c0)=""/96, 0x60, 0x8000}, 0x400}, {{&(0x7f0000001340)=@rc, 0x80, &(0x7f0000001780)=[{&(0x7f00000013c0)=""/111, 0x6f}, {&(0x7f0000001440)=""/172, 0xac}, {&(0x7f0000001500)=""/77, 0x4d}, {&(0x7f0000001580)=""/53, 0x35}, {&(0x7f00000015c0)=""/27, 0x1b}, {&(0x7f0000001600)=""/193, 0xc1}, {&(0x7f0000001700)=""/121, 0x79}], 0x7, &(0x7f0000001800)=""/27, 0x1b, 0xfffffffffffffff7}, 0x3}, {{&(0x7f0000001840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000019c0)=[{&(0x7f00000018c0)=""/254, 0xfe}], 0x1, &(0x7f0000001a00)=""/4096, 0x1000, 0x5}, 0x848}, {{0x0, 0x0, &(0x7f0000003b80)=[{&(0x7f0000002a00)=""/138, 0x8a}, {&(0x7f0000002ac0)=""/80, 0x50}, {&(0x7f0000002b40)=""/62, 0x3e}, {&(0x7f0000002b80)=""/4096, 0x1000}], 0x4, &(0x7f0000003bc0)=""/246, 0xf6, 0x81}, 0x3}, {{&(0x7f0000003cc0)=@can, 0x80, &(0x7f0000005080)=[{&(0x7f0000003d40)=""/105, 0x69}, {&(0x7f0000003dc0)=""/4096, 0x1000}, {&(0x7f0000004dc0)=""/248, 0xf8}, {&(0x7f0000004ec0)=""/203, 0xcb}, {&(0x7f0000004fc0)=""/143, 0x8f}], 0x5, &(0x7f0000005100)=""/203, 0xcb, 0x5}, 0x8}], 0x5, 0x10000, &(0x7f0000005340)={0x0, 0x989680}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000005380)={r7, 0x7}, &(0x7f00000053c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000005400)={r7, 0xffffffffffffffff, 0x6, [0x3, 0x8, 0x2, 0x4, 0x9, 0x4]}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000005440)={0x1, [0x0]}, &(0x7f0000005480)=0x8) sendmmsg$inet_sctp(r9, &(0x7f0000005ac0)=[{&(0x7f00000054c0)=@in6={0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x17}, 0x3}, 0x1c, &(0x7f0000005780)=[{&(0x7f0000005500)="ae97733f525a711d96eeae35780314ae97acf311393777111e8fb7186ee343189157182cc33a57b9212b3c635c34523ec68ba265ba67c0e0ded28d3d4a0aad16615b5b13eaae5319696af6ee93ca2f484f6dbfab94698c00823b8f415dd6bff9f699f087a99a0674e6004cd4ff96a893a658c2a0f61005566a236e550c1eabe58cdda4e50650d5f2e6df3411903e6b058524928d9eaad6fb8cc8bdd0268497ee", 0xa0}, {&(0x7f00000055c0)="7ddbb2f5978930cb256126c62e95b4a6e21f8b0aac0bde880cf93d37625832159bc2527dc295991f5f8ea17a17a3e50ad56dde871e56cf70ea28fa5db46dabc17ed5824afa9aeef056a2747aa727716ff53524d5bb17640d9fd74561bb62acd43946092295cb253a733500b32246c204e11a819268e5bc8d7543914349893ca58ec3de0e8071bc71464d85c33ee73703d0d1ee6592ae66496b8fed873ba0e17bee", 0xa1}, {&(0x7f0000005680)="0ab1d6aebe44428edc4b48963a073b018b883b34a21c561743ce847ab7c6fe834e3531b59926e1f16c0bd9729e22a960c13602782ea4b52107bda501c010993829022d62a3989c519b3661eca4bfbcdb73eb3663dd4f1bc3e267efa5896cb581ff30bed62936b7932337f6eaed7c45f172d07499c4d7d6f1928025fd168dea01bae30585a01d74bcf3f93d7260952c86377e48cae51939358115833a6bb4d291ad5efe1d383f304581aadd4829cc2805e4140c72fe6e0a80c323b285f08ec3468f8175ce22d2e20a69913703ebca957468b7acf0eeea9a441070bbf89068801353305baca7eabb88c3c5f832713ad68737", 0xf1}], 0x3, &(0x7f00000057c0)=[@dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x9}, @sndrcv={0x30, 0x84, 0x1, {0x11, 0x130, 0x200, 0x8, 0x0, 0xff, 0x2fc9, 0x80000000, r6}}, @dstaddrv4={0x18, 0x84, 0x7, @local}], 0x60, 0x84}, {&(0x7f0000005840)=@in={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f00000059c0)=[{&(0x7f0000005880)="93600abc28d07917fb8f6badae45b3b2f69275d65313d545dde125f7a87f64124f279a39f3f8b6033bbf0034fff6b189bd287d948783bad7721d49995a806a98ea43c5f32693406cdd515a91bfc85a49d09e2378b16a1e6c16b2595a24853fbaa5a810d9168bcd1e761ccf44bcd71f9bb84b5a23dcc2c08f14df31d42434381678ca94a47b9970516d0a81c85f0a44639ca7d3c53e48580a02d70c7f8f65b2e7f57b90666fef9e6a22a146d5a1486ff66e867608f484d122250cd18c3d133397426c868c7ad868b78a2e4838a3e07355500859733dd30e5230925a362bc752290078a0a26a28e1", 0xe7}, {&(0x7f0000005980)="acb33de97a8eeb", 0x7}], 0x2, &(0x7f0000005a00)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0x80000001}}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x5, 0x8, 0x7e, 0x1, 0x40000, 0x1, 0x6, r6}}, @sndrcv={0x30, 0x84, 0x1, {0x2, 0x6, 0x200, 0x2, 0x6, 0x0, 0x8, 0x0, r10}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}], 0xa8, 0x4}], 0x2, 0x44040) r11 = add_key$user(&(0x7f0000005b40)='user\x00', &(0x7f0000005b80)={'syz', 0x0}, &(0x7f0000005bc0)="92a239d768ce349004aea408ab16c6b93b76e0218e7d535357f3aa9f3c1cfd3ea10e0868f2c57fd652ccbd25b8c4e6c76b2fe64438009dfd6940d98605e7c91ad4b7b04331f968e52e980b4096bed75649c75d154fc0", 0x56, 0xfffffffffffffff9) keyctl$get_security(0x11, r11, &(0x7f0000005c40)=""/177, 0xb1) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000005d00)={0x1, 0x1, 0x4, 0x0, 0x2, 0x8, 0x200}) [ 224.007191] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.088337] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.109282] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.116707] device bridge_slave_0 entered promiscuous mode [ 224.146230] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.237286] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.241862] IPVS: ftp: loaded support on port[0] = 21 [ 224.269311] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.276712] device bridge_slave_1 entered promiscuous mode [ 224.379637] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.462078] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 224.622024] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.734959] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.755263] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.784023] device bridge_slave_0 entered promiscuous mode [ 224.794282] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.874855] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.917134] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.934738] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.950944] device bridge_slave_1 entered promiscuous mode [ 225.007240] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.086366] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 225.145508] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 225.170642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.225341] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 225.309973] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 225.316842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.338188] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.349218] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.360267] device bridge_slave_0 entered promiscuous mode [ 225.449934] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.456500] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.480681] device bridge_slave_1 entered promiscuous mode [ 225.607747] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.618203] team0: Port device team_slave_0 added [ 225.632824] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 225.640682] team0: Port device team_slave_0 added [ 225.658042] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 225.765389] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.777882] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.808068] team0: Port device team_slave_1 added [ 225.813950] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 225.823883] team0: Port device team_slave_1 added [ 225.830868] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 225.907221] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.990515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.015880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.099017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.145275] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.184494] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.192926] device bridge_slave_0 entered promiscuous mode [ 226.210750] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.226146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.243755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 226.272620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.287549] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.299511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.309788] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.329943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.338045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.355945] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.365645] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.375138] device bridge_slave_1 entered promiscuous mode [ 226.386410] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.397834] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 226.429394] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.436762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.447897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.468687] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.490711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.515785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 226.540359] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 226.548040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.570244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.597781] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 226.630170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.649688] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.716366] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 226.731581] team0: Port device team_slave_0 added [ 226.752716] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 226.770704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.800694] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.807084] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.830557] device bridge_slave_0 entered promiscuous mode [ 226.872973] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 226.889982] team0: Port device team_slave_1 added [ 226.978821] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.999958] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.007382] device bridge_slave_1 entered promiscuous mode [ 227.018955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.047141] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.143218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.167496] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 227.178619] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.192539] team0: Port device team_slave_0 added [ 227.235758] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.250937] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.261162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.282764] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.339561] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 227.347014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.363916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.390776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 227.406836] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 227.429273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.469413] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.489778] team0: Port device team_slave_1 added [ 227.545545] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 227.560569] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.640586] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 227.647486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.669377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.770550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 227.777449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.789970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.816096] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.935746] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 227.950586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.960915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.993049] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.002621] team0: Port device team_slave_0 added [ 228.023740] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.066811] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.099911] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.115534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.131816] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.138299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.145348] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.151771] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.172447] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.182646] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.189017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.195765] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.202188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.210028] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 228.220236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.235985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.266978] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.301072] team0: Port device team_slave_1 added [ 228.363839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 228.389403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.477131] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.499281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.509896] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.625631] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.639634] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.651427] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.757847] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.772576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.784351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.831325] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.840563] team0: Port device team_slave_0 added [ 228.852397] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.880243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.899775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.963102] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.971933] team0: Port device team_slave_1 added [ 228.980209] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.986603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.993360] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.999770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.007621] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.094495] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.194463] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.258256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.300619] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.313250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.340632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.419986] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 229.427131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.437672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.601705] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.608104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.614822] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.621244] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.640394] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.286452] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.491728] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.498145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.504880] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.511300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.527899] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.792257] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.798687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.805432] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.811838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.820085] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 