[ 37.651149] audit: type=1800 audit(1573385737.598:32): pid=7372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 38.488254] audit: type=1800 audit(1573385738.518:33): pid=7372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.27' (ECDSA) to the list of known hosts. 2019/11/10 11:35:46 fuzzer started syzkaller login: [ 46.438936] kauditd_printk_skb: 2 callbacks suppressed [ 46.438949] audit: type=1400 audit(1573385746.468:36): avc: denied { map } for pid=7555 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/11/10 11:35:48 dialing manager at 10.128.0.105:44523 2019/11/10 11:35:48 syscalls: 2545 2019/11/10 11:35:48 code coverage: enabled 2019/11/10 11:35:48 comparison tracing: enabled 2019/11/10 11:35:48 extra coverage: extra coverage is not supported by the kernel 2019/11/10 11:35:48 setuid sandbox: enabled 2019/11/10 11:35:48 namespace sandbox: enabled 2019/11/10 11:35:48 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/10 11:35:48 fault injection: enabled 2019/11/10 11:35:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/10 11:35:48 net packet injection: enabled 2019/11/10 11:35:48 net device setup: enabled 2019/11/10 11:35:48 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/10 11:35:48 devlink PCI setup: PCI device 0000:00:10.0 is not available 11:38:31 executing program 0: [ 211.887676] audit: type=1400 audit(1573385911.918:37): avc: denied { map } for pid=7573 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=61 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 211.993955] IPVS: ftp: loaded support on port[0] = 21 11:38:32 executing program 1: [ 212.101052] chnl_net:caif_netlink_parms(): no params data found [ 212.161729] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.171224] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.179370] device bridge_slave_0 entered promiscuous mode [ 212.189612] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.196666] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.205334] device bridge_slave_1 entered promiscuous mode [ 212.240316] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 212.251310] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 212.275468] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.278337] IPVS: ftp: loaded support on port[0] = 21 [ 212.284164] team0: Port device team_slave_0 added [ 212.293894] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 212.301379] team0: Port device team_slave_1 added [ 212.309918] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.318943] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 11:38:32 executing program 2: [ 212.405302] device hsr_slave_0 entered promiscuous mode [ 212.443393] device hsr_slave_1 entered promiscuous mode [ 212.483140] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 212.490195] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 212.507526] IPVS: ftp: loaded support on port[0] = 21 11:38:32 executing program 3: [ 212.551161] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.557758] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.564785] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.571185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.721477] chnl_net:caif_netlink_parms(): no params data found [ 212.816148] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 212.823535] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.843663] chnl_net:caif_netlink_parms(): no params data found [ 212.858135] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 11:38:32 executing program 4: [ 212.864812] IPVS: ftp: loaded support on port[0] = 21 [ 212.885250] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.891702] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.903723] device bridge_slave_0 entered promiscuous mode [ 212.920432] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 212.933185] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.949514] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.956697] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.973340] device bridge_slave_1 entered promiscuous mode [ 213.007732] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.024541] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.041211] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.048985] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 213.080346] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.093674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.101811] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.108270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.121462] IPVS: ftp: loaded support on port[0] = 21 [ 213.140297] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 213.153689] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.171792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.180483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 11:38:33 executing program 5: [ 213.188841] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.195430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.207986] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 213.237702] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.245163] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.253342] device bridge_slave_0 entered promiscuous mode [ 213.267941] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.274977] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.285049] device bridge_slave_1 entered promiscuous mode [ 213.292394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.307219] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 213.315130] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 213.323205] team0: Port device team_slave_0 added [ 213.330623] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 213.338122] team0: Port device team_slave_1 added [ 213.348071] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 213.362028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.381334] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 213.389144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 213.434631] device hsr_slave_0 entered promiscuous mode [ 213.484073] device hsr_slave_1 entered promiscuous mode [ 213.532978] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 213.540259] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 213.550341] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.558520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.566448] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.574757] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.584635] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.595584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 213.598270] IPVS: ftp: loaded support on port[0] = 21 [ 213.627801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.635698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.648687] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 213.660676] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 213.673348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.681377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.690388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.698527] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.709194] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.719128] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 213.727880] team0: Port device team_slave_0 added [ 213.734900] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 213.742131] team0: Port device team_slave_1 added [ 213.748092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 213.756106] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 213.798347] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 213.804470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.865254] device hsr_slave_0 entered promiscuous mode [ 213.902610] device hsr_slave_1 entered promiscuous mode [ 213.998915] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 214.039093] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 214.046521] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 214.059910] chnl_net:caif_netlink_parms(): no params data found [ 214.076334] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 214.115492] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 214.122370] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 214.132160] chnl_net:caif_netlink_parms(): no params data found [ 214.190934] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.198922] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.206862] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.214178] device bridge_slave_0 entered promiscuous mode [ 214.225754] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 214.235016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.241445] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.248191] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.256517] device bridge_slave_0 entered promiscuous mode [ 214.265835] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.272406] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.279502] device bridge_slave_1 entered promiscuous mode [ 214.288688] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.295354] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.305082] device bridge_slave_1 entered promiscuous mode [ 214.322076] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.340968] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 214.348910] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.363826] audit: type=1400 audit(1573385914.398:38): avc: denied { associate } for pid=7574 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 214.431782] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 214.445364] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.466398] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.477346] team0: Port device team_slave_0 added 11:38:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getpid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f0000000000)=""/7, 0x57b}], 0x1000000000000102, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x30b, 0x0) personality(0x9000008) uname(&(0x7f0000000000)=""/193) [ 214.488811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.496723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.514194] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 214.520304] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.533985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.554214] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.561734] team0: Port device team_slave_1 added [ 214.575008] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 214.587476] chnl_net:caif_netlink_parms(): no params data found [ 214.607205] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 214.615337] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 214.632593] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 214.639863] team0: Port device team_slave_0 added [ 214.659848] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.668079] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 214.680971] bridge0: port 1(bridge_slave_0) entered blocking state 11:38:34 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) open(&(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x10) unlink(&(0x7f0000000040)='./file0\x00') socket$inet6(0xa, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f00000067c0)=ANY=[@ANYBLOB="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"/3905], 0xf41}, 0x0) [ 214.687421] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.696507] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.745197] device hsr_slave_0 entered promiscuous mode 11:38:34 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, 0x4) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) [ 214.782844] device hsr_slave_1 entered promiscuous mode [ 214.826656] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 214.833978] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 214.841265] team0: Port device team_slave_1 added [ 214.851906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.873840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 214.881841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 214.890586] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.897035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.906827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 214.929854] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.936798] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.944812] device bridge_slave_0 entered promiscuous mode [ 214.951815] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 214.959567] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 214.971588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 214.985623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 214.996861] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.003706] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.010990] device bridge_slave_1 entered promiscuous mode [ 215.018661] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.031545] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 215.039362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.049972] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 215.075640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 11:38:35 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, 0x4) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) [ 215.085074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.097013] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 215.109981] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 215.159829] device hsr_slave_0 entered promiscuous mode [ 215.222874] device hsr_slave_1 entered promiscuous mode [ 215.273243] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 215.280468] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 215.291072] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 215.298639] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.306472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.314647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.322207] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.330166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.339090] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.353202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.364911] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 11:38:35 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, 0x4) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) [ 215.386072] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 215.395014] team0: Port device team_slave_0 added [ 215.400215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.409638] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.426452] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.434713] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 215.440762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.453586] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 215.467302] team0: Port device team_slave_1 added [ 215.493636] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.509282] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 215.518249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.525892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.534133] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 