231.319772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 231.335423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.501159] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.567194] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.992137] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 234.087644] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 234.409474] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.445776] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.469604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.486277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.578610] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 234.594434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.602517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.901191] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 234.922215] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.042274] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.124227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.449543] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 235.455735] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.469864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.600115] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 235.822549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.886261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.000637] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.038703] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.060426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.075363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.328385] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.355344] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.542595] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.772880] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.779797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.800469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.832341] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.849765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.856859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.181196] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.349596] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.926084] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 238.012897] audit: type=1400 audit(1539707243.777:38): avc: denied { create } for pid=6943 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 238.081491] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 238.097334] audit: type=1400 audit(1539707243.777:39): avc: denied { associate } for pid=6943 comm="syz-executor0" name="audio" dev="devtmpfs" ino=16513 scontext=system_u:object_r:devicekit_power_exec_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 [ 238.119884] Unknown ioctl 1075332576 [ 238.131017] Unknown ioctl 21541 [ 238.157510] Unknown ioctl 1077980830 [ 238.162289] Unknown ioctl 1074292226 [ 238.172670] Unknown ioctl -1072929747 [ 238.192822] Unknown ioctl 1074291721 [ 238.194384] audit: type=1400 audit(1539707243.777:40): avc: denied { accept } for pid=6943 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 238.224666] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 238.260183] audit: type=1400 audit(1539707243.917:41): avc: denied { relabelto } for pid=6961 comm="syz-executor1" name="file0" dev="sda1" ino=16526 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:modem_device_t:s0 tclass=dir permissive=1 [ 238.309655] Unknown ioctl 1075332576 [ 238.313719] Unknown ioctl 21541 [ 238.318758] Unknown ioctl 1077980830 [ 238.329210] Unknown ioctl 1074292226 [ 238.329216] Unknown ioctl -1072929747 [ 238.336976] Unknown ioctl 1074291721 16:27:24 executing program 1: 16:27:24 executing program 1: [ 238.503755] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 16:27:24 executing program 1: 16:27:24 executing program 1: 16:27:24 executing program 1: 16:27:24 executing program 1: 16:27:24 executing program 0: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in6, @in=@remote, 0x4e20, 0x0, 0x4e21, 0x0, 0x2, 0x20, 0xa0, 0xbf, r1, r2}, {0x5f, 0x1, 0x9, 0x10000, 0x800000000000000, 0x4, 0x3f, 0xfffffffffffffffb}, {0xfffffffffffffffd, 0x1, 0x100000001, 0x5}, 0x101, 0x6e6bbc, 0x1, 0x0, 0x2, 0x3}, {{@in6=@mcast1, 0x4d2, 0x3c}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x10}, 0x0, 0x1, 0x1, 0x7, 0x10001, 0x1, 0x7f}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000440)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x7, 0x4, &(0x7f00000016c0)=[{&(0x7f00000004c0)="b8a1d68b5c03378a3885fbdad5822bcc36977f3d0ebe8260c0f1325ccf7a9b8ce9cf1faf36cc48bfddc1c81e6a7324d688033eb87aecf1f159104f40b1899cfa93d9e0ab7dbb0ebe6dc4e202248be4bcb5cefab559b8dbd5a54743453c9894637531a1dd82c0a3dd6f75b9a82b5396abaa3e09c7f89e315ab4612172d88a8bc8045c141c5aac1739dd521fc448456bc7116c1accd6d79171b21b10988d65ed00671c6e4024424a", 0xa7, 0xffff}, {&(0x7f0000000580)="a406565699a6764d474939396c6b9cbf45be28f388d4dd43616694d86e6a626724d0639fa8e02199c198584a2b01fdf31002598c32663f474548b4c30645fafdd5ba5bf4805cee4300e8f07afdc5c1357bdd7655edf160c700826570feb43d302002e3491db38775bd7400ddfed2f8f66f3ee9441d96b052b21f03c1597fb25be7dfaa9f356faf3f97b1e26b820f4d2fa790f95ebb0240abef0adf8f5afa81c585f8089769884305425eed7dc439af0608110217dee27e7601ebd315b3f5f25fb8de609078bf309decd586127a54ff67fbf98a8596f5841e08", 0xd9}, {&(0x7f0000000680)="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", 0x1000, 0x8001}, {&(0x7f0000001680)="46efd97ee753d5fe9da94dbd4f1f3c50685799f3a169a4b1cb5eef0653b0092c0f3401b1a3cf416c393830e0146777b7d349a7174cb6", 0x36, 0xffff}], 0x2000000, &(0x7f0000001740)={[{@norecovery='norecovery'}, {@noacl='noacl'}, {@lazytime='lazytime'}, {@nodiscard='nodiscard'}, {@sb={'sb', 0x3d, 0x9}}, {@nolazytime='nolazytime'}, {@debug='debug'}, {@abort='abort'}, {@dioread_lock='dioread_lock'}], [{@uid_gt={'uid>', r2}}, {@fowner_lt={'fowner<', r2}}]}) syncfs(r0) write$selinux_access(r0, &(0x7f0000001800)={'system_u:object_r:iptables_initrc_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x81}, 0x50) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001900)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000018c0)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000001940)='/dev/audio\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000001980)={0x12, 0x10, 0xfa00, {&(0x7f0000001880), r4, r5}}, 0x18) read$FUSE(r5, &(0x7f00000019c0), 0x1000) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000029c0), &(0x7f0000002a00)=0x6) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000002a40)={0x0, 0x3f, 0x30}, &(0x7f0000002a80)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000002ac0)={r6, 0x4}, &(0x7f0000002b00)=0x8) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000002b80)={0x1, 0x10, 0xfa00, {&(0x7f0000002b40), r4}}, 0x18) r7 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000002bc0)={'nr0\x00', 0x7fffffff}) fsetxattr$security_selinux(r5, &(0x7f0000002c00)='security.selinux\x00', &(0x7f0000002c40)='system_u:object_r:devicekit_power_exec_t:s0\x00', 0x2c, 0x3) setresgid(r3, r3, r3) r8 = accept(r7, 0x0, &(0x7f0000002c80)) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r8, 0x84, 0x4, &(0x7f0000002cc0)=0x2, 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000002d00)=0x4) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000002d40)='/dev/vga_arbiter\x00', 0x10000, 0x0) getsockopt$inet6_tcp_buf(r9, 0x6, 0x1f, &(0x7f0000002d80)=""/36, &(0x7f0000002dc0)=0x24) setresgid(r3, r3, r3) write$RDMA_USER_CM_CMD_NOTIFY(r5, &(0x7f0000002e00)={0xf, 0x8, 0xfa00, {r4, 0xa}}, 0x10) execveat(r5, &(0x7f0000002e40)='./file0\x00', &(0x7f0000003100)=[&(0x7f0000002e80)='sb', &(0x7f0000002ec0)='norecovery', &(0x7f0000002f00)='\x00', &(0x7f0000002f40)='\x00', &(0x7f0000002f80)='system_u:object_r:devicekit_power_exec_t:s0\x00', &(0x7f0000002fc0)='posix_acl_access]S:eth0\x00', &(0x7f0000003000)='/usr/sbin/ntpd', &(0x7f0000003040)='system_u:object_r:devicekit_power_exec_t:s0\x00', &(0x7f0000003080)='uid>', &(0x7f00000030c0)='system_u:object_r:devicekit_power_exec_t:s0\x00'], &(0x7f00000032c0)=[&(0x7f0000003180)="73656375726974793ab52473656c667472757374656400", &(0x7f00000031c0)='.wlan1\x00', &(0x7f0000003200)='debug', &(0x7f0000003240)='system_u:object_r:devicekit_power_exec_t:s0\x00', &(0x7f0000003280)='{mime_type\x00'], 0x1800) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000003340)=&(0x7f0000003300)) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000003380)=0x15000) ioctl$TIOCNXCL(r0, 0x540d) 16:27:24 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1001) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000440)={{0xcc, 0x5b, 0x8001, 0x8, 0xaf, 0x400, 0x3c3, 0x2}, "01360ca5f9eda863868d5e28663b0955043f9589b880d6a3af3488b74e8177336ead2b94184d3360412de00c8884056bd27dffb87436525c8679f6cb3597be229f46da1274b49eb456fa5f4598d6e9b31db4f1f48e3573f610a1f8031580da2db1769fddb73b34ec85171a92925260a127e100619d518f9f9261b3d7db38dc45afc6fbc86d9881d7d625c309f1014a5175225fa2173dbebf3394ea05627ba7471daf73ec68e99eea953438ca1bd59fc0b3bd4af905e432ca69adfa02e39f4bbfd1ec3ba28f1566fbb11f0735d9c0bd3f", [[], [], [], [], [], [], []]}, 0x7f0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x3ffffffffffffffe, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x2, {0x2, 0x4e20, @empty=0xfd00}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e23, @broadcast}, 0x180, 0x8, 0x5, 0x1000, 0x0, 0x0, 0x800, 0xfeffffff, 0x10}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000280)={'broute\x00', 0x0, 0x4, 0x1c, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000180)=""/28}, &(0x7f0000000300)=0x78) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000200)=@generic={0xb, "d3a9cf8c551de6c967e71a4d894f51540f870aad36c64b860172a567bf8029d561ca6f3400289229f68f8a13dde8093dab3d220250a733875005c1be32eccea721f756ff26bbf36a85668bd34a9f1290f5bb036b64851abc64d407bde6782045218575970cf100ada4010f366a1b175ef9d6d9f6d587bab6d063af16fd92"}, 0x80, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x20000000}, 0x4) [ 238.925046] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 239.020264] hrtimer: interrupt took 33770 ns 16:27:25 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1001) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000440)={{0xcc, 0x5b, 0x8001, 0x8, 0xaf, 0x400, 0x3c3, 0x2}, "01360ca5f9eda863868d5e28663b0955043f9589b880d6a3af3488b74e8177336ead2b94184d3360412de00c8884056bd27dffb87436525c8679f6cb3597be229f46da1274b49eb456fa5f4598d6e9b31db4f1f48e3573f610a1f8031580da2db1769fddb73b34ec85171a92925260a127e100619d518f9f9261b3d7db38dc45afc6fbc86d9881d7d625c309f1014a5175225fa2173dbebf3394ea05627ba7471daf73ec68e99eea953438ca1bd59fc0b3bd4af905e432ca69adfa02e39f4bbfd1ec3ba28f1566fbb11f0735d9c0bd3f", [[], [], [], [], [], [], []]}, 0x7f0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x3ffffffffffffffe, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x2, {0x2, 0x4e20, @empty=0xfd00}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e23, @broadcast}, 0x180, 0x8, 0x5, 0x1000, 0x0, 0x0, 0x800, 0xfeffffff, 0x10}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000280)={'broute\x00', 0x0, 0x4, 0x1c, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000180)=""/28}, &(0x7f0000000300)=0x78) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000200)=@generic={0xb, "d3a9cf8c551de6c967e71a4d894f51540f870aad36c64b860172a567bf8029d561ca6f3400289229f68f8a13dde8093dab3d220250a733875005c1be32eccea721f756ff26bbf36a85668bd34a9f1290f5bb036b64851abc64d407bde6782045218575970cf100ada4010f366a1b175ef9d6d9f6d587bab6d063af16fd92"}, 0x80, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x20000000}, 0x4) 16:27:25 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000082ef0a)=""/246) ioctl$EVIOCGREP(r0, 0x80047456, &(0x7f0000000300)=""/174) [ 240.134903] jfs: Unrecognized mount option "subj_role=syz" or missing value [ 240.178375] audit: type=1400 audit(1539707245.937:42): avc: denied { create } for pid=7136 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 240.203884] audit: type=1400 audit(1539707245.937:43): avc: denied { write } for pid=7136 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:27:26 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) io_setup(0x9, &(0x7f0000000400)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000002c0)={0x9, 0x8, 0x9}) r1 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000006, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000340)={0x6, {{0xa, 0x4e23, 0x8000, @ipv4={[], [], @rand_addr=0x80000001}, 0x8d74}}}, 0x88) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x100000001, @remote, 0x3f}]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000180)={r3, @in={{0x2, 0x4e21, @loopback}}}, 0x84) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x5452, &(0x7f0000000080)={0xfffffdfd}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000006c0)={r0, &(0x7f00000005c0)="896db0064410c943e427b6a6670ea00ac66c9740ab7b5ed93a5af7c1f4d5770840a31b7e4c9ca8db39d5c3b1f1e34f6661dba0c815dd02d1037060f485a3", &(0x7f0000000600)="623a5186100633ceecb39e705a31b3b896c839cd0c71b7afdfbec1b3a15aaf408d364d8978a3bdec2f2e74f2b3ba55fc9a547ae99e2e9bb69aab926085b9506021ec711eb02418475e9bf8276d2a19906c6b900886638ffd859f429517c788f646c3e691d1c2065781db28179ba9f368bbcb74368426c9e61476a095c05ba802c149664db56bf25ccc88ec964ea916062a8221cf005eb49d9df59ec559ffbea587", 0x1}, 0x20) 16:27:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0x6) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000000c0)={0x0, @speck128}) socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0), 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xfe, 0x10100) 16:27:26 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1001) r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000440)={{0xcc, 0x5b, 0x8001, 0x8, 0xaf, 0x400, 0x3c3, 0x2}, "01360ca5f9eda863868d5e28663b0955043f9589b880d6a3af3488b74e8177336ead2b94184d3360412de00c8884056bd27dffb87436525c8679f6cb3597be229f46da1274b49eb456fa5f4598d6e9b31db4f1f48e3573f610a1f8031580da2db1769fddb73b34ec85171a92925260a127e100619d518f9f9261b3d7db38dc45afc6fbc86d9881d7d625c309f1014a5175225fa2173dbebf3394ea05627ba7471daf73ec68e99eea953438ca1bd59fc0b3bd4af905e432ca69adfa02e39f4bbfd1ec3ba28f1566fbb11f0735d9c0bd3f", [[], [], [], [], [], [], []]}, 0x7f0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x3ffffffffffffffe, @broadcast}, 0x10) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x2, {0x2, 0x4e20, @empty=0xfd00}, {0x2, 0x4e21, @loopback}, {0x2, 0x4e23, @broadcast}, 0x180, 0x8, 0x5, 0x1000, 0x0, 0x0, 0x800, 0xfeffffff, 0x10}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000280)={'broute\x00', 0x0, 0x4, 0x1c, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000180)=""/28}, &(0x7f0000000300)=0x78) sendmmsg(r1, &(0x7f0000007fc0), 0x40000000000002f, 0x0) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000200)=@generic={0xb, "d3a9cf8c551de6c967e71a4d894f51540f870aad36c64b860172a567bf8029d561ca6f3400289229f68f8a13dde8093dab3d220250a733875005c1be32eccea721f756ff26bbf36a85668bd34a9f1290f5bb036b64851abc64d407bde6782045218575970cf100ada4010f366a1b175ef9d6d9f6d587bab6d063af16fd92"}, 