11:38:35 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, 0x4) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) [ 215.547722] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 215.563944] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 215.570268] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.600588] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 215.614880] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 215.621358] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.631047] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.640625] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 215.670183] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.677541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.686568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.694897] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.701369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.713699] 8021q: adding VLAN 0 to HW filter on device batadv0 11:38:35 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, 0x4) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) [ 215.722209] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 215.736172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.759234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 11:38:35 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, 0x4) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) [ 215.824551] device hsr_slave_0 entered promiscuous mode [ 215.843323] device hsr_slave_1 entered promiscuous mode [ 215.903035] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 215.918580] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 215.937253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.946675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.959435] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.965861] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.973514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.980770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.991068] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 215.999768] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 216.011981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.021387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 216.031579] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 216.039030] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.047132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.065829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.075887] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.087688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.095828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.103972] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.110318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.117313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.125329] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.133296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.140406] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.149466] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.159028] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 216.168874] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 216.176645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.185508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.193454] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.199819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.207638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.215803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.225736] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.233970] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 216.253040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.264073] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 216.274791] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 216.282143] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 216.298704] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.306773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.315810] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.323451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.331188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.339459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.347232] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.356568] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 216.371572] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 216.380907] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 216.388627] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.397034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.405017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.413496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.421422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.428466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.442155] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.449546] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 216.456091] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.473585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 216.481158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.489124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.500850] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 216.509957] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 216.517742] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.527138] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 216.533832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.541442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.550858] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 216.559926] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 216.566585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.575706] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 216.585864] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.594850] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.601702] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.611148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.620541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.628311] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.634701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.641657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.653748] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.661910] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 216.669573] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.678696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.696302] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 216.704068] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.712128] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.722018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.730797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.739756] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.746321] bridge0: port 2(bridge_slave_1) entered forwarding state 11:38:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000000), 0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) fcntl$setstatus(r0, 0x4, 0x80000000002c00) socket$inet6_tcp(0xa, 0x1, 0x0) [ 216.765871] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 216.782114] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 216.790000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.799490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.808929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.822728] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.829123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.844245] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 216.852831] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 216.863869] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 216.872932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 216.881626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.894566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.905242] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.912074] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.926659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.937835] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.948737] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.955149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.970767] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 216.989319] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.001224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 217.015567] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.027602] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.038995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.052114] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.075283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 217.099503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.123189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.131334] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.151562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.164283] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 217.186291] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 217.198909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 217.206952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.217907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.226952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.235172] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.242778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.250778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.260818] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 217.267864] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.276840] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.295469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.310472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.318654] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.327765] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 217.340316] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 217.347312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.355416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.364823] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 217.375019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.381795] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 217.390430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 217.401184] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 217.411937] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 217.418424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 217.427186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.437515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.447850] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.467439] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 217.487936] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 217.497887] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.506843] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 11:38:37 executing program 3: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) write$evdev(0xffffffffffffffff, 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) getsockopt$sock_buf(r0, 0x1, 0x3d, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 11:38:37 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, 0x4) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) [ 217.535885] 8021q: adding VLAN 0 to HW filter on device batadv0 11:38:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1000000000000a}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e26, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/sockstat\x00') sendfile(r0, r1, 0x0, 0xedc0) 11:38:37 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, 0x4) 11:38:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() getpid() openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) 11:38:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) ptrace(0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) write(r1, &(0x7f0000000340)="2600000022004701050000000000000005006d20002b5fee839cd53400b017ca5b00000000", 0x25) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r2, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r2, 0x40045612, &(0x7f0000001ac0)) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000001c0)=""/222, 0xde}], 0x1, 0x4) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) [ 217.679528] hrtimer: interrupt took 41554 ns 11:38:37 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) socket$inet(0x2, 0x0, 0x0) 11:38:37 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) 11:38:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace(0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) ptrace$pokeuser(0x6, 0x0, 0x388, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) syz_open_dev$video(0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000000)={0x30}, 0xfd30) recvmmsg(r2, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000180)=""/43, 0x2b}], 0x1}}], 0x1, 0x0, 0x0) [ 217.854418] audit: type=1400 audit(1573385917.888:39): avc: denied { name_bind } for pid=7687 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 217.950948] audit: type=1400 audit(1573385917.918:40): avc: denied { node_bind } for pid=7687 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 11:38:38 executing program 4: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000380)={0x0, 0x2000000229, 0x0, 0x0, 0x4}) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x11, @multicast2=0xe000000f, 0x0, 0x0, 'sh\x00', 0x0, 0x10001}, 0x2c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x1) getdents64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000080)={0xc6, 0x0, 0x0, 0x74, 0x81, 0x0, 0x2c, 0x8, 0x1, 0x0, 0x3}, 0xb) connect$inet(0xffffffffffffffff, 0x0, 0x0) 11:38:38 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000), 0xb}, 0x38f) socket$nl_xfrm(0x10, 0x3, 0x6) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() prlimit64(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 11:38:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) 11:38:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000700), 0x0, 0x0, 0x0) 11:38:38 executing program 3: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) write$evdev(0xffffffffffffffff, 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) getsockopt$sock_buf(r0, 0x1, 0x3d, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) [ 218.185299] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 11:38:38 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) [ 218.232791] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 218.239561] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 11:38:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f00000004c0)=""/143, 0xa}], 0x1) close(r1) syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') tkill(r0, 0x1000000000016) 11:38:38 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x0, 