0x80, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x20000000}, 0x4) 16:27:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x4, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x3, &(0x7f0000000340)={0x0, 0x0}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000001c0)=0x952) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000380)=[{{0x77359400}, 0x16, 0x4, 0xdee0}, {{0x77359400}, 0x17, 0x3, 0x8}, {{}, 0x1f, 0x0, 0x5}, {{}, 0x17, 0x7, 0x9}, {{}, 0x15, 0x7c, 0x8}, {{r5, r6/1000+10000}, 0x17, 0x6, 0x765}, {{}, 0x16, 0xe5e, 0x1ff}, {{r7, r8/1000+30000}, 0x17, 0x96, 0xff}, {{0x77359400}, 0x5, 0x200, 0x5}, {{}, 0x3, 0xacd7013, 0x582}], 0xf0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00006dbffc), 0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:27:26 executing program 3: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/xfrm_stat\x00') r2 = openat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0xae, 0x4000, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xddd0, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) fsetxattr(r2, &(0x7f00000000c0)=@random={'system.', 'vmnet1\\-+\x00'}, &(0x7f0000000180)='tunl0\x00', 0x6, 0x0) 16:27:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) [ 240.234195] jfs: Unrecognized mount option "subj_role=syz" or missing value [ 240.241103] audit: type=1400 audit(1539707245.937:44): avc: denied { read } for pid=7136 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:27:26 executing program 0: syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00005a1000), &(0x7f0000000080), &(0x7f00007adff0)={0x77359400}, 0x8) r0 = open(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe, 0xfffffffffffffffe) fcntl$setsig(r0, 0xa, 0x7) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0xfffffffffffff642, @empty, 0xfff}, @in6={0xa, 0x4e24, 0x4, @mcast2, 0x48bb}, @in6={0xa, 0x4e22, 0x401, @ipv4={[], [], @broadcast}}, @in, @in6={0xa, 0x4e20, 0x4, @ipv4={[], [], @multicast1}}], 0x80) fcntl$setlease(r0, 0x400, 0x0) rt_sigtimedwait(&(0x7f00005a1000), &(0x7f0000d31ff0), &(0x7f00007adff0)={0x77359400}, 0x8) creat(&(0x7f0000002780)='./file0\x00', 0x0) [ 240.346048] QAT: Invalid ioctl [ 240.352878] QAT: Invalid ioctl 16:27:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 16:27:26 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000140)={0x3ee, 0x11}) 16:27:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, &(0x7f0000000300)="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", 0x218, 0x8000, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x1c) close(r0) 16:27:26 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x2, @random="ef6aad8775e3", 'dummy0\x00'}}) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x400, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x8) [ 240.560817] audit: type=1804 audit(1539707246.327:45): pid=7173 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir127079765/syzkaller.YuuOx3/3/file0" dev="sda1" ino=16537 res=1 16:27:26 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80}}], 0x1, 0x0, &(0x7f0000003280)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x0, 0x8f) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0) modify_ldt$read(0x0, &(0x7f0000000180)=""/154, 0x9a) [ 240.723745] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 16:27:26 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f0000000040)={0x200000002, 0x70, 0x2, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0xa, 0x1, 0x0) [ 240.844818] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 16:27:26 executing program 5: r0 = socket$inet(0x2, 0x6, 0x5) fcntl$setstatus(r0, 0x4, 0x2800) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=@hat={'changehat ', 0x0, 0x5e, ['*-\x00', '\x00']}, 0x21) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x11, 0x80002, 0x0) accept4(r2, &(0x7f0000000080)=@hci={0x1f, 0x0}, &(0x7f0000000140)=0x80, 0x80000) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@getqdisc={0x40, 0x26, 0xa02, 0x70bd2d, 0x25dfdbfe, {0x0, r4, {0x9}, {0x7, 0xfff3}, {0x10}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x80) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x54) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0xffffffffffffffb6, 0x0, &(0x7f0000893ff0), 0x10) 16:27:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x220102) r2 = socket(0x840000000002, 0x3, 0xff) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) setpgid(0x0, 0x0) sendfile(r2, r3, &(0x7f00000003c0)=0xf0300, 0x100000001) rename(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 16:27:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x4, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x3, &(0x7f0000000340)={0x0, 0x0}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000001c0)=0x952) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000380)=[{{0x77359400}, 0x16, 0x4, 0xdee0}, {{0x77359400}, 0x17, 0x3, 0x8}, {{}, 0x1f, 0x0, 0x5}, {{}, 0x17, 0x7, 0x9}, {{}, 0x15, 0x7c, 0x8}, {{r5, r6/1000+10000}, 0x17, 0x6, 0x765}, {{}, 0x16, 0xe5e, 0x1ff}, {{r7, r8/1000+30000}, 0x17, 0x96, 0xff}, {{0x77359400}, 0x5, 0x200, 0x5}, {{}, 0x3, 0xacd7013, 0x582}], 0xf0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00006dbffc), 0x4) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:27:27 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000040)=ANY=[@ANYRES16], 0x1) 16:27:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x220102) r2 = socket(0x840000000002, 0x3, 0xff) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) setpgid(0x0, 0x0) sendfile(r2, r3, &(0x7f00000003c0)=0xf0300, 0x100000001) rename(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 16:27:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80)=[{{&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000100)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000240)=""/147, 0x1f}], 0x2, &(0x7f0000002740)=""/218, 0xda}}], 0xf9e1221a8413ff5d, 0x0, &(0x7f0000002e40)={0x77359400}) recvmmsg(0xffffffffffffffff, &(0x7f0000006340)=[{{&(0x7f0000002840)=@l2, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000028c0)=""/220, 0xdc}, {&(0x7f00000029c0)=""/214, 0xd6}], 0x2, &(0x7f0000002d40)=""/47, 0x2f}}], 0x1, 0x0, &(0x7f0000006400)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000400), 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, 0x40000000042, 0x105}, 0x14}}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f00000000c0)=0x400) dup(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000040)) 16:27:27 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x2, @random="ef6aad8775e3", 'dummy0\x00'}}) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x400, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000080), 0x8) 16:27:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x220102) r2 = socket(0x840000000002, 0x3, 0xff) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) setpgid(0x0, 0x0) sendfile(r2, r3, &(0x7f00000003c0)=0xf0300, 0x100000001) rename(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 16:27:27 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x891c, &(0x7f0000000480)="0a5cc8070031e70b83c2ace7bf0eec1d00d0929ffc2b6c9829f00a1361967175068cb1aa35f717c9c3ad149c05b36be552f69f4ce3995870074260f7") r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x81, 0x82000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ip6gre0\x00', r2}, 0x10) r3 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000004c0)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="c0ff02000000000000e8d97192052224b73a473c713fad58cf89c891e5945df912e7ecf02301eca400bb1daa35a29d28ee82b8e4630bdd686193d141f5843a41116a89553cf0aefbe85a", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="d260f590afbe0dd18d774c92ff4ae4bcce9bae5a28c19c9bdcbd1f16101551a42c67e2bd79789c0e3f6519c8272276ce341f3d9923395e6d9788d9103e6d14f20e537d2e89a81a4e0ffcff4ad3f8787963df24c17c024d673dbbeedff9b8d0a38d38ee5f66fc62011166aa480b5480e241ca1a3fc04706c1b7e6a522ee0d86"], @ANYBLOB="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"]) modify_ldt$read_default(0x2, &(0x7f00000001c0)=""/192, 0xc0) 16:27:27 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="041b0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={r2, 0xc0}, &(0x7f0000000140)=0x8) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) sched_setparam(r3, &(0x7f00000001c0)) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, 0x1c) socket$inet6(0xa, 0x800, 0xfa3) 16:27:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x0, 0x4d75, 0x8, 0x3}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001ef, 0x0) 16:27:27 executing program 3: mmap(&(0x7f0000a91000/0x4000)=nil, 0x4000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) prctl$setmm(0x23, 0x7, &(0x7f0000a95000/0x3000)=nil) keyctl$session_to_parent(0x12) mprotect(&(0x7f0000a92000/0x1000)=nil, 0x1000, 0xf) 16:27:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) dup3(r0, r0, 0x80000) 16:27:27 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x891c, &(0x7f0000000480)="0a5cc8070031e70b83c2ace7bf0eec1d00d0929ffc2b6c9829f00a1361967175068cb1aa35f717c9c3ad149c05b36be552f69f4ce3995870074260f7") r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x81, 0x82000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ip6gre0\x00', r2}, 0x10) r3 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000004c0)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="c0ff02000000000000e8d97192052224b73a473c713fad58cf89c891e5945df912e7ecf02301eca400bb1daa35a29d28ee82b8e4630bdd686193d141f5843a41116a89553cf0aefbe85a", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="d260f590afbe0dd18d774c92ff4ae4bcce9bae5a28c19c9bdcbd1f16101551a42c67e2bd79789c0e3f6519c8272276ce341f3d9923395e6d9788d9103e6d14f20e537d2e89a81a4e0ffcff4ad3f8787963df24c17c024d673dbbeedff9b8d0a38d38ee5f66fc62011166aa480b5480e241ca1a3fc04706c1b7e6a522ee0d86"], @ANYBLOB="b403090056009dd57f00000005000000af04d67d8cc48ae3ad1edfc5364220805dd1f5024c574334cb0ecfff87ea2b4649687959d3fdbaf1181ad65ea82d0b32b029ee96031f8ce124e4d7c25d0227572dea38499a776adbd8d871f120da75d09fd6db08e980bd64dd47007801027c8cd4b41eb4891369a3116ea51376436412e88fec3e6e0279d122e590808f895b066b6d2eb0b5c5055ade906ea0d02eeb233d49b549810bc7b40390865030b3a48ff9e1902eeb03db509f312dff32a9466d6b952ec43ba724e9a08a6c467dde63320113a2aa7816e21e5b79aefcda2cf27b0bdd3d7738f2f479a3a6b5292149ae19e7e49ff17e2c7f116cc42fe6d847fb63b403e19446466259be064045977d"]) modify_ldt$read_default(0x2, &(0x7f00000001c0)=""/192, 0xc0) 16:27:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000100)=@dstopts={0xbf, 0x12, [], [@pad1, @padn={0x1, 0x2, [0x0, 0x0]}, @generic={0xfd1d, 0x75, "1e14a17a8f18445f4ab1540a5ba3d6ead5587685b797e91ce907574ac7b97ce1a97f45eb8d567c9b8655abb13e2b48f111e164c2d99c4ab99ee645cb8208379fe2442de6466790df7a98392314aafb7289082566a595bfdbc093c1e1a8b541d1f0da5d2488de36e66bbf9d814b55f90da34b5f7cfa"}, @pad1, @padn={0x1, 0x1, [0x0]}, @ra={0x5, 0x2, 0x8}, @padn={0x1, 0x1, [0x0]}, @ra={0x5, 0x2, 0x8001}, @padn={0x1, 0x2, [0x0, 0x0]}]}, 0xa0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x15, &(0x7f00000015c0), &(0x7f00000000c0)=0x2) 16:27:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x220102) r2 = socket(0x840000000002, 0x3, 0xff) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) setpgid(0x0, 0x0) sendfile(r2, r3, &(0x7f00000003c0)=0xf0300, 0x100000001) rename(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 16:27:27 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f0000000840)=ANY=[@ANYBLOB="05000000020002000000000000000000180000000303000000000000000000000900000003000000f002000000000000fffffffffffffffff0000000ffffffff20020000ffffffffffffffff20020000ffffffff03000000e6f616b9d5c57fc4577cc55be7a9", @ANYPTR=&(0x7f000002cfd0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x350) 16:27:27 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x891c, &(0x7f0000000480)="0a5cc8070031e70b83c2ace7bf0eec1d00d0929ffc2b6c9829f00a1361967175068cb1aa35f717c9c3ad149c05b36be552f69f4ce3995870074260f7") r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x81, 0x82000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ip6gre0\x00', r2}, 0x10) r3 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000004c0)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="c0ff02000000000000e8d97192052224b73a473c713fad58cf89c891e5945df912e7ecf02301eca400bb1daa35a29d28ee82b8e4630bdd686193d141f5843a41116a89553cf0aefbe85a", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="d260f590afbe0dd18d774c92ff4ae4bcce9bae5a28c19c9bdcbd1f16101551a42c67e2bd79789c0e3f6519c8272276ce341f3d9923395e6d9788d9103e6d14f20e537d2e89a81a4e0ffcff4ad3f8787963df24c17c024d673dbbeedff9b8d0a38d38ee5f66fc62011166aa480b5480e241ca1a3fc04706c1b7e6a522ee0d86"], @ANYBLOB="b403090056009dd57f00000005000000af04d67d8cc48ae3ad1edfc5364220805dd1f5024c574334cb0ecfff87ea2b4649687959d3fdbaf1181ad65ea82d0b32b029ee96031f8ce124e4d7c25d0227572dea38499a776adbd8d871f120da75d09fd6db08e980bd64dd47007801027c8cd4b41eb4891369a3116ea51376436412e88fec3e6e0279d122e590808f895b066b6d2eb0b5c5055ade906ea0d02eeb233d49b549810bc7b40390865030b3a48ff9e1902eeb03db509f312dff32a9466d6b952ec43ba724e9a08a6c467dde63320113a2aa7816e21e5b79aefcda2cf27b0bdd3d7738f2f479a3a6b5292149ae19e7e49ff17e2c7f116cc42fe6d847fb63b403e19446466259be064045977d"]) modify_ldt$read_default(0x2, &(0x7f00000001c0)=""/192, 0xc0) 16:27:27 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[], 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x5, 0x0, 0x2, 0x3ff}, 0x8) unshare(0x40000000) 16:27:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="110000000000000000d50ee10000"], 0x14}}, 0x0) [ 242.223765] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 242.247584] syz-executor5 cpuset=syz5 mems_allowed=0 [ 242.254864] IPVS: ftp: loaded support on port[0] = 21 [ 242.267370] CPU: 1 PID: 7278 Comm: syz-executor5 Not tainted 4.19.0-rc8+ #64 [ 242.274579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.283952] Call Trace: [ 242.286652] dump_stack+0x1c4/0x2b4 [ 242.290308] ? dump_stack_print_info.cold.2+0x52/0x52 [ 242.295546] ? kasan_check_read+0x11/0x20 [ 242.299733] warn_alloc.cold.119+0xb7/0x1bd [ 242.304079] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 242.308953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.314559] __vmalloc_node_range+0x472/0x750 [ 242.319101] ? sel_write_load+0x1d1/0x460 [ 242.323257] vmalloc+0x6f/0x80 [ 242.326449] ? sel_write_load+0x1d1/0x460 [ 242.330602] sel_write_load+0x1d1/0x460 [ 242.334613] __vfs_write+0x119/0x9f0 [ 242.338372] ? check_preemption_disabled+0x48/0x200 [ 242.343390] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 242.348328] ? kernel_read+0x120/0x120 [ 242.352282] ? __lock_is_held+0xb5/0x140 [ 242.356391] ? rcu_read_lock_sched_held+0x108/0x120 [ 242.361447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.366985] ? __sb_start_write+0x1b2/0x370 [ 242.371323] vfs_write+0x1fc/0x560 [ 242.374878] ksys_write+0x101/0x260 [ 242.378510] ? __ia32_sys_read+0xb0/0xb0 [ 242.382652] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 242.388115] __x64_sys_write+0x73/0xb0 [ 242.392034] do_syscall_64+0x1b9/0x820 [ 242.395961] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 242.401338] ? syscall_return_slowpath+0x5e0/0x5e0 [ 242.406267] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.411139] ? trace_hardirqs_on_caller+0x310/0x310 [ 242.416159] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 242.421179] ? prepare_exit_to_usermode+0x291/0x3b0 [ 242.426221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 242.431076] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.436266] RIP: 0033:0x457569 [ 242.439467] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 242.458368] RSP: 002b:00007f31f5a49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 242.466100] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 16:27:28 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000380)="2f005b37dfa5b433c070c3f613bcbc395ccb42723153977e90e32731299dee0c4a3db1740f27ae61cac1bd8388d6f229bd48d1d5d9be79db4ee9002d40f841195854f2f2ac3b4c4a0d70e3626bbbaf99f3a8638c3ff99487a0b5fe7c8aa3e24061957627d2075f8cee184c3f3adbfb9567e950ce46881c16e2a7ade170a364bc000000000200000000", &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000540)=ANY=[]) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) recvfrom(r0, &(0x7f0000000740)=""/4096, 0x1000, 0x60, &(0x7f0000000240)=@ethernet={0x1, @remote}, 0x80) r2 = add_key$user(&(0x7f0000001900)='user\x00', &(0x7f0000001940)={'syz', 0x3}, &(0x7f0000001980)="1287ec38544530fd8bafdec445b277fdb0cb221c5bd556f360be533f7a600e0cc82010991944b817d7bb2f4210214c64bb66f0775f6bf09cf0a4302b50709d9913519f01e5ce163fd20fb9817cb45aa1ce2ab269091260b3bc1cccda792a322ca31eab5ed5adaa88430a8b50e05670c2469c7607adc3f5b13b97ce2e44f6ee2b40c7db3de25c20fb4a71012ca249ccd3a483d4549c03e866a021fa9e5a2055db8d774babf6e91c867ecbb4c7f9a696deeb5ad057e7240c54b30d", 0xba, 0xfffffffffffffff8) keyctl$setperm(0x5, r2, 0x2010802) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000540)={r4, 0x1, 0x6, @remote}, 0x10) fallocate(r1, 0x0, 0x0, 0x1000f4) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000600)=""/254) r5 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) listxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000440)=""/185, 0xffffffffffffff16) write$binfmt_script(r1, &(0x7f0000001740)={'#! ', './bus', [{0x20, '/dev/dmmidi#\x00'}, {0x20, '9p\x00'}, {0x20, '9p\x00'}, {0x20, '9p\x00'}, {0x20, '/dev/dmmidi#\x00'}]}, 0x31) sendfile(r1, r5, &(0x7f0000d83ff8), 0x8000fffffffe) r6 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) fstat(r5, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000580)='./file1/file0\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000018c0)={{}, {0x1, 0x2}, [{0x2, 0x2, r7}, {0x2, 0x1, r8}], {0x4, 0x1}, [{0x8, 0x2, r9}], {0x10, 0x1}, {0x20, 0x1}}, 0x3c, 0x3) sendfile(r1, r0, &(0x7f0000000340), 0x6) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x7fff, 0x2201) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000100)=0x8) sendfile(r0, r6, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$TCSETA(r6, 0x5406, &(0x7f00000001c0)={0x0, 0x7fffffff, 0x10000, 0x9, 0x4, 0x5, 0x9, 0x6, 0xffff, 0xfff}) [ 242.473367] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 242.480633] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 242.487896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f31f5a4a6d4 [ 242.495161] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff 16:27:28 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="420254c77334e44d95e4c0cedcaf347c", 0x10) getsockopt$inet_tcp_int(r1, 0x6, 0x21, &(0x7f0000bfcffc), &(0x7f0000000100)=0x4) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x2000) write$UHID_GET_REPORT_REPLY(r2, &(0x7f00000001c0)={0xa, 0xa, 0x2, 0xfffffffffffffffb}, 0xa) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r2, 0x0, 0x32, &(0x7f0000000080)=')(\'md5sum%ppp0-cgroup)wlan0.posix_acl_accessself,\x00', 0xffffffffffffffff}, 0x30) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x1, 0x3, 0x5, 0x5, r3}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000200)) 16:27:28 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x891c, &(0x7f0000000480)="0a5cc8070031e70b83c2ace7bf0eec1d00d0929ffc2b6c9829f00a1361967175068cb1aa35f717c9c3ad149c05b36be552f69f4ce3995870074260f7") r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x81, 0x82000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ip6gre0\x00', r2}, 0x10) r3 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000004c0)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="c0ff02000000000000e8d97192052224b73a473c713fad58cf89c891e5945df912e7ecf02301eca400bb1daa35a29d28ee82b8e4630bdd686193d141f5843a41116a89553cf0aefbe85a", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="d260f590afbe0dd18d774c92ff4ae4bcce9bae5a28c19c9bdcbd1f16101551a42c67e2bd79789c0e3f6519c8272276ce341f3d9923395e6d9788d9103e6d14f20e537d2e89a81a4e0ffcff4ad3f8787963df24c17c024d673dbbeedff9b8d0a38d38ee5f66fc62011166aa480b5480e241ca1a3fc04706c1b7e6a522ee0d86"], @ANYBLOB="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"]) modify_ldt$read_default(0x2, &(0x7f00000001c0)=""/192, 0xc0) [ 242.551898] 9pnet_virtio: no channels available for device / 16:27:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x4000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000140)={0x1d, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, &(0x7f0000000040), 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000040)=0x3, 0xfea4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6gre0\x00', 0x10) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 16:27:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000280), 0xc, &(0x7f0000012000)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000100000000000000000000000000", @ANYRES32=r1, @ANYBLOB="12000800017b1800000000000000"], 0x30}}, 0x0) fcntl$setpipe(r0, 0x407, 0x4) 16:27:28 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x891c, &(0x7f0000000480)="0a5cc8070031e70b83c2ace7bf0eec1d00d0929ffc2b6c9829f00a1361967175068cb1aa35f717c9c3ad149c05b36be552f69f4ce3995870074260f7") r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x81, 0x82000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ip6gre0\x00', r2}, 0x10) r3 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f00000004c0)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="c0ff02000000000000e8d97192052224b73a473c713fad58cf89c891e5945df912e7ecf02301eca400bb1daa35a29d28ee82b8e4630bdd686193d141f5843a41116a89553cf0aefbe85a", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="d260f590afbe0dd18d774c92ff4ae4bcce9bae5a28c19c9bdcbd1f16101551a42c67e2bd79789c0e3f6519c8272276ce341f3d9923395e6d9788d9103e6d14f20e537d2e89a81a4e0ffcff4ad3f8787963df24c17c024d673dbbeedff9b8d0a38d38ee5f66fc62011166aa480b5480e241ca1a3fc04706c1b7e6a522ee0d86"], @ANYBLOB="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"]) 16:27:28 executing program 4: r0 = socket(0x200000010, 0x80000, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)) sendmmsg(r0, &(0x7f0000002680)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="d0fb23ce92a580e1fe1ff6f7a116c5f99d6d6e256302e896a3b7afeb625070656e0941f76de37693d72de711fda8d00794e3822ddda810baa79740948be44ecc53fb5dc745a084002e8baa79cddfa1c35699a6bf04508b315a6a52f4831ab1f32c3f14761fd4c717bb2dd8b0f67c38", 0x6f}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="980000000000000000000000020000007c23dd6a05293aa4d6a626c4aa7ece8b1ef1168405ffdac6a634030b54a641a86f9f1ec082a52968fe65d853b3aa1904903e4659c0422c991636d423e535b243517ee8b84f957c242010e15471197eb113e8202ba6a014f8952fd7c6a8a581bfcba87a9b9ee9261c99f3703bd9c010071b4151fbdcd9ad703664a477b62d0e7b20b6bfd7c3000000012070d32cde19b11241286c2f011775ceec88162aeaf153199f29045bf780e5ffc3811e253352a94935e0e90d7b5724777766eefbd4f577be6290"], 0x98, 0x80}, 0x1000000000000}, {{&(0x7f0000000e80)=@ipx={0x4, 0x0, 0x0, ':43CTa'}, 0x80, &(0x7f0000001100), 0x0, &(0x7f0000001140)}}], 0x2, 0x8000) setsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000100)=0x8, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x101280, 0x0) [ 242.776610] netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. 16:27:28 executing program 4: socketpair$unix(0x1, 0x8, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) pipe(&(0x7f0000000080)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x1e, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x30) close(r2) close(r1) [ 242.903866] Mem-Info: [ 242.906771] active_anon:129063 inactive_anon:114 isolated_anon:0 [ 242.906771] active_file:8198 inactive_file:36991 isolated_file:0 [ 242.906771] unevictable:0 dirty:557 writeback:125 unstable:0 [ 242.906771] slab_reclaimable:10219 slab_unreclaimable:107649 [ 242.906771] mapped:55096 shmem:120 pagetables:1052 bounce:0 [ 242.906771] free:1254676 free_pcp:736 free_cma:0 [ 242.955921] Node 0 active_anon:518360kB inactive_anon:456kB active_file:32892kB inactive_file:147764kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:220484kB dirty:2428kB writeback:0kB shmem:480kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 344064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 242.991017] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 243.026701] lowmem_reserve[]: 0 2819 6323 6323 [ 243.032071] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 243.060534] lowmem_reserve[]: 0 0 3503 3503 [ 243.065258] Node 0 Normal free:2113680kB min:37352kB low:46688kB high:56024kB active_anon:518360kB inactive_anon:456kB active_file:33092kB inactive_file:147664kB unevictable:0kB writepending:2424kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6112kB pagetables:4208kB bounce:0kB free_pcp:1528kB local_pcp:484kB free_cma:0kB [ 243.103611] lowmem_reserve[]: 0 0 0 0 [ 243.107827] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 243.122058] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 243.137453] Node 0 Normal: 9762*4kB (UM) 1077*8kB (UME) 547*16kB (M) 176*32kB (UME) 63*64kB (UME) 24*128kB (UME) 26*256kB (UE) 8*512kB (UE) 2*1024kB (ME) 4*2048kB (UME) 494*4096kB (M) = 2113568kB 16:27:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="0001000000ff000000000000c9030000ec000000010008000600000000000000002400000020000000010000000000006e9b3d5c0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="61626f72742c00f59f6ae204bcf7f15e623fba271fdeb1dc82ae60d47fb273f7f263a80f0e58794ae42955f7e36d6c7c9e92aeedcbb2d18ad4fc34bb9932aeb040f87719d1cbf9a055219f34f10c6709a6d4632963b9f3a858f0f42548db5b5fbd4a"]) r0 = socket$inet6(0xa, 0x401000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="153f6234488dd25d766070") [ 243.177758] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 243.193140] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 243.268101] 45292 total pagecache pages [ 243.289143] kauditd_printk_skb: 6 callbacks suppressed [ 243.289160] audit: type=1804 audit(1539707249.047:52): pid=7297 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir127079765/syzkaller.YuuOx3/7/bus" dev="sda1" ino=16538 res=1 [ 243.335197] EXT4-fs (loop4): bad block size 65536 [ 243.341688] 9pnet_virtio: no channels available for device / [ 243.347898] 0 pages in swap cache [ 243.354560] audit: type=1804 audit(1539707249.127:53): pid=7297 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir127079765/syzkaller.YuuOx3/7/bus" dev="sda1" ino=16538 res=1 [ 243.358484] Swap cache stats: add 0, delete 0, find 0/0 16:27:29 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000380)="2f005b37dfa5b433c070c3f613bcbc395ccb42723153977e90e32731299dee0c4a3db1740f27ae61cac1bd8388d6f229bd48d1d5d9be79db4ee9002d40f841195854f2f2ac3b4c4a0d70e3626bbbaf99f3a8638c3ff99487a0b5fe7c8aa3e24061957627d2075f8cee184c3f3adbfb9567e950ce46881c16e2a7ade170a364bc000000000200000000", &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000540)=ANY=[]) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) recvfrom(r0, &(0x7f0000000740)=""/4096, 0x1000, 0x60, &(0x7f0000000240)=@ethernet={0x1, @remote}, 0x80) r2 = add_key$user(&(0x7f0000001900)='user\x00', &(0x7f0000001940)={'syz', 0x3}, &(0x7f0000001980)="1287ec38544530fd8bafdec445b277fdb0cb221c5bd556f360be533f7a600e0cc82010991944b817d7bb2f4210214c64bb66f0775f6bf09cf0a4302b50709d9913519f01e5ce163fd20fb9817cb45aa1ce2ab269091260b3bc1cccda792a322ca31eab5ed5adaa88430a8b50e05670c2469c7607adc3f5b13b97ce2e44f6ee2b40c7db3de25c20fb4a71012ca249ccd3a483d4549c03e866a021fa9e5a2055db8d774babf6e91c867ecbb4c7f9a696deeb5ad057e7240c54b30d", 0xba, 0xfffffffffffffff8) keyctl$setperm(0x5, r2, 0x2010802) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000540)={r4, 0x1, 0x6, @remote}, 0x10) fallocate(r1, 0x0, 0x0, 0x1000f4) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000600)=""/254) r5 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) listxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000440)=""/185, 0xffffffffffffff16) write$binfmt_script(r1, &(0x7f0000001740)={'#! ', './bus', [{0x20, '/dev/dmmidi#\x00'}, {0x20, '9p\x00'}, {0x20, '9p\x00'}, {0x20, '9p\x00'}, {0x20, '/dev/dmmidi#\x00'}]}, 0x31) sendfile(r1, r5, &(0x7f0000d83ff8), 0x8000fffffffe) r6 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) fstat(r5, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000580)='./file1/file0\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000018c0)={{}, {0x1, 0x2}, [{0x2, 0x2, r7}, {0x2, 0x1, r8}], {0x4, 0x1}, [{0x8, 0x2, r9}], {0x10, 0x1}, {0x20, 0x1}}, 0x3c, 0x3) sendfile(r1, r0, &(0x7f0000000340), 0x6) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x7fff, 0x2201) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000100)=0x8) sendfile(r0, r6, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$TCSETA(r6, 0x5406, &(0x7f00000001c0)={0x0, 0x7fffffff, 0x10000, 0x9, 0x4, 0x5, 0x9, 0x6, 0xffff, 0xfff}) [ 243.426315] audit: type=1804 audit(1539707249.157:54): pid=7336 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir127079765/syzkaller.YuuOx3/7/bus" dev="sda1" ino=16538 res=1 [ 243.452517] syz-executor0 (7290) used greatest stack depth: 13120 bytes left [ 243.507041] netlink: 16 bytes leftover after parsing attributes in process `syz-executor2'. [ 243.516586] Free swap = 0kB [ 243.536787] Total swap = 0kB [ 243.591152] 1965979 pages RAM [ 243.603534] 0 pages HighMem/MovableOnly [ 243.608768] audit: type=1804 audit(1539707249.157:55): pid=7336 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir127079765/syzkaller.YuuOx3/7/bus" dev="sda1" ino=16538 res=1 [ 243.647268] 342307 pages reserved [ 243.659153] 0 pages cma reserved [ 243.679163] syz-executor5: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 243.692658] 9pnet_virtio: no channels available for device / [ 243.698596] syz-executor5 cpuset=syz5 mems_allowed=0 [ 243.712464] CPU: 1 PID: 7327 Comm: syz-executor5 Not tainted 4.19.0-rc8+ #64 [ 243.719675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.729054] Call Trace: [ 243.731685] dump_stack+0x1c4/0x2b4 [ 243.735364] ? dump_stack_print_info.cold.2+0x52/0x52 [ 243.740594] ? kasan_check_read+0x11/0x20 [ 243.744760] warn_alloc.cold.119+0xb7/0x1bd [ 243.749114] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 243.753988] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.759597] __vmalloc_node_range+0x472/0x750 [ 243.764121] ? graph_lock+0x170/0x170 [ 243.767927] ? __lock_is_held+0xb5/0x140 [ 243.772021] ? sel_write_load+0x1d1/0x460 [ 243.776177] vmalloc+0x6f/0x80 [ 243.779397] ? sel_write_load+0x1d1/0x460 [ 243.783586] sel_write_load+0x1d1/0x460 [ 243.787576] __vfs_write+0x119/0x9f0 [ 243.791309] ? check_preemption_disabled+0x48/0x200 [ 243.796344] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 243.801287] ? kernel_read+0x120/0x120 [ 