0x0) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) getpgid(r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x8000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(0x0, r4, 0x3, r3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1000000004, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a3a, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, r4, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(r4, &(0x7f00000006c0)='attr/fscreate\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ppoll(&(0x7f0000000680)=[{r5}], 0x1, &(0x7f00000006c0), 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ppoll(&(0x7f0000000680)=[{r6}], 0x1, &(0x7f00000006c0), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r6, 0x400445a0, &(0x7f0000000400)=0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r5, 0xc008551b, &(0x7f0000000440)={0x6, 0x18, [0x4, 0x18, 0xfffffffa, 0x8004, 0x1, 0x9]}) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ppoll(&(0x7f0000000680)=[{r7}], 0x1, &(0x7f00000006c0), 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r7, &(0x7f00000002c0)="926c60d9e57368ee24cbd4b15c1cd854d8db0314271563bda2ac9875ad3394ed83ba0f396074ec66fe207579f070fb0e4e99b1b04aace8af9270030bbc5062549da0dca85c2604127580184e0b65c91210a29a3bd6accaf3227a7a387808440473b5c28f6e08d80a41dec139874a93c705a19bc3"}, 0x20) 11:38:38 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x7) ioctl$TIOCSETD(r0, 0x8924, &(0x7f0000000040)) [ 218.282591] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 218.297697] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 218.356728] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 218.395485] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 11:38:38 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) [ 218.449256] ptrace attach of "/root/syz-executor.1"[7577] was attempted by "/root/syz-executor.1"[7752] [ 218.459303] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 11:38:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="02010500000001000000351f2027dfc1933082000800000000060000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 218.495777] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 218.511085] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 218.533293] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 11:38:38 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) fcntl$lock(0xffffffffffffffff, 0x5, 0x0) [ 218.568897] sp0: Synchronizing with TNC [ 218.603602] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 11:38:38 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) [ 218.668643] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 218.684490] ptrace attach of "/root/syz-executor.1"[7577] was attempted by "/root/syz-executor.1"[7752] [ 218.732575] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 11:38:38 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @broadcast, 'gre0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000000080), 0x44, 0x0) [ 218.750748] loop3: p2 p3 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 [ 218.759317] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 218.872191] sp0: Synchronizing with TNC 11:38:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x1, 0x1f, 0x20, 0x401, 0x0, 0xffffffffffffffff, 0x0, [0xa]}, 0x3c) [ 218.922407] loop3: partition table partially beyond EOD, truncated 11:38:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x4400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f00000000c0)="0f20d86635200000000f22d826d33566b91109000066b80060000066ba000000000f306766c74424000d0000006766c7442402f60000006766c744240600000000670f0114246766c74424003f8c00006766c7442402e4d400006766c744240600000000670f011424660f38827500b8dd000f00d80f21f30f01c3ddc3", 0x7d}], 0xb, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, 0x12, r3, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000000d000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000000)="460f070f20c035080000000f22c00f01c4c4412966f8f3c7f8996da09043ddbe00200009c4a25d8e97eb75f3410f01b2741706c60fc75e030f09", 0x3a}], 0x1, 0x20, &(0x7f00000003c0)=[@flags={0x3, 0x2}], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) r4 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="0a00498bb9067ef91b8f0000090000001809"], 0x0) 11:38:39 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, &(0x7f0000001ac0)) [ 218.980740] loop3: p2 start 100663296 is beyond EOD, truncated [ 219.051778] loop3: p3 size 2 extends beyond EOD, truncated [ 219.068526] audit: type=1400 audit(1573385919.098:41): avc: denied { map_create } for pid=7802 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 11:38:39 executing program 5: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) r1 = dup2(r0, r0) r2 = epoll_create(0x7fff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0xc0002009}) ppoll(&(0x7f0000000040)=[{r2}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0, 0x0) [ 219.121187] loop3: p4 size 32768 extends beyond EOD, truncated 11:38:39 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, &(0x7f0000001ac0)) [ 219.185265] loop3: p5 start 100663296 is beyond EOD, truncated [ 219.252636] loop3: p6 size 32768 extends beyond EOD, truncated [ 219.286185] loop3: p7 start 100663296 is beyond EOD, truncated [ 219.315943] loop3: p8 size 32768 extends beyond EOD, truncated [ 219.372525] loop3: p9 start 100663296 is beyond EOD, truncated [ 219.379108] audit: type=1400 audit(1573385919.388:42): avc: denied { create } for pid=7807 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 219.405019] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 219.434379] loop3: p10 size 32768 extends beyond EOD, truncated [ 219.449438] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 219.482632] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 219.495345] loop3: p11 start 100663296 is beyond EOD, truncated [ 219.516321] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 219.525341] audit: type=1400 audit(1573385919.538:43): avc: denied { write } for pid=7807 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 219.563958] loop3: p12 size 32768 extends beyond EOD, truncated [ 219.570370] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 219.584848] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 219.594940] loop3: p13 start 100663296 is beyond EOD, truncated [ 219.601240] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 219.616613] audit: type=1400 audit(1573385919.638:44): avc: denied { read } for pid=7807 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 219.650150] loop3: p14 size 32768 extends beyond EOD, truncated [ 219.656799] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 219.665284] loop3: p15 start 100663296 is beyond EOD, truncated [ 219.671539] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 219.683957] loop3: p16 size 32768 extends beyond EOD, truncated [ 219.702420] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz1 [ 219.717536] loop3: p17 start 100663296 is beyond EOD, truncated [ 219.731746] loop3: p18 size 32768 extends beyond EOD, truncated [ 219.753449] loop3: p19 start 100663296 is beyond EOD, truncated [ 219.759840] loop3: p20 size 32768 extends beyond EOD, truncated 11:38:39 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x0, 0x0) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) getpgid(r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x8000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(0x0, r4, 0x3, r3, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1000000004, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a3a, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x3ff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, r4, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(r4, &(0x7f00000006c0)='attr/fscreate\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ppoll(&(0x7f0000000680)=[{r5}], 0x1, &(0x7f00000006c0), 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ppoll(&(0x7f0000000680)=[{r6}], 0x1, &(0x7f00000006c0), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r6, 0x400445a0, &(0x7f0000000400)=0x1000) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r5, 0xc008551b, &(0x7f0000000440)={0x6, 0x18, [0x4, 0x18, 0xfffffffa, 0x8004, 0x1, 0x9]}) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ppoll(&(0x7f0000000680)=[{r7}], 0x1, &(0x7f00000006c0), 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r7, &(0x7f00000002c0)="926c60d9e57368ee24cbd4b15c1cd854d8db0314271563bda2ac9875ad3394ed83ba0f396074ec66fe207579f070fb0e4e99b1b04aace8af9270030bbc5062549da0dca85c2604127580184e0b65c91210a29a3bd6accaf3227a7a387808440473b5c28f6e08d80a41dec139874a93c705a19bc3"}, 0x20) 11:38:39 executing program 4: creat(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 11:38:39 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) accept$alg(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, &(0x7f0000001ac0)) [ 219.830515] loop3: p21 start 100663296 is beyond EOD, truncated [ 219.846352] loop3: p22 size 32768 extends beyond EOD, truncated [ 219.891823] loop3: p23 start 100663296 is beyond EOD, truncated [ 219.935543] ptrace attach of "/root/syz-executor.1"[7577] was attempted by "/root/syz-executor.1"[7838] [ 219.947632] loop3: p24 size 32768 extends beyond EOD, truncated [ 219.968480] loop3: p25 start 100663296 is beyond EOD, truncated [ 220.010811] loop3: p26 size 32768 extends beyond EOD, truncated [ 220.047468] loop3: p27 start 100663296 is beyond EOD, truncated [ 220.059575] loop3: p28 size 32768 extends beyond EOD, truncated [ 220.067899] loop3: p29 start 100663296 is beyond EOD, truncated [ 220.092863] loop3: p30 size 32768 extends beyond EOD, truncated [ 220.108346] loop3: p31 start 100663296 is beyond EOD, truncated [ 220.115225] loop3: p32 size 32768 extends beyond EOD, truncated [ 220.126216] loop3: p33 start 100663296 is beyond EOD, truncated [ 220.139103] loop3: p34 size 32768 extends beyond EOD, truncated [ 220.156107] loop3: p35 start 100663296 is beyond EOD, truncated [ 220.164071] loop3: p36 size 32768 extends beyond EOD, truncated [ 220.171655] loop3: p37 start 100663296 is beyond EOD, truncated [ 220.178142] loop3: p38 size 32768 extends beyond EOD, truncated [ 220.185488] loop3: p39 start 100663296 is beyond EOD, truncated [ 220.191581] loop3: p40 size 32768 extends beyond EOD, truncated [ 220.199065] loop3: p41 start 100663296 is beyond EOD, truncated [ 220.205235] loop3: p42 size 32768 extends beyond EOD, truncated [ 220.212102] loop3: p43 start 100663296 is beyond EOD, truncated [ 220.218333] loop3: p44 size 32768 extends beyond EOD, truncated [ 220.225285] loop3: p45 start 100663296 is beyond EOD, truncated [ 220.231494] loop3: p46 size 32768 extends beyond EOD, truncated [ 220.238922] loop3: p47 start 100663296 is beyond EOD, truncated [ 220.245604] loop3: p48 size 32768 extends beyond EOD, truncated [ 220.252614] loop3: p49 start 100663296 is beyond EOD, truncated [ 220.258706] loop3: p50 size 32768 extends beyond EOD, truncated [ 220.266289] loop3: p51 start 100663296 is beyond EOD, truncated [ 220.272980] loop3: p52 size 32768 extends beyond EOD, truncated [ 220.280034] loop3: p53 start 100663296 is beyond EOD, truncated [ 220.286373] loop3: p54 size 32768 extends beyond EOD, truncated [ 220.293625] loop3: p55 start 100663296 is beyond EOD, truncated [ 220.299713] loop3: p56 size 32768 extends beyond EOD, truncated [ 220.307000] loop3: p57 start 100663296 is beyond EOD, truncated [ 220.313439] loop3: p58 size 32768 extends beyond EOD, truncated [ 220.320468] loop3: p59 start 100663296 is beyond EOD, truncated [ 220.326668] loop3: p60 size 32768 extends beyond EOD, truncated [ 220.334338] loop3: p61 start 100663296 is beyond EOD, truncated [ 220.340427] loop3: p62 size 32768 extends beyond EOD, truncated [ 220.347668] loop3: p63 start 100663296 is beyond EOD, truncated [ 220.354050] loop3: p64 size 32768 extends beyond EOD, truncated [ 220.360944] loop3: p65 start 100663296 is beyond EOD, truncated [ 220.367967] loop3: p66 size 32768 extends beyond EOD, truncated [ 220.375242] loop3: p67 start 100663296 is beyond EOD, truncated [ 220.381513] loop3: p68 size 32768 extends beyond EOD, truncated [ 220.388917] loop3: p69 start 100663296 is beyond EOD, truncated [ 220.395758] loop3: p70 size 32768 extends beyond EOD, truncated [ 220.403337] loop3: p71 start 100663296 is beyond EOD, truncated [ 220.409430] loop3: p72 size 32768 extends beyond EOD, truncated [ 220.416757] loop3: p73 start 100663296 is beyond EOD, truncated [ 220.422930] loop3: p74 size 32768 extends beyond EOD, truncated [ 220.429976] loop3: p75 start 100663296 is beyond EOD, truncated [ 220.436462] loop3: p76 size 32768 extends beyond EOD, truncated [ 220.443744] loop3: p77 start 100663296 is beyond EOD, truncated [ 220.449833] loop3: p78 size 32768 extends beyond EOD, truncated [ 220.456929] loop3: p79 start 100663296 is beyond EOD, truncated [ 220.463208] loop3: p80 size 32768 extends beyond EOD, truncated [ 220.470086] loop3: p81 start 100663296 is beyond EOD, truncated [ 220.476255] loop3: p82 size 32768 extends beyond EOD, truncated [ 220.483324] loop3: p83 start 100663296 is beyond EOD, truncated [ 220.489705] loop3: p84 size 32768 extends beyond EOD, truncated [ 220.497116] loop3: p85 start 100663296 is beyond EOD, truncated [ 220.503934] loop3: p86 size 32768 extends beyond EOD, truncated [ 220.510798] loop3: p87 start 100663296 is beyond EOD, truncated [ 220.517138] loop3: p88 size 32768 extends beyond EOD, truncated [ 220.525098] loop3: p89 start 100663296 is beyond EOD, truncated [ 220.531177] loop3: p90 size 32768 extends beyond EOD, truncated [ 220.538229] loop3: p91 start 100663296 is beyond EOD, truncated [ 220.544522] loop3: p92 size 32768 extends beyond EOD, truncated [ 220.551345] loop3: p93 start 100663296 is beyond EOD, truncated [ 220.557767] loop3: p94 size 32768 extends beyond EOD, truncated [ 220.564966] loop3: p95 start 100663296 is beyond EOD, truncated [ 220.571049] loop3: p96 size 32768 extends beyond EOD, truncated [ 220.578133] loop3: p97 start 100663296 is beyond EOD, truncated [ 220.584290] loop3: p98 size 32768 extends beyond EOD, truncated [ 220.591181] loop3: p99 start 100663296 is beyond EOD, truncated [ 220.598819] loop3: p100 size 32768 extends beyond EOD, truncated [ 220.606348] loop3: p101 start 100663296 is beyond EOD, truncated [ 220.612605] loop3: p102 size 32768 extends beyond EOD, truncated [ 220.619489] loop3: p103 start 100663296 is beyond EOD, truncated [ 220.625730] loop3: p104 size 32768 extends beyond EOD, truncated [ 220.632895] loop3: p105 start 100663296 is beyond EOD, truncated [ 220.639057] loop3: p106 size 32768 extends beyond EOD, truncated [ 220.646397] loop3: p107 start 100663296 is beyond EOD, truncated [ 220.653385] loop3: p108 size 32768 extends beyond EOD, truncated [ 220.660413] loop3: p109 start 100663296 is beyond EOD, truncated [ 220.666668] loop3: p110 size 32768 extends beyond EOD, truncated [ 220.674428] loop3: p111 start 100663296 is beyond EOD, truncated [ 220.680836] loop3: p112 size 32768 extends beyond EOD, truncated [ 220.688099] loop3: p113 start 100663296 is beyond EOD, truncated [ 220.694456] loop3: p114 size 32768 extends beyond EOD, truncated [ 220.701661] loop3: p115 start 100663296 is beyond EOD, truncated [ 220.707913] loop3: p116 size 32768 extends beyond EOD, truncated [ 220.714953] loop3: p117 start 100663296 is beyond EOD, truncated [ 220.721132] loop3: p118 size 32768 extends beyond EOD, truncated [ 