243.805210] ? __lock_is_held+0xb5/0x140 [ 243.809343] ? rcu_read_lock_sched_held+0x108/0x120 [ 243.814377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.819938] ? __sb_start_write+0x1b2/0x370 [ 243.824329] vfs_write+0x1fc/0x560 [ 243.827888] ksys_write+0x101/0x260 [ 243.831537] ? __ia32_sys_read+0xb0/0xb0 [ 243.835615] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 243.841081] __x64_sys_write+0x73/0xb0 [ 243.844983] do_syscall_64+0x1b9/0x820 [ 243.848882] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 243.854272] ? syscall_return_slowpath+0x5e0/0x5e0 [ 243.859243] ? trace_hardirqs_on_caller+0x310/0x310 [ 243.864301] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 243.869436] ? recalc_sigpending_tsk+0x180/0x180 [ 243.874223] ? kasan_check_write+0x14/0x20 [ 243.878479] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 243.883350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.888547] RIP: 0033:0x457569 [ 243.891754] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 243.910659] RSP: 002b:00007f31f5a07c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 243.918382] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 243.925658] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 243.932933] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 243.940211] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f31f5a086d4 [ 243.947584] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 243.948769] audit: type=1800 audit(1539707249.707:56): pid=7342 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=16532 res=0 [ 243.960084] Mem-Info: [ 243.979842] active_anon:126499 inactive_anon:112 isolated_anon:0 [ 243.979842] active_file:8033 inactive_file:36890 isolated_file:0 [ 243.979842] unevictable:0 dirty:556 writeback:5 unstable:0 [ 243.979842] slab_reclaimable:10262 slab_unreclaimable:107332 [ 243.979842] mapped:55110 shmem:121 pagetables:981 bounce:0 [ 243.979842] free:1257684 free_pcp:1011 free_cma:0 [ 244.016672] Node 0 active_anon:505996kB inactive_anon:448kB active_file:32132kB inactive_file:147560kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:220440kB dirty:2224kB writeback:20kB shmem:484kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 344064kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 244.046813] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 244.074510] lowmem_reserve[]: 0 2819 6323 6323 [ 244.079268] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 244.108697] lowmem_reserve[]: 0 0 3503 3503 [ 244.113233] Node 0 Normal free:2123176kB min:37352kB low:46688kB high:56024kB active_anon:508088kB inactive_anon:448kB active_file:32132kB inactive_file:147860kB unevictable:0kB writepending:2252kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:5760kB pagetables:3924kB bounce:0kB free_pcp:2300kB local_pcp:1212kB free_cma:0kB [ 244.145594] lowmem_reserve[]: 0 0 0 0 [ 244.149645] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 244.163987] audit: type=1804 audit(1539707249.927:57): pid=7348 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir127079765/syzkaller.YuuOx3/8/bus" dev="sda1" ino=16532 res=1 [ 244.172506] Node 0 [ 244.219965] DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 244.247236] Node 0 Normal: 9764*4kB (UME) 1045*8kB (UME) 552*16kB (UME) 172*32kB (UME) 65*64kB (UME) 20*128kB (UME) 29*256kB (UE) 8*512kB (UE) 2*1024kB (ME) 4*2048kB (UME) 497*4096kB (M) = 2125944kB [ 244.265654] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 244.279361] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 244.288122] 45318 total pagecache pages [ 244.292644] 0 pages in swap cache [ 244.296199] Swap cache stats: add 0, delete 0, find 0/0 [ 244.301715] Free swap = 0kB [ 244.304815] Total swap = 0kB [ 244.307922] 1965979 pages RAM [ 244.311135] 0 pages HighMem/MovableOnly [ 244.315116] 342307 pages reserved 16:27:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@security={'security\x00', 0xe, 0x4, 0x3f0, 0x260, 0x0, 0x0, 0x260, 0x0, 0x358, 0x358, 0x358, 0x358, 0x358, 0x4, &(0x7f0000000000), {[{{@ip={@remote, @loopback, 0xff, 0xffffff00, 'rose0\x00', 'dummy0\x00', {}, {}, 0xff, 0x0, 0x20}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x8, [0x7f, 0xa8, 0x3, 0x5, 0x4, 0x80000000], 0x59c, 0x100000000, 0x100000001}, {0x7, [0x1ff, 0x0, 0x0, 0x6, 0x24a, 0x4], 0x1, 0x8, 0x6}}}}, {{@ip={@empty, @dev={0xac, 0x14, 0x14, 0x19}, 0xffffffff, 0xff000000, 'gre0\x00', 'ip6gre0\x00', {0xff}, {0xff}, 0x29, 0x3, 0x21}, 0x0, 0x108, 0x168, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0xd68, 0x7, 0x2, 0x2}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast, 0xafc2, 0x7, [0x25, 0x17, 0xc, 0xc, 0xc, 0x2c, 0x36, 0x28, 0x10, 0x1d, 0x3b, 0xc, 0xc, 0x18, 0x2e, 0x1b], 0x2, 0x6, 0x5}}}, {{@ip={@local, @multicast2, 0xff000000, 0xff000000, 'veth0\x00', 'veth0_to_bridge\x00', {0xff}, {0xff}, 0x6, 0x2}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0xffffffff, 0x1, [0x1, 0x3a, 0x3a, 0x28, 0x14, 0x15, 0x1f, 0x6, 0x13, 0x23, 0x40, 0x7, 0x20, 0x1a, 0x27, 0x35], 0x1, 0x80000000, 0x1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x450) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000140)={"6966623002000000020000cbb700", @ifru_map}) 16:27:30 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x891c, &(0x7f0000000480)="0a5cc8070031e70b83c2ace7bf0eec1d00d0929ffc2b6c9829f00a1361967175068cb1aa35f717c9c3ad149c05b36be552f69f4ce3995870074260f7") r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x81, 0x82000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ip6gre0\x00', r2}, 0x10) r3 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 16:27:30 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000)=':\x00', 0x1) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x4, @broadcast, 'veth1_to_bond\x00'}}) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x2286) 16:27:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x2) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_SWBIT(r1, 0x41045508, 0x70e000) prctl$intptr(0x0, 0x3) 16:27:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000000300)=ANY=[@ANYBLOB]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040)=[{&(0x7f0000000dc0)=""/52, 0x34}], 0x1, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x1, 0x22, &(0x7f0000006340)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x18a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7c, 0x20000) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000040)=0xffffffff, 0xc000, 0x7) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r4, r5+30000000}, &(0x7f0000000280)) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000817000/0x4000)=nil, 0x4000}) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000240)={0x28, 0x0, 0x2711, @reserved}, 0x10) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0x2) syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x100, 0x30000) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) accept4$vsock_stream(r3, &(0x7f0000000200)={0x28, 0x0, 0x2710, @host}, 0x10, 0x80800) [ 244.318560] 0 pages cma reserved 16:27:30 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x891c, &(0x7f0000000480)="0a5cc8070031e70b83c2ace7bf0eec1d00d0929ffc2b6c9829f00a1361967175068cb1aa35f717c9c3ad149c05b36be552f69f4ce3995870074260f7") r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x81, 0x82000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ip6gre0\x00', r2}, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 16:27:30 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000000)=':\x00', 0x1) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x4, @broadcast, 'veth1_to_bond\x00'}}) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x2286) 16:27:30 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x800b235, 0x4) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180), 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x8, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 16:27:30 executing program 5: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x6a77, 0x28000) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000240)={[0x100000001, 0x7, 0x100000000, 0x101, 0x0, 0xaa70, 0x0, 0x3, 0xfffffffffffffff7, 0x7, 0x401, 0x2, 0x6, 0x3, 0x4, 0x7ff], 0xf000, 0x2282}) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000140)={[{@alloc_mode_def='alloc_mode=default'}]}) 16:27:30 executing program 0: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000380)="2f005b37dfa5b433c070c3f613bcbc395ccb42723153977e90e32731299dee0c4a3db1740f27ae61cac1bd8388d6f229bd48d1d5d9be79db4ee9002d40f841195854f2f2ac3b4c4a0d70e3626bbbaf99f3a8638c3ff99487a0b5fe7c8aa3e24061957627d2075f8cee184c3f3adbfb9567e950ce46881c16e2a7ade170a364bc000000000200000000", &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000540)=ANY=[]) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) recvfrom(r0, &(0x7f0000000740)=""/4096, 0x1000, 0x60, &(0x7f0000000240)=@ethernet={0x1, @remote}, 0x80) r2 = add_key$user(&(0x7f0000001900)='user\x00', &(0x7f0000001940)={'syz', 0x3}, &(0x7f0000001980)="1287ec38544530fd8bafdec445b277fdb0cb221c5bd556f360be533f7a600e0cc82010991944b817d7bb2f4210214c64bb66f0775f6bf09cf0a4302b50709d9913519f01e5ce163fd20fb9817cb45aa1ce2ab269091260b3bc1cccda792a322ca31eab5ed5adaa88430a8b50e05670c2469c7607adc3f5b13b97ce2e44f6ee2b40c7db3de25c20fb4a71012ca249ccd3a483d4549c03e866a021fa9e5a2055db8d774babf6e91c867ecbb4c7f9a696deeb5ad057e7240c54b30d", 0xba, 0xfffffffffffffff8) keyctl$setperm(0x5, r2, 0x2010802) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000540)={r4, 0x1, 0x6, @remote}, 0x10) fallocate(r1, 0x0, 0x0, 0x1000f4) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000600)=""/254) r5 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) listxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000440)=""/185, 0xffffffffffffff16) write$binfmt_script(r1, &(0x7f0000001740)={'#! ', './bus', [{0x20, '/dev/dmmidi#\x00'}, {0x20, '9p\x00'}, {0x20, '9p\x00'}, {0x20, '9p\x00'}, {0x20, '/dev/dmmidi#\x00'}]}, 0x31) sendfile(r1, r5, &(0x7f0000d83ff8), 0x8000fffffffe) r6 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) fstat(r5, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getegid() lsetxattr$system_posix_acl(&(0x7f0000000580)='./file1/file0\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f00000018c0)={{}, {0x1, 0x2}, [{0x2, 0x2, r7}, {0x2, 0x1, r8}], {0x4, 0x1}, [{0x8, 0x2, r9}], {0x10, 0x1}, {0x20, 0x1}}, 0x3c, 0x3) sendfile(r1, r0, &(0x7f0000000340), 0x6) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x7fff, 0x2201) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000100)=0x8) sendfile(r0, r6, &(0x7f0000d83ff8), 0x8000fffffffe) ioctl$TCSETA(r6, 0x5406, &(0x7f00000001c0)={0x0, 0x7fffffff, 0x10000, 0x9, 0x4, 0x5, 0x9, 0x6, 0xffff, 0xfff}) [ 244.573752] mmap: syz-executor4 (7367) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 16:27:30 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x6) truncate(&(0x7f0000000180)='./bus\x00', 0xa00) r1 = open(&(0x7f0000000000)='./bus\x00', 0x18040, 0x80) lseek(r0, 0x400000, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) dup2(r2, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000040), 0x8000fffffffe) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 16:27:30 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x891c, &(0x7f0000000480)="0a5cc8070031e70b83c2ace7bf0eec1d00d0929ffc2b6c9829f00a1361967175068cb1aa35f717c9c3ad149c05b36be552f69f4ce3995870074260f7") r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x81, 0x82000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ip6gre0\x00', r2}, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) [ 244.712311] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 244.745730] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 16:27:30 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sndpcmp(&(0x7f00000017c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x10000) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000001800)=0x5, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x6) r3 = fcntl$dupfd(r0, 0x0, r0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getpeername$llc(r3, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) ioctl$KDGKBENT(r3, 0x4b46, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d4, &(0x7f0000000140)={0x17, &(0x7f0000000180)}) 16:27:30 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x891c, &(0x7f0000000480)="0a5cc8070031e70b83c2ace7bf0eec1d00d0929ffc2b6c9829f00a1361967175068cb1aa35f717c9c3ad149c05b36be552f69f4ce3995870074260f7") r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x81, 0x82000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ip6gre0\x00', r2}, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) [ 244.780268] 9pnet_virtio: no channels available for device / [ 244.792474] attempt to access beyond end of device [ 244.804852] loop5: rw=12288, want=8200, limit=20 [ 244.864911] attempt to access beyond end of device [ 244.871761] audit: type=1800 audit(1539707250.617:58): pid=7390 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=16527 res=0 [ 244.912794] loop5: rw=12288, want=12296, limit=20 [ 244.925768] overlayfs: filesystem on './file0' not supported as upperdir [ 244.948864] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 16:27:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000040)=ANY=[], 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000000), 0x4) prctl$getreaper(0x0, &(0x7f0000000040)) [ 244.970454] audit: type=1804 audit(1539707250.727:59): pid=7400 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir127079765/syzkaller.YuuOx3/9/bus" dev="sda1" ino=16527 res=1 [ 244.971905] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 16:27:30 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x891c, &(0x7f0000000480)="0a5cc8070031e70b83c2ace7bf0eec1d00d0929ffc2b6c9829f00a1361967175068cb1aa35f717c9c3ad149c05b36be552f69f4ce3995870074260f7") syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x81, 0x82000) r2 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) [ 245.044543] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 245.124521] attempt to access beyond end of device [ 245.142612] loop5: rw=12288, want=8200, limit=20 [ 245.163429] attempt to access beyond end of device [ 245.188602] loop5: rw=12288, want=12296, limit=20 [ 245.216202] F2FS-fs (loop5): Failed to get valid F2FS checkpoint 16:27:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) accept4$unix(r1, &(0x7f00000002c0), &(0x7f0000000340)=0x6e, 0x800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x9, 0x30}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)={r2, 0x800}, &(0x7f00000001c0)=0x8) r3 = dup3(r0, r0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000040)) accept4$unix(r3, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e, 0x800) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x28}}, 0x0) [ 245.370917] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 245.378065] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 245.386320] attempt to access beyond end of device [ 245.391419] loop5: rw=12288, want=8200, limit=20 [ 245.396472] attempt to access beyond end of device [ 245.401838] loop5: rw=12288, want=12296, limit=20 16:27:31 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x6) truncate(&(0x7f0000000180)='./bus\x00', 0xa00) r1 = open(&(0x7f0000000000)='./bus\x00', 0x18040, 0x80) lseek(r0, 0x400000, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) dup2(r2, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000040), 0x8000fffffffe) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 16:27:31 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r0, 0x80000) getsockopt$inet6_dccp_buf(r3, 0x21, 0xce, &(0x7f00000000c0)=""/7, &(0x7f0000000100)=0x2a2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e20, @rand_addr=0x5}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x482e85fb, @loopback}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e22, 0x2, @local, 0x757e}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}, @in={0x2, 0x4e23, @multicast2}], 0x8c) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000140)={0x1, [0xffffffff]}, 0x6) poll(&(0x7f0000000180)=[{r3, 0x10}, {r2, 0x100}, {r3}, {r2, 0x3144}, {r3, 0x8000}], 0x5, 0x9) fdatasync(r0) 16:27:31 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x891c, &(0x7f0000000480)="0a5cc8070031e70b83c2ace7bf0eec1d00d0929ffc2b6c9829f00a1361967175068cb1aa35f717c9c3ad149c05b36be552f69f4ce3995870074260f7") r2 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) [ 245.421847] F2FS-fs (loop5): Failed to get valid F2FS checkpoint [ 245.456816] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 245.501946] attempt to access beyond end of device [ 245.545933] loop5: rw=12288, want=8200, limit=20 [ 245.569697] attempt to access beyond end of device [ 245.577124] loop5: rw=12288, want=12296, limit=20 16:27:31 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) socket$inet6(0xa, 0x806, 0x0) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 16:27:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) fcntl$setstatus(r0, 0x4, 0x6000) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000080)={{0x2, 0x4e24, @loopback}, {0x306, @link_local}, 0x2, {0x2, 0x4e20}, 'yam0\x00'}) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') connect$llc(r2, &(0x7f0000000000)={0x1a, 0x33d, 0x9, 0x20, 0x1a, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000180)) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/create\x00', 0x2, 0x0) sendfile(r1, r2, &(0x7f00000002c0), 0x96) 16:27:31 executing program 3: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2a00000029010000001f93085800000000e1ff00000040000000b90000000000000700392e2f6625adce"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) r2 = geteuid() write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1, {0x0, {}, 0x0, r2, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0xf64f}}, 0xa0) write$P9_RWRITE(r1, &(0x7f0000000400)={0xb, 0x77, 0x1}, 0xb) write$P9_RGETATTR(r1, &(0x7f0000000680)={0xa0, 0x19, 0x1}, 0xa0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000180)=0x7) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r3, 0xc0045520, &(0x7f0000000340)=0x6) write$P9_RSTATFS(r1, &(0x7f0000000440)={0x43, 0x9, 0x1}, 0x43) renameat2(r3, &(0x7f0000000600)='./file0\x00', r3, &(0x7f0000000640)='./file0\x00', 0x4) write$P9_RWALK(r1, &(0x7f0000000040)={0x16, 0x6f, 0x1, {0x1, [{}]}}, 0x16) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)='9p\x00', 0x0, &(0x7f0000000a80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000300)='./file0/file0\x00', 0x0) 16:27:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) fadvise64(r1, 0x0, 0x642d, 0x6) inotify_init() pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000004, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r3 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r3, r2}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x23c, 0x80000001, 0x1, 0x100}) 16:27:31 executing program 5: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x6a77, 0x28000) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000240)={[0x100000001, 0x7, 0x100000000, 0x101, 0x0, 0xaa70, 0x0, 0x3, 0xfffffffffffffff7, 0x7, 0x401, 0x2, 0x6, 0x3, 0x4, 0x7ff], 0xf000, 0x2282}) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000140)={[{@alloc_mode_def='alloc_mode=default'}]}) 16:27:31 executing program 2: r0 = creat(&(0x7f0000002240)='./file1\x00', 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r2 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwritev(r2, &(0x7f0000003440)=[{&(0x7f0000002400)='I', 0x1}], 0x1, 0x0) fallocate(r0, 0x0, 0x0, 0x80003ff) fsync(r2) [ 245.721160] audit: type=1400 audit(1539707251.487:60): avc: denied { associate } for pid=7435 comm="syz-executor3" name="file0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 245.747265] attempt to access beyond end of device 16:27:31 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r1 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) [ 245.796028] loop5: rw=12288, want=8200, limit=20 [ 245.839774] attempt to access beyond end of device [ 245.853919] loop5: rw=12288, want=12296, limit=20 [ 245.878036] attempt to access beyond end of device 16:27:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffff00, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsync(r0) 16:27:31 executing program 3: readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/122, 0x7a}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/udplite\x00') r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r1, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x8}, 0x8) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="025cc8072369b78664dfa60dc270") sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) preadv(r0, &(0x7f0000000480), 0x100000000000016b, 0x0) [ 245.887252] loop5: rw=12288, want=8200, limit=20 [ 245.893723] attempt to access beyond end of device 16:27:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) fadvise64(r1, 0x0, 0x642d, 0x6) inotify_init() pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000004, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r3 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r3, r2}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x23c, 0x80000001, 0x1, 0x100}) 16:27:31 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) [ 245.947674] loop5: rw=12288, want=12296, limit=20 16:27:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) fadvise64(r1, 0x0, 0x642d, 0x6) inotify_init() pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000004, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r3 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r3, r2}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x23c, 0x80000001, 0x1, 0x100}) 16:27:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) fadvise64(r1, 0x0, 0x642d, 0x6) inotify_init() pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000004, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r3 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r3, r2}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x23c, 0x80000001, 0x1, 0x100}) 16:27:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x14000, 0x10) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f00000001c0)={0x0, 0x7f}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000040)=0x10) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x50400, 0x0) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000ad0000009de151045b9d19fc4a6f985e3a391cfe3f47dd95e6e4eda1602fb4f81887ecaf250c4b3303335ad40e64af3d2ec575acaadbb77696c189d0ee7a27193c6d8b5fd877e031afc50d2557b20988114b95581e160c1750a5ca72208a25e3a65719472aa1e41bd0f140c3d337e2c22f3112d1af6826504dc14c04919e98c0a967759b4fbd03ceb93b9c172b8d45c8b95de95225a679e8066769ede20610ca3079f5a95f2658625ffce9928126a35cad450a"]) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000100)={0x0, 0xf3}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x1, 0x218, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, &(0x7f0000000080), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0xb0, 0x158, 0x188, [@devgroup={'devgroup\x00', 0x18}]}, [@common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "ec8cc359096155b1335806765bdf9d8dc3024724ca1b9427f5aba6e40e93c3a7b39e151d82922586038dd34e1ef7b1410ac3d9ce09d5e7d02336f77e3d76c919"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x4}}}}]}]}, 0x290) eventfd2(0x800, 0x800) 16:27:31 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 16:27:32 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) fadvise64(r1, 0x0, 0x642d, 0x6) inotify_init() pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000004, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r3 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r3, r2}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x23c, 0x80000001, 0x1, 0x100}) 16:27:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = inotify_init1(0x0) fadvise64(r1, 0x0, 0x642d, 0x6) inotify_init() pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000004, 0xffffffffffffffff) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') r3 = dup2(r1, r2) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r3, r2}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x23c, 0x80000001, 0x1, 0x100}) 16:27:32 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000280)={r2, 0x9}, &(0x7f0000000300)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) fallocate(r0, 0x20, 0xffffffffffff0000, 0x2) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x400000, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100, 0x279d}) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000300)=ANY=[@ANYBLOB]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='limits\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x400, @mcast1, 0x6}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e24, 0x5be2, @ipv4={[], [], @remote}, 0x400}, @in={0x2, 0x4e20, @rand_addr}], 0x58) ioctl$BLKTRACESTOP(r4, 0x1275, 0x0) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) 16:27:32 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) [ 246.408976] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 246.482683] sched: DL replenish lagged too much [ 246.554945] IPVS: ftp: loaded support on port[0] = 21 16:27:32 executing program 1: setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040)={0xddb9, 0x799, 0x7ff, 0x4}, 0x10) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) [ 246.609641] xt_AUDIT: Audit type out of range (valid range: 0..2) 16:27:32 executing program 2: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000200)="0304001fecffffffffff", 0xa, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x6, @dev}, 0x1c) 16:27:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x14, 0x3e, 0x105, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1a3042, 0x20) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f00000000c0)={{0x9, 0x80, 0x2, 0x2, 0xd38f}, 0x6, 0x3, 0x1, 0x2, 0x5, "e5437584e48ee9393adf271430a8d1271610ec19ac8b5ab03b6871c6f94a65d14ad010a549ab6fc8c7454cbe487ed9ee4c71188cc251b3d84ccf315e24ff4411581a675adb55c017b40c41a9b86425d2656a90c74d691633852349245f5fb5545db710481e1e0b7775f74af974a83a87b13dc888fbb8ac69088361687b210ed9"}) 16:27:32 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000040)=0x1e) exit(0x0) read(r0, &(0x7f0000000100)=""/237, 0xed) 16:27:32 executing program 1: setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040)={0x0, 0x799, 0x7ff, 0x4}, 0x10) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 16:27:32 executing program 3: readv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/122, 0x7a}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/udplite\x00') r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r1, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x8}, 0x8) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="025cc8072369b78664dfa60dc270") sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) preadv(r0, &(0x7f0000000480), 0x100000000000016b, 0x0) 16:27:32 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x101100, 0x0) io_setup(0x7, &(0x7f0000000080)=0x0) inotify_init1(0x800) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000240)}]) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x301000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000002c0)={0x4d8, 0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000300)={0x0, 0x0, 0x10001, 0x1}) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000100)={0x6, r4, 0x1, 0x800}) ioctl$EVIOCGREP(r3, 0x80084503, &(0x7f00000001c0)=""/194) ioctl$DRM_IOCTL_AGP_BIND(r3, 0x40106436, &(0x7f0000000140)={r5, 0x1}) 16:27:32 executing program 1: setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x7ff, 0x4}, 0x10) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) [ 247.068186] skbuff: bad partial csum: csum=65535/65535 headroom=128 headlen=0 [ 247.107240] IPVS: ftp: loaded support on port[0] = 21 16:27:32 executing program 1: setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x7ff, 0x4}, 0x10) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 16:27:33 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffff9c}) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000c00)={0x0, 0xc0, "53667a95bc0f582571cc7656b70df5c3dde67bbb31b280dccfc2d900cc2ef42cb1707b96553468d0169e11146ed7b92bd76ae1c66d65036e14112ca2dea99c4fac56df85fee34fc04f5ffd83ae9132be2692889017e11003b14f46e04fa893531e7086b6a8da0dacc93bbd18ad2e4ac513b4153b8ee659d2fb9341e8bf0be76ece9eac4dc58105dfca3f8ad0328915e1bca117530ed502070796931156160226c4acb659fe6131c0a017f13023ca493ccc40804fd375ee7d5252d2e94f9ff280"}, &(0x7f0000000d00)=0xc8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000d40)=@assoc_value={r2, 0x100}, 0x8) lstat(0xfffffffffffffffe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000005c0)='./file0\x00', 0x80, 0x7, &(0x7f0000000a00)=[{&(0x7f0000000600)="7a5644e184776b50746028c9d84f8aec31bab88e89435b621ca747bc318d8d4f55972c9cd3144f2ef7ac70e8e36271daaf1fcd4ba32f6e905362b8a85826d852771cabafbc23a15ac53ad24108b14977ea13209270ec86b30e600e224079fffc8126033f2f9ad5977a8f9ef3fb055659516553bd654924e1041468db17218e967b093e38cd2c7c9f176cd4ce4271047d5f7acf1ed5c4fd6105b6e0de41a2a38de79c7e1abd7e200bd1d04b6242b2533ac2673b21b150e625320e8167410d783aa5b9b08634ae879dbc", 0xc9}, {&(0x7f0000000700)="30b72189081caaad8a39d92a9d91e4cc7df1fc45c72c4da52c2be05c2a21f1f43e7fcb523f4a72f6a6890ba701f34b6c8d9113ca5adb7e8d6894ca5ae552579a3c7e2a", 0x43, 0x400}, {&(0x7f0000000780)="6f098129c5fc25b2", 0x8, 0x29}, {&(0x7f00000007c0)="d931c0dea035e5ba153f7db467a3a947966930ee90eadc8a6a52baf869a10f095fa543c39e9960dafe32acad9aea7d0052fb64fc8fa9093211ce78786b2f96243498b31c83eadf2b0e16c3d9b6cd925b65be5ceafe081d5e5082529e7dff814d15050a4e6661d98bbfe969d37f8cd105295fe7b4a3e2fa7c0c88e0b7210810296f02dc1d626fc1d4f57fa62dbfd178311e6d9fb97d4e19d744db6742461731df3b6f2a2d32e4cc802af55b01ceb8aa70eee8567d4140d1d5454edbbc4a4758f72cc1b23c5fbc83184aadb0640c7e129b7398c81849548c137e2a460506", 0xdd, 0x1}, {&(0x7f00000008c0)="fd4f1bd83571d11e6775cef7b11cd7a1cec7ec1834777d446bbccf31889927ad1ae9e1a3a538096509647243ac4e115a940de99aa46d2ed5aa408b22ed625beee2447b515848f6f881273e21d2dafb87a52210cc2b7293d476723907ed83b61c8b18ec64942e76bf349dbc24738a30e0b956fe2f5905c333c19930043514de2935a2378beea3e50a46d52559a08c22b5fe23857be584243c15", 0x99, 0xffffffffffffbbaf}, {&(0x7f0000000980)="1be8efd962820f26f028df5c920a966b700f4521bad6cf8a6fd3f376e2983db848f0cf1d5e38bf76b7786866ff1148", 0x2f, 0x7}, {&(0x7f00000009c0)="aeed4e63259c1704ce364b04bb9b8ceafc84145d31561c3aa4241b7dfbc74f3066d535000439fba573", 0x29, 0x42c}], 0x10000, &(0x7f0000000b40)={[{@shortname_lower='shortname=lower'}, {@rodir='rodir'}, {@shortname_lower='shortname=lower'}, {@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}, {@utf8='utf8=1'}, {@uni_xlateno='uni_xlate=0'}, {@nonumtail='nnonumtail=1'}], [{@uid_lt={'uid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/sequencer2\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x800}}, {@seclabel='seclabel'}, {@seclabel='seclabel'}]}) sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000440)=ANY=[], 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000180)=""/228, 0xe4}, {&(0x7f0000000280)=""/203, 0xcb}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000400)=""/117, 0x75}, {&(0x7f0000000480)=""/181, 0xb5}], 0x5, 0x0) ioprio_set$pid(0x2, 0xffffffffffffffff, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xa8040, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000100)=0x3f) [ 247.331652] FAT-fs (loop2): Unrecognized mount option "nnonumtail=1" or missing value 16:27:34 executing program 1: setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x7ff, 0x4}, 0x10) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 16:27:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000780)=0x39d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xd8e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r1 = syz_open_pts(r0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000840)={&(0x7f0000000280), 0xc, &(0x7f00000006c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="04040dbd70542bdbdf250c00000058000f00080009003d000000080009000000000000000000000000000000000c000700080000000c000000080008003a00000008000200ff0000000c000700000000002800000008000100020000000800040001000000080004000001000060864e30a493288804603f6f371470c696081b1db199000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x3ffd}, 0x2000007d) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r5 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) read(r2, &(0x7f00000002c0)=""/7, 0x7) sendfile(r4, r5, &(0x7f0000000240), 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000007c0)={'HL\x00'}, &(0x7f0000000740)=0x1e) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000bc0)=""/4096) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000100)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0xa1d, 0x7f, 0x4, 0x0, 0x1, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_MATCH(r6, 0x0, 0x42, &(0x7f0000000640)={'HL\x00'}, &(0x7f0000000680)=0x1e) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f00000000c0)) ioctl$TIOCSETD(r1, 0x5412, &(0x7f00000004c0)=0x631a) 16:27:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027000f8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) socket$inet6(0xa, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xbc, &(0x7f0000000200)={@link_local, @broadcast, [], {@x25={0x805, {0x1, 0x5, 0x17, "ce34516180ac18045459609bc5b1667e38d593fd9024b327e4668efdddff39b5819dac646b628dce29c953e5b28f6385ead4a21d76ea77b160fa6bf4e35f2b29f64166a9305f997614cdfe9b1c9db4da0ec567c8f1db94f941d8bac602c86b171e71620b5e43b84b506c108e74321f308ba5162d44f4f74dd9e73604024fbb705556c62a6afbbc946881dd481bd617c32c3e06dc8946bcdc4a27408d52aaae5da132106af7a2100bbea768"}}}}, &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x0, 0x1de]}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001340)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) accept4$unix(r1, &(0x7f0000000180), &(0x7f0000000080)=0x6e, 0x80800) ioctl$TIOCSTI(r1, 0x5412, 0x163) getdents(r0, &(0x7f0000000340)=""/4096, 0x1000) 16:27:34 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000400)={0x191, 0x6f, 0x1, {0x0, [{0xa, 0x0, 0x1}, {0x2, 0x2}, {0x2, 0x4, 0x1}, {0x4, 0x3, 0x3}, {0x10, 0x0, 0x7}, {0x88, 0x4, 0x4}, {0x40, 0x0, 0x1}, {0xa4, 0x2, 0x5}]}}, 0x9) socketpair(0x1f, 0x3, 0x9, &(0x7f0000000080)={0xffffffffffffffff}) utimensat(r2, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}, 0x100) setxattr$security_capability(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000300)='security.capability\x00', &(0x7f00000004c0)=@v1={0x1000000, [{0x100000000, 0x3ff}]}, 0xc, 0x1) write$P9_RREADDIR(r1, &(0x7f0000000640)={0x87, 0x29, 0x1, {0x0, [{{0xa, 0x0, 0x8}, 0x5, 0xd786, 0x7, './file0'}, {{0x2, 0x1, 0x3}, 0x9, 0x10000, 0x7, './file0'}, {{0x2, 0x3, 0x6}, 0xffff, 0x6512, 0x7, './file0'}, {{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x87) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_loose='cache=loose'}, {@access_any='access=any'}]}}) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) 16:27:34 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000040)=0x1e) exit(0x0) read(r0, &(0x7f0000000100)=""/237, 0xed) 16:27:35 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000280)={r2, 0x9}, &(0x7f0000000300)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) fallocate(r0, 0x20, 0xffffffffffff0000, 0x2) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) unshare(0x40000000) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x400000, 0x0) r4 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0x100, 0x279d}) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000300)=ANY=[@ANYBLOB]) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r3) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='limits\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x400, @mcast1, 0x6}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e24, 0x5be2, @ipv4={[], [], @remote}, 0x400}, @in={0x2, 0x4e20, @rand_addr}], 0x58) ioctl$BLKTRACESTOP(r4, 0x1275, 0x0) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) [ 249.358368] IPVS: ftp: loaded support on port[0] = 21 16:27:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027000f8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) socket$inet6(0xa, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xbc, &(0x7f0000000200)={@link_local, @broadcast, [], {@x25={0x805, {0x1, 0x5, 0x17, "ce34516180ac18045459609bc5b1667e38d593fd9024b327e4668efdddff39b5819dac646b628dce29c953e5b28f6385ead4a21d76ea77b160fa6bf4e35f2b29f64166a9305f997614cdfe9b1c9db4da0ec567c8f1db94f941d8bac602c86b171e71620b5e43b84b506c108e74321f308ba5162d44f4f74dd9e73604024fbb705556c62a6afbbc946881dd481bd617c32c3e06dc8946bcdc4a27408d52aaae5da132106af7a2100bbea768"}}}}, &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x0, 0x1de]}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001340)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) accept4$unix(r1, &(0x7f0000000180), &(0x7f0000000080)=0x6e, 0x80800) ioctl$TIOCSTI(r1, 0x5412, 0x163) getdents(r0, &(0x7f0000000340)=""/4096, 0x1000) 16:27:35 executing program 1: setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040)={0x0, 0x799, 0x0, 0x4}, 0x10) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 16:27:35 executing program 1: setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040)={0x0, 0x799}, 0x10) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 16:27:35 executing program 0: r0 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/156) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x20000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000100)=0x9, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$void(r0, 0x0) mmap(&(0x7f0000bf0000/0x2000)=nil, 0x2000, 0x0, 0x800011, r0, 0x0) accept4$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14, 0x80000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f00000004c0)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in=@remote, @in6=@remote, 0x4e24, 0x0, 0x4e20, 0x0, 0x2, 0x80, 0x20, 0x88, r4, r5}, {0x8, 0x4, 0x600000000, 0x7, 0x2, 0x29cc, 0x100000000, 0x4219}, {0x4, 0x9, 0x4, 0x4}, 0x100, 0x6e6bb3, 0x1, 0x0, 0x2, 0x3}, {{@in6=@local, 0x4d4, 0x33}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x1e}, 0x3507, 0x4, 0x2, 0x1, 0x6, 0x1}}, 0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000003c0)={'bpq0\x00'}) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x7, 0x3, 0x3, 0x0, 0x7, 0x400, 0xb, 0x100, 0x5fc43742, 0x4, 0x0, 0xd2b94fd, 0x4000000000000000, 0xa74, 0x5, 0x0, 0x3, 0x7f, 0x17, 0x800, 0xffffffff, 0x400, 0x84, 0x3ff, 0x24000000, 0x1, 0x86, 0x9e1, 0x1f, 0xffffffff, 0x8, 0x8, 0x81, 0x5, 0x7, 0x0, 0xfffffffffffffff8, 0x3, @perf_config_ext={0x10000, 0x9}, 0x10, 0x4e, 0x80000000, 0x1, 0x9, 0x3, 0x8}, r6, 0xc, r2, 0x2) munmap(&(0x7f0000bf2000/0x2000)=nil, 0x2000) ioctl$KVM_SET_SIGNAL_MASK(r3, 0x4004ae8b, &(0x7f0000000600)={0x52, "aa46c07d937803b1eef878f9107ba26b5d72b2d7466689c3fac34f5b3488916b58c7a5add8ea5a05d3568f42bd155f3cd1aa51e6c022968357be2545f46b255242d719223f73aac20e992dc86f9c916d9a08"}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000480)={0xffffffffffffffff}) getsockopt$inet6_mreq(r7, 0x29, 0x15, &(0x7f0000000040)={@mcast1}, &(0x7f0000000080)=0x14) 16:27:35 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000040)=0x1e) exit(0x0) read(r0, &(0x7f0000000100)=""/237, 0xed) 16:27:35 executing program 1: setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040)={0x0, 0x799}, 0x10) r0 = socket(0x0, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f00000000c0)={'ip6gre0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 16:27:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x1) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4000000000004e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x2000800f, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback, [0x2, 0x7000028, 0xff0f]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000004c0)='highspeed\x00', 0xa) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 16:27:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000780)=0x39d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xd8e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r1 = syz_open_pts(r0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000840)={&(0x7f0000000280), 0xc, &(0x7f00000006c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="04040dbd70542bdbdf250c00000058000f00080009003d000000080009000000000000000000000000000000000c000700080000000c000000080008003a00000008000200ff0000000c000700000000002800000008000100020000000800040001000000080004000001000060864e30a493288804603f6f371470c696081b1db199000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x3ffd}, 0x2000007d) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) read(r2, &(0x7f00000002c0)=""/7, 0x7) sendfile(r4, r5, &(0x7f0000000240), 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000007c0)={'HL\x00'}, &(0x7f0000000740)=0x1e) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000bc0)=""/4096) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000100)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) set_thread_area(&(0x7f0000000600)={0x1, 0x20000800, 0x0, 0xa1d, 0x7f, 0x4, 0x0, 0x1, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_REVISION_MATCH(r6, 0x0, 0x42, &(0x7f0000000640)={'HL\x00'}, &(0x7f0000000680)=0x1e) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f00000000c0)) ioctl$TIOCSETD(r1, 0x5412, &(0x7f00000004c0)=0x631a) 16:27:35 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x40002) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x40045730, &(0x7f0000000040)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x9) [ 250.246406] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:27:36 executing program 0: r0 = gettid() sched_setattr(r0, &(0x7f0000000080)={0x30, 0x5, 0x1, 0x9a3, 0x800, 0xe10, 0x3, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x2) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1000000000200000, 0x0) ioctl(r2, 0x800000000000937a, &(0x7f0000000140)="01000000000000007f000000084781fb0731877541b9551f25bbb5412c759f127c7d31239137405dd2400f6acb0d0dd940dd49c547e2c81376d7d59f10391231a1b8131f3eb817517fa8057e4e670ce9050a0d11b60705d382159378f909aa7effe2d8769007c43b319f50caf2046aa018dde2bf2df59a0778044f87763d17") setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f00000000c0)={0xc, @dev={0xac, 0x14, 0x14, 0x20}, 0x4e21, 0x3, 'ovf\x00', 0x3a, 0x3, 0x74}, 0x2c) [ 394.919297] INFO: task syz-executor3:7605 blocked for more than 140 seconds. [ 394.926766] Not tainted 4.19.0-rc8+ #64 [ 394.932083] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 394.940124] syz-executor3 D25400 7605 5590 0x00000004 [ 394.945847] Call Trace: [ 394.948455] __schedule+0x86c/0x1ed0 [ 394.952247] ? __sched_text_start+0x8/0x8 [ 394.956393] ? mark_held_locks+0x130/0x130 [ 394.960664] ? graph_lock+0x170/0x170 [ 394.964456] ? print_usage_bug+0xc0/0xc0 [ 394.968503] ? mark_held_locks+0x130/0x130 [ 394.972856] ? find_held_lock+0x36/0x1c0 [ 394.976962] schedule+0xfe/0x460 [ 394.980401] ? __schedule+0x1ed0/0x1ed0 [ 394.984388] ? lockdep_hardirqs_on+0x421/0x5c0 [ 394.988957] ? trace_hardirqs_on+0xbd/0x310 [ 394.993329] ? kasan_check_read+0x11/0x20 [ 394.997463] ? rwsem_down_read_failed+0x338/0x610 [ 395.002346] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 395.007785] ? kasan_check_write+0x14/0x20 [ 395.012046] ? do_raw_spin_lock+0xc1/0x200 [ 395.016271] rwsem_down_read_failed+0x362/0x610 [ 395.021012] ? rt_mutex_futex_unlock+0x120/0x120 [ 395.025763] ? find_held_lock+0x36/0x1c0 [ 395.029873] ? lock_acquire+0x1ed/0x520 [ 395.033904] ? lookup_slow+0x49/0x80 [ 395.037627] ? lock_release+0x970/0x970 [ 395.041684] ? arch_local_save_flags+0x40/0x40 [ 395.046269] ? rcu_bh_qs+0xc0/0xc0 [ 395.049894] call_rwsem_down_read_failed+0x18/0x30 [ 395.054835] down_read+0xbe/0x1d0 [ 395.058272] ? lookup_slow+0x49/0x80 [ 395.062573] ? __down_interruptible+0x700/0x700 [ 395.067231] ? lookup_fast+0x470/0x12a0 [ 395.071246] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 395.077131] lookup_slow+0x49/0x80 [ 395.080702] walk_component+0x92b/0x25c0 [ 395.084770] ? inode_permission+0xb2/0x560 [ 395.088993] ? path_init+0x1ed0/0x1ed0 [ 395.092916] ? walk_component+0x25c0/0x25c0 [ 395.097252] ? save_stack+0xa9/0xd0 [ 395.100925] ? kasan_slab_alloc+0x12/0x20 [ 395.105107] ? kmem_cache_alloc+0x12e/0x730 [ 395.109461] ? getname_flags+0xd0/0x5a0 [ 395.113422] ? user_path_at_empty+0x2d/0x50 [ 395.117730] path_lookupat.isra.43+0x212/0xc00 [ 395.122353] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 395.127547] ? path_parentat.isra.41+0x160/0x160 [ 395.132343] ? usercopy_warn+0x110/0x110 [ 395.136396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.141961] ? check_preemption_disabled+0x48/0x200 [ 395.146968] filename_lookup+0x26a/0x520 [ 395.151056] ? filename_parentat.isra.56+0x570/0x570 [ 395.156145] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 395.161753] ? digsig_verify+0x1530/0x1530 [ 395.166006] ? kmem_cache_alloc+0x33a/0x730 [ 395.170372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.175895] ? getname_flags+0x26e/0x5a0 [ 395.179987] ? kasan_check_read+0x11/0x20 [ 395.184124] user_path_at_empty+0x40/0x50 [ 395.188279] path_setxattr+0xd6/0x230 [ 395.192630] ? setxattr+0x450/0x450 [ 395.196294] ? trace_hardirqs_on+0xbd/0x310 [ 395.200704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.206233] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.211687] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 395.217206] __x64_sys_setxattr+0xc4/0x150 [ 395.221616] do_syscall_64+0x1b9/0x820 [ 395.225502] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 395.230902] ? syscall_return_slowpath+0x5e0/0x5e0 [ 395.235823] ? trace_hardirqs_on_caller+0x310/0x310 [ 395.240869] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 395.245886] ? recalc_sigpending_tsk+0x180/0x180 [ 395.250701] ? kasan_check_write+0x14/0x20 [ 395.254927] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 395.259810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.264986] RIP: 0033:0x457569 [ 395.268163] Code: 83 c4 18 c3 e8 d8 64 00 00 48 8b 04 24 48 8b 4c 24 08 48 89 01 e8 d7 2d fc ff e8 22 7a fc ff b8 02 00 00 00 48 8d 0d 2a 60 09 <01> 87 01 8b 05 22 60 09 01 83 f8 01 0f 85 8a 00 00 00 b8 01 00 00 [ 395.287109] RSP: 002b:00007f6812875c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 395.294850] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457569 [ 395.302200] RDX: 00000000200004c0 RSI: 0000000020000300 RDI: 00000000200001c0 [ 395.309491] RBP: 000000000072c180 R08: 0000000000000001 R09: 0000000000000000 [ 395.316752] R10: 000000000000000c R11: 0000000000000246 R12: 00007f68128766d4 [ 395.324594] R13: 00000000004bddbc R14: 00000000004d7140 R15: 00000000ffffffff [ 395.331931] INFO: task syz-executor3:7606 blocked for more than 140 seconds. [ 395.339129] Not tainted 4.19.0-rc8+ #64 [ 395.343606] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 395.351598] syz-executor3 D23992 7606 5590 0x00000004 [ 395.357216] Call Trace: [ 395.359833] __schedule+0x86c/0x1ed0 [ 395.363540] ? __sched_text_start+0x8/0x8 [ 395.367672] ? graph_lock+0x170/0x170 [ 395.371506] ? print_usage_bug+0xc0/0xc0 [ 395.375564] ? graph_lock+0x170/0x170 [ 395.379425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.384956] ? check_preemption_disabled+0x48/0x200 [ 395.390020] ? check_preemption_disabled+0x48/0x200 [ 395.395154] ? find_held_lock+0x36/0x1c0 [ 395.399278] schedule+0xfe/0x460 [ 395.402637] ? __schedule+0x1ed0/0x1ed0 [ 395.406595] ? lockdep_hardirqs_on+0x421/0x5c0 [ 395.411226] ? trace_hardirqs_on+0xbd/0x310 [ 395.415551] ? kasan_check_read+0x11/0x20 [ 395.419742] ? __rwsem_down_write_failed_common+0x8db/0x1670 [ 395.425529] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 395.431026] ? kasan_check_write+0x14/0x20 [ 395.435250] ? do_raw_spin_lock+0xc1/0x200 [ 395.439522] __rwsem_down_write_failed_common+0xbb9/0x1670 [ 395.445138] ? rwsem_spin_on_owner+0xa30/0xa30 [ 395.450261] ? lock_downgrade+0x900/0x900 [ 395.454408] ? check_preemption_disabled+0x48/0x200 [ 395.459456] ? mark_held_locks+0x130/0x130 [ 395.463677] ? rcu_bh_qs+0xc0/0xc0 [ 395.467260] ? is_bpf_text_address+0xd3/0x170 [ 395.471793] ? __lock_acquire+0x7ec/0x4ec0 [ 395.476057] ? __save_stack_trace+0x8d/0xf0 [ 395.480417] ? mark_held_locks+0x130/0x130 [ 395.484635] ? save_stack+0xa9/0xd0 [ 395.488243] ? save_stack+0x43/0xd0 [ 395.491929] ? __kasan_slab_free+0x102/0x150 [ 395.496330] ? kasan_slab_free+0xe/0x10 [ 395.500338] ? kmem_cache_free+0x83/0x290 [ 395.504483] ? graph_lock+0x170/0x170 [ 395.508264] ? do_fchownat+0x11f/0x250 [ 395.512177] ? __x64_sys_chown+0x7b/0xc0 [ 395.516227] ? do_syscall_64+0x1b9/0x820 [ 395.520314] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.525674] ? trace_hardirqs_off+0xb8/0x310 [ 395.530106] ? kasan_check_read+0x11/0x20 [ 395.534239] ? do_raw_spin_unlock+0xa7/0x2f0 [ 395.538628] ? trace_hardirqs_on+0x310/0x310 [ 395.543082] ? lock_acquire+0x1ed/0x520 [ 395.547042] ? chown_common+0x3a9/0x730 [ 395.551077] ? lock_release+0x970/0x970 [ 395.555353] ? arch_local_save_flags+0x40/0x40 [ 395.560074] rwsem_down_write_failed+0xe/0x10 [ 395.564559] ? rwsem_down_write_failed+0xe/0x10 [ 395.569270] call_rwsem_down_write_failed+0x17/0x30 [ 395.574279] down_write+0xa5/0x130 [ 395.577876] ? chown_common+0x3a9/0x730 [ 395.582394] ? down_read+0x1d0/0x1d0 [ 395.586097] ? graph_lock+0x170/0x170 [ 395.589948] chown_common+0x3a9/0x730 [ 395.593746] ? chmod_common+0x590/0x590 [ 395.597706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.603276] ? __mnt_want_write+0x327/0x420 [ 395.607587] ? rcu_read_lock_sched_held+0x108/0x120 [ 395.612772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.618302] ? __sb_start_write+0x1b2/0x370 [ 395.622690] do_fchownat+0x16e/0x250 [ 395.626394] ? __ia32_sys_chmod+0x80/0x80 [ 395.630574] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 395.636014] __x64_sys_chown+0x7b/0xc0 [ 395.639943] do_syscall_64+0x1b9/0x820 [ 395.643821] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 395.649228] ? syscall_return_slowpath+0x5e0/0x5e0 [ 395.654148] ? trace_hardirqs_on_caller+0x310/0x310 [ 395.659196] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 395.664200] ? recalc_sigpending_tsk+0x180/0x180 [ 395.668954] ? kasan_check_write+0x14/0x20 [ 395.673223] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 395.678089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.683302] RIP: 0033:0x457569 [ 395.686505] Code: 83 c4 18 c3 e8 d8 64 00 00 48 8b 04 24 48 8b 4c 24 08 48 89 01 e8 d7 2d fc ff e8 22 7a fc ff b8 02 00 00 00 48 8d 0d 2a 60 09 <01> 87 01 8b 05 22 60 09 01 83 f8 01 0f 85 8a 00 00 00 b8 01 00 00 [ 395.705446] RSP: 002b:00007f6812854c78 EFLAGS: 00000246 ORIG_RAX: 000000000000005c [ 395.713807] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 395.721130] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000140 [ 395.728484] RBP: 000000000072c220 R08: 0000000000000000 R09: 0000000000000000 [ 395.735801] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f68128556d4 [ 395.743090] R13: 00000000004c2525 R14: 00000000004cc3a0 R15: 00000000ffffffff [ 395.750417] [ 395.750417] Showing all locks held in the system: [ 395.756737] 1 lock held by khungtaskd/987: [ 395.761068] #0: 0000000031b2d61b (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 395.769744] 1 lock held by rsyslogd/5361: [ 395.773872] #0: 000000009a93c996 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 395.781918] 2 locks held by getty/5484: [ 395.785874] #0: 00000000d8738364 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 395.794165] #1: 00000000d56803c9 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 395.803100] 2 locks held by getty/5485: [ 395.807055] #0: 00000000750cd318 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 395.815337] #1: 00000000a785e330 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 395.824210] 2 locks held by getty/5486: [ 395.828164] #0: 00000000b51e2cc6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 395.836441] #1: 0000000036048f47 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 395.845801] 2 locks held by getty/5487: [ 395.849823] #0: 000000008f7382dd (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 395.858053] #1: 0000000009cfbf2c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 395.866938] 2 locks held by getty/5488: [ 395.870919] #0: 00000000df948a6c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 395.879183] #1: 00000000c7fdb759 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 395.888044] 2 locks held by getty/5489: [ 395.892038] #0: 000000005991313c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 395.900313] #1: 00000000c7f97e20 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 395.909261] 2 locks held by getty/5490: [ 395.913216] #0: 00000000f8d3a535 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 395.921503] #1: 00000000d1cc73f0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 395.930447] 2 locks held by syz-executor3/7564: [ 395.935124] #0: 00000000422797e9 (sb_writers#13){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 395.943158] #1: 000000009b8bae94 (&sb->s_type->i_mutex_key#20){++++}, at: chown_common+0x3a9/0x730 [ 395.952392] 1 lock held by syz-executor3/7605: [ 395.957027] #0: 000000009b8bae94 (&sb->s_type->i_mutex_key#20){++++}, at: lookup_slow+0x49/0x80 [ 395.966110] 2 locks held by syz-executor3/7606: [ 395.971301] #0: 00000000422797e9 (sb_writers#13){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 395.979358] #1: 000000009b8bae94 (&sb->s_type->i_mutex_key#20){++++}, at: chown_common+0x3a9/0x730 [ 395.988557] [ 395.990235] ============================================= [ 395.990235] [ 395.997235] NMI backtrace for cpu 0 [ 396.000890] CPU: 0 PID: 987 Comm: khungtaskd Not tainted 4.19.0-rc8+ #64 [ 396.007711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.017043] Call Trace: [ 396.019615] dump_stack+0x1c4/0x2b4 [ 396.023260] ? dump_stack_print_info.cold.2+0x52/0x52 [ 396.028450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.033970] nmi_cpu_backtrace.cold.3+0x63/0xa2 [ 396.038663] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 396.043845] nmi_trigger_cpumask_backtrace+0x1b3/0x1ed [ 396.049105] arch_trigger_cpumask_backtrace+0x14/0x20 [ 396.054277] watchdog+0xb3e/0x1050 [ 396.057807] ? reset_hung_task_detector+0xd0/0xd0 [ 396.062651] ? __kthread_parkme+0xce/0x1a0 [ 396.066879] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 396.071982] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 396.077072] ? lockdep_hardirqs_on+0x421/0x5c0 [ 396.081636] ? trace_hardirqs_on+0xbd/0x310 [ 396.085939] ? kasan_check_read+0x11/0x20 [ 396.090096] ? __kthread_parkme+0xce/0x1a0 [ 396.094313] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 396.099768] ? kasan_check_write+0x14/0x20 [ 396.103986] ? do_raw_spin_lock+0xc1/0x200 [ 396.108203] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 396.113286] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 396.118809] ? __kthread_parkme+0xfb/0x1a0 [ 396.123041] kthread+0x35a/0x420 [ 396.126391] ? reset_hung_task_detector+0xd0/0xd0 [ 396.131214] ? kthread_bind+0x40/0x40 [ 396.134995] ret_from_fork+0x3a/0x50 [ 396.138816] Sending NMI from CPU 0 to CPUs 1: [ 396.144013] NMI backtrace for cpu 1 [ 396.144018] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-rc8+ #64 [ 396.144023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.144025] RIP: 0010:rcu_nmi_enter+0x8a/0x1e0 [ 396.144034] Code: 00 00 00 48 89 45 d0 31 c0 e8 82 5d 23 02 89 c0 48 8d 3c c5 e0 9e 00 89 48 89 fa 48 c1 ea 03 42 80 3c 22 00 0f 85 11 01 00 00 <48> 03 1c c5 e0 9e 00 89 48 b8 00 00 00 00 00 fc ff df 4c 8d 73 08 [ 396.144037] RSP: 0018:ffff8801daf07c20 EFLAGS: 00000046 [ 396.144043] RAX: 0000000000000001 RBX: 0000000000023980 RCX: ffffffff838d268a [ 396.144047] RDX: 1ffffffff12013dd RSI: ffffffff838d2698 RDI: ffffffff89009ee8 [ 396.144050] RBP: ffff8801daf07cb0 R08: ffff8801d9b1e3c0 R09: ffffed003b5e5979 [ 396.144054] R10: ffffed003b5e5979 R11: ffff8801daf2cbcb R12: dffffc0000000000 [ 396.144058] R13: 1ffff1003b5e0f85 R14: ffff8801daf07e68 R15: 0000000000000001 [ 396.144062] FS: 0000000000000000(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 396.144065] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 396.144069] CR2: ffffffffff600400 CR3: 00000001c95ec000 CR4: 00000000001406e0 [ 396.144073] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 396.144077] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 396.144079] Call Trace: [ 396.144080] [ 396.144083] ? rcu_idle_exit+0x470/0x470 [ 396.144086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.144089] ? check_preemption_disabled+0x48/0x200 [ 396.144091] rcu_irq_enter+0xce/0x100 [ 396.144093] irq_enter+0xa/0xe0 [ 396.144096] scheduler_ipi+0x3d0/0xad0 [ 396.144099] ? migration_cpu_stop+0x6a0/0x6a0 [ 396.144102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.144104] ? check_preemption_disabled+0x48/0x200 [ 396.144107] ? rcu_nmi_exit+0xdb/0x280 [ 396.144109] ? rcu_idle_enter+0x4b0/0x4b0 [ 396.144112] ? kvm_clock_read+0x18/0x30 [ 396.144114] ? kvm_sched_clock_read+0x9/0x20 [ 396.144117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.144120] ? check_preemption_disabled+0x48/0x200 [ 396.144123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.144126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.144129] ? check_preemption_disabled+0x48/0x200 [ 396.144131] smp_reschedule_interrupt+0x109/0x650 [ 396.144134] ? smp_thermal_interrupt+0x850/0x850 [ 396.144137] ? interrupt_entry+0xb5/0xf0 [ 396.144139] ? trace_hardirqs_off_caller+0xbb/0x310 [ 396.144142] ? trace_hardirqs_off_caller+0xbb/0x310 [ 396.144145] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.144148] ? trace_hardirqs_on_caller+0x310/0x310 [ 396.144150] ? trace_hardirqs_on_caller+0x310/0x310 [ 396.144153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.144156] ? check_preemption_disabled+0x48/0x200 [ 396.144159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.144162] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.144164] reschedule_interrupt+0xf/0x20 [ 396.144166] [ 396.144169] RIP: 0010:native_safe_halt+0x6/0x10 [ 396.144177] Code: e9 2c ff ff ff 48 89 c7 48 89 45 d8 e8 f3 e0 11 fa 48 8b 45 d8 e9 ca fe ff ff 48 89 df e8 e2 e0 11 fa eb 82 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 90 90 90 90 90 [ 396.144180] RSP: 0018:ffff8801d9b2fc30 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff02 [ 396.144186] RAX: dffffc0000000000 RBX: 1ffff1003b365f8a RCX: 0000000000000000 [ 396.144190] RDX: 1ffffffff1263e44 RSI: 0000000000000001 RDI: ffffffff8931f220 [ 396.144193] RBP: ffff8801d9b2fc30 R08: ffff8801d9b1e3c0 R09: 0000000000000000 [ 396.144197] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801d9b2fcf0 [ 396.144201] R13: ffffffff89f3bd60 R14: 0000000000000000 R15: 0000000000000001 [ 396.144203] default_idle+0xbf/0x490 [ 396.144206] ? rcu_dynticks_eqs_enter+0x4c/0x70 [ 396.144212] ? __sched_text_end+0x1/0x1 [ 396.144215] ? rcu_idle_enter+0x329/0x4b0 [ 396.144218] ? rcu_eqs_special_set+0x1b0/0x1b0 [ 396.144220] ? tsc_verify_tsc_adjust+0x137/0x460 [ 396.144223] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 396.144226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.144229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.144232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.144235] arch_cpu_idle+0x10/0x20 [ 396.144237] default_idle_call+0x6d/0x90 [ 396.144239] do_idle+0x3db/0x5b0 [ 396.144242] ? retint_kernel+0x2d/0x2d [ 396.144244] ? arch_cpu_idle_exit+0x70/0x70 [ 396.144247] cpu_startup_entry+0x10c/0x120 [ 396.144249] ? cpu_in_idle+0x20/0x20 [ 396.144251] start_secondary+0x447/0x5f0 [ 396.144254] ? set_cpu_sibling_map+0x1860/0x1860 [ 396.144257] secondary_startup_64+0xa4/0xb0 [ 396.144903] Kernel panic - not syncing: hung_task: blocked tasks [ 396.579691] CPU: 0 PID: 987 Comm: khungtaskd Not tainted 4.19.0-rc8+ #64 [ 396.586509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.595839] Call Trace: [ 396.598413] dump_stack+0x1c4/0x2b4 [ 396.602023] ? dump_stack_print_info.cold.2+0x52/0x52 [ 396.607197] panic+0x238/0x4e7 [ 396.610373] ? add_taint.cold.5+0x16/0x16 [ 396.614507] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 396.619937] ? nmi_trigger_cpumask_backtrace+0x1c4/0x1ed [ 396.625366] ? nmi_trigger_cpumask_backtrace+0x173/0x1ed [ 396.630798] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 396.636233] watchdog+0xb4f/0x1050 [ 396.639762] ? reset_hung_task_detector+0xd0/0xd0 [ 396.644593] ? __kthread_parkme+0xce/0x1a0 [ 396.648871] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 396.653963] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 396.659053] ? lockdep_hardirqs_on+0x421/0x5c0 [ 396.663622] ? trace_hardirqs_on+0xbd/0x310 [ 396.667925] ? kasan_check_read+0x11/0x20 [ 396.672052] ? __kthread_parkme+0xce/0x1a0 [ 396.676265] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 396.681697] ? kasan_check_write+0x14/0x20 [ 396.685913] ? do_raw_spin_lock+0xc1/0x200 [ 396.690129] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 396.695263] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 396.700790] ? __kthread_parkme+0xfb/0x1a0 [ 396.705011] kthread+0x35a/0x420 [ 396.708362] ? reset_hung_task_detector+0xd0/0xd0 [ 396.713181] ? kthread_bind+0x40/0x40 [ 396.716962] ret_from_fork+0x3a/0x50 [ 396.721667] Kernel Offset: disabled [ 396.725291] Rebooting in 86400 seconds..