220.728437] loop3: p119 start 100663296 is beyond EOD, truncated [ 220.734668] loop3: p120 size 32768 extends beyond EOD, truncated [ 220.741579] loop3: p121 start 100663296 is beyond EOD, truncated [ 220.747808] loop3: p122 size 32768 extends beyond EOD, truncated [ 220.755547] loop3: p123 start 100663296 is beyond EOD, truncated [ 220.761723] loop3: p124 size 32768 extends beyond EOD, truncated [ 220.769011] loop3: p125 start 100663296 is beyond EOD, truncated [ 220.775276] loop3: p126 size 32768 extends beyond EOD, truncated [ 220.782225] loop3: p127 start 100663296 is beyond EOD, truncated [ 220.789298] loop3: p128 size 32768 extends beyond EOD, truncated [ 220.796462] loop3: p129 start 100663296 is beyond EOD, truncated [ 220.802805] loop3: p130 size 32768 extends beyond EOD, truncated [ 220.809910] loop3: p131 start 100663296 is beyond EOD, truncated [ 220.816162] loop3: p132 size 32768 extends beyond EOD, truncated [ 220.823426] loop3: p133 start 100663296 is beyond EOD, truncated [ 220.829601] loop3: p134 size 32768 extends beyond EOD, truncated [ 220.837249] loop3: p135 start 100663296 is beyond EOD, truncated [ 220.843518] loop3: p136 size 32768 extends beyond EOD, truncated [ 220.850484] loop3: p137 start 100663296 is beyond EOD, truncated [ 220.856711] loop3: p138 size 32768 extends beyond EOD, truncated [ 220.863993] loop3: p139 start 100663296 is beyond EOD, truncated [ 220.870210] loop3: p140 size 32768 extends beyond EOD, truncated [ 220.877572] loop3: p141 start 100663296 is beyond EOD, truncated [ 220.884016] loop3: p142 size 32768 extends beyond EOD, truncated [ 220.891190] loop3: p143 start 100663296 is beyond EOD, truncated [ 220.897433] loop3: p144 size 32768 extends beyond EOD, truncated [ 220.904736] loop3: p145 start 100663296 is beyond EOD, truncated [ 220.910990] loop3: p146 size 32768 extends beyond EOD, truncated [ 220.918911] loop3: p147 start 100663296 is beyond EOD, truncated [ 220.925173] loop3: p148 size 32768 extends beyond EOD, truncated [ 220.932118] loop3: p149 start 100663296 is beyond EOD, truncated [ 220.938370] loop3: p150 size 32768 extends beyond EOD, truncated [ 220.945680] loop3: p151 start 100663296 is beyond EOD, truncated [ 220.951854] loop3: p152 size 32768 extends beyond EOD, truncated [ 220.959111] loop3: p153 start 100663296 is beyond EOD, truncated [ 220.965404] loop3: p154 size 32768 extends beyond EOD, truncated [ 220.972955] loop3: p155 start 100663296 is beyond EOD, truncated [ 220.979158] loop3: p156 size 32768 extends beyond EOD, truncated [ 220.986695] loop3: p157 start 100663296 is beyond EOD, truncated [ 220.993403] loop3: p158 size 32768 extends beyond EOD, truncated [ 221.000573] loop3: p159 start 100663296 is beyond EOD, truncated [ 221.006973] loop3: p160 size 32768 extends beyond EOD, truncated [ 221.014308] loop3: p161 start 100663296 is beyond EOD, truncated [ 221.020487] loop3: p162 size 32768 extends beyond EOD, truncated [ 221.027642] loop3: p163 start 100663296 is beyond EOD, truncated [ 221.034048] loop3: p164 size 32768 extends beyond EOD, truncated [ 221.041134] loop3: p165 start 100663296 is beyond EOD, truncated [ 221.048009] loop3: p166 size 32768 extends beyond EOD, truncated [ 221.055876] loop3: p167 start 100663296 is beyond EOD, truncated [ 221.062161] loop3: p168 size 32768 extends beyond EOD, truncated [ 221.070708] loop3: p169 start 100663296 is beyond EOD, truncated [ 221.078264] loop3: p170 size 32768 extends beyond EOD, truncated [ 221.085674] loop3: p171 start 100663296 is beyond EOD, truncated [ 221.091976] loop3: p172 size 32768 extends beyond EOD, truncated [ 221.099498] loop3: p173 start 100663296 is beyond EOD, truncated [ 221.106189] loop3: p174 size 32768 extends beyond EOD, truncated [ 221.113525] loop3: p175 start 100663296 is beyond EOD, truncated [ 221.119788] loop3: p176 size 32768 extends beyond EOD, truncated [ 221.127044] loop3: p177 start 100663296 is beyond EOD, truncated [ 221.133306] loop3: p178 size 32768 extends beyond EOD, truncated [ 221.140404] loop3: p179 start 100663296 is beyond EOD, truncated [ 221.146701] loop3: p180 size 32768 extends beyond EOD, truncated [ 221.154577] loop3: p181 start 100663296 is beyond EOD, truncated [ 221.160861] loop3: p182 size 32768 extends beyond EOD, truncated [ 221.168424] loop3: p183 start 100663296 is beyond EOD, truncated [ 221.174691] loop3: p184 size 32768 extends beyond EOD, truncated [ 221.181674] loop3: p185 start 100663296 is beyond EOD, truncated [ 221.188009] loop3: p186 size 32768 extends beyond EOD, truncated [ 221.195534] loop3: p187 start 100663296 is beyond EOD, truncated [ 221.201752] loop3: p188 size 32768 extends beyond EOD, truncated [ 221.208985] loop3: p189 start 100663296 is beyond EOD, truncated [ 221.215391] loop3: p190 size 32768 extends beyond EOD, truncated [ 221.222479] loop3: p191 start 100663296 is beyond EOD, truncated [ 221.228749] loop3: p192 size 32768 extends beyond EOD, truncated [ 221.237246] loop3: p193 start 100663296 is beyond EOD, truncated [ 221.243567] loop3: p194 size 32768 extends beyond EOD, truncated [ 221.250693] loop3: p195 start 100663296 is beyond EOD, truncated [ 221.256976] loop3: p196 size 32768 extends beyond EOD, truncated [ 221.264092] loop3: p197 start 100663296 is beyond EOD, truncated [ 221.270605] loop3: p198 size 32768 extends beyond EOD, truncated [ 221.277996] loop3: p199 start 100663296 is beyond EOD, truncated [ 221.284622] loop3: p200 size 32768 extends beyond EOD, truncated [ 221.291699] loop3: p201 start 100663296 is beyond EOD, truncated [ 221.298457] loop3: p202 size 32768 extends beyond EOD, truncated [ 221.306009] loop3: p203 start 100663296 is beyond EOD, truncated [ 221.312698] loop3: p204 size 32768 extends beyond EOD, truncated [ 221.319895] loop3: p205 start 100663296 is beyond EOD, truncated [ 221.326308] loop3: p206 size 32768 extends beyond EOD, truncated [ 221.333543] loop3: p207 start 100663296 is beyond EOD, truncated [ 221.339753] loop3: p208 size 32768 extends beyond EOD, truncated [ 221.347021] loop3: p209 start 100663296 is beyond EOD, truncated [ 221.353305] loop3: p210 size 32768 extends beyond EOD, truncated [ 221.360371] loop3: p211 start 100663296 is beyond EOD, truncated [ 221.366874] loop3: p212 size 32768 extends beyond EOD, truncated [ 221.374046] loop3: p213 start 100663296 is beyond EOD, truncated [ 221.380601] loop3: p214 size 32768 extends beyond EOD, truncated [ 221.389797] loop3: p215 start 100663296 is beyond EOD, truncated [ 221.396733] loop3: p216 size 32768 extends beyond EOD, truncated [ 221.404245] loop3: p217 start 100663296 is beyond EOD, truncated [ 221.410417] loop3: p218 size 32768 extends beyond EOD, truncated [ 221.417851] loop3: p219 start 100663296 is beyond EOD, truncated [ 221.424348] loop3: p220 size 32768 extends beyond EOD, truncated [ 221.431310] loop3: p221 start 100663296 is beyond EOD, truncated [ 221.437747] loop3: p222 size 32768 extends beyond EOD, truncated [ 221.445029] loop3: p223 start 100663296 is beyond EOD, truncated [ 221.451355] loop3: p224 size 32768 extends beyond EOD, truncated [ 221.459008] loop3: p225 start 100663296 is beyond EOD, truncated [ 221.465464] loop3: p226 size 32768 extends beyond EOD, truncated [ 221.473785] loop3: p227 start 100663296 is beyond EOD, truncated [ 221.480236] loop3: p228 size 32768 extends beyond EOD, truncated [ 221.488007] loop3: p229 start 100663296 is beyond EOD, truncated [ 221.494522] loop3: p230 size 32768 extends beyond EOD, truncated [ 221.501516] loop3: p231 start 100663296 is beyond EOD, truncated [ 221.508111] loop3: p232 size 32768 extends beyond EOD, truncated [ 221.516070] loop3: p233 start 100663296 is beyond EOD, truncated [ 221.522425] loop3: p234 size 32768 extends beyond EOD, truncated [ 221.529399] loop3: p235 start 100663296 is beyond EOD, truncated [ 221.535912] loop3: p236 size 32768 extends beyond EOD, truncated [ 221.543226] loop3: p237 start 100663296 is beyond EOD, truncated [ 221.549398] loop3: p238 size 32768 extends beyond EOD, truncated [ 221.557131] loop3: p239 start 100663296 is beyond EOD, truncated [ 221.563395] loop3: p240 size 32768 extends beyond EOD, truncated [ 221.570477] loop3: p241 start 100663296 is beyond EOD, truncated [ 221.576771] loop3: p242 size 32768 extends beyond EOD, truncated [ 221.584546] loop3: p243 start 100663296 is beyond EOD, truncated [ 221.590940] loop3: p244 size 32768 extends beyond EOD, truncated [ 221.598257] loop3: p245 start 100663296 is beyond EOD, truncated [ 221.604598] loop3: p246 size 32768 extends beyond EOD, truncated [ 221.611693] loop3: p247 start 100663296 is beyond EOD, truncated [ 221.617951] loop3: p248 size 32768 extends beyond EOD, truncated [ 221.625022] loop3: p249 start 100663296 is beyond EOD, truncated [ 221.631331] loop3: p250 size 32768 extends beyond EOD, truncated [ 221.639143] loop3: p251 start 100663296 is beyond EOD, truncated [ 221.645405] loop3: p252 size 32768 extends beyond EOD, truncated [ 221.652495] loop3: p253 start 100663296 is beyond EOD, truncated [ 221.658672] loop3: p254 size 32768 extends beyond EOD, truncated 11:38:41 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video32\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000400)={0xa, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 11:38:41 executing program 5: creat(0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getegid() fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:38:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000280)={0x0, 0x0, @ioapic={0x729d0213259a469e}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:38:41 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) 11:38:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ftruncate(r2, 0x2081ff) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) fcntl$setstatus(r3, 0x4, 0x46600) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0x6}) 11:38:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) recvmmsg(r2, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 221.665869] loop3: p255 start 100663296 is beyond EOD, truncated 11:38:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) [ 221.805376] kvm: pic: non byte read [ 221.821734] kvm: pic: non byte write 11:38:41 executing program 5: getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f00000002c0)={0xa, 0x8f}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:38:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ftruncate(r3, 0x81fd) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendfile(r1, r2, &(0x7f00000000c0), 0x8000fffffffe) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) 11:38:42 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x100000000000012) sendmmsg$inet(r0, &(0x7f0000000380)=[{{&(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000002640)=[{&(0x7f00000000c0)="a2", 0x1}], 0x1}}], 0x1, 0x0) 11:38:42 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x802000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x220f1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) open(0x0, 0x0, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 11:38:42 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) semop(0x0, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) [ 222.090734] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:38:42 executing program 3: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xfb3f) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xc00000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0xffffff7b, r2, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xca}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x24}}, 0x4ec41) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x44, r2, 0xa4bc5563636a9eb6, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x49629497931d2b83}, 0x40080) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000680)={0x7, 0x21, 0x2}, 0x7) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/96, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x18c) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000003c0)={0x5, &(0x7f0000000380)=[{0x5}, {0x3, 0x200}, {0x0, 0x5}, {0x8}, {0x308, 0x53ec}]}) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000080)=0x25, 0x4) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$packet_int(r5, 0x107, 0x14, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80e85411, &(0x7f0000000400)=""/102) getdents(0xffffffffffffffff, &(0x7f00000000c0)=""/31, 0x77c) msgctl$IPC_INFO(0x0, 0x3, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) 11:38:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xffffff19, 0xfffffefffffffffe, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) 11:38:42 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x102}) getresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x1f, 0x7, 0x0, 'queue1\x00', 0x4}) open(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) pipe(0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, 0xffffffffffffffff, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x10180, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, 0x0, 0x0) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x20000, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="ffd934aa54cdfc15009c5b7213f6012f66b000000000e00700ffffffff816f00000062c3a119ff2e9374f021566ecabd3d9ca9d6171079c1998bfe5d315f3685d430665a14067fef7fbe2d40000000000000000000005d78df18f57a8ac75f3e9ca77b4db77b74412c65365d3d"], 0x6d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fff) ioctl$DRM_IOCTL_AUTH_MAGIC(r5, 0x40046411, &(0x7f0000000200)=0xff) geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) 11:38:42 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) 11:38:42 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000001b80)={0xfffffffffffffd9a}, 0x14) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000800)="371d848c24591792863b2d5d6bc3c76a000001000000000079e6ae1a07de1d42fd46fdfada485aaea1cda588838353786b2ff4f7b644e0839054fcd3486dfe9795b35eae35042b0ae441065b6570a16e9f59424cf705c5958d33fbfcec4080876e65ccb6cc4a9a8e6a0f46559eb725fdab41865ab93895a77a3e494f920e9617dc006dcbe35e9ff7112f2a58bbd9f7123b6661186821900b092f90a53e27d726e56671cc23bf1472b65c3131051de54ab9b1fe6b7b515163790da97ebdaf688dc5b30aed84cbb5c86c3c0a64548106e6a4bfd61442897160333d8ad0b914906fb8839422a3", 0x2c84e1972a71ed36, 0x0, 0x0, 0xffffffe4}]) semget$private(0x0, 0x0, 0x0) 11:38:42 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = creat(0x0, 0x44) tkill(0x0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000240)={0x9, 0x2}) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = accept4(r0, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x80, 0x800) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r5, 0x12, 0x2, &(0x7f00000002c0)=""/104, &(0x7f0000000140)=0x68) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$P9_RFLUSH(r6, &(0x7f0000000340)={0xffffffffffffffbc}, 0x12a) ioctl$DRM_IOCTL_ADD_MAP(r6, 0xc0286415, &(0x7f0000000380)={0x0, 0xb4, 0x4, 0x4, &(0x7f0000ffc000/0x2000)=nil, 0x1}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x0, 0x0) r7 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r7, 0x1000000000013) 11:38:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmmsg$nfc_llcp(r2, &(0x7f0000001080)=[{0x0, 0x0, 0x0}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000d80)=[{{&(0x7f0000000000)=@l2, 0x80, 0x0, 0x0, &(0x7f0000001c80)=""/4096, 0x1000}}, {{0x0, 0x0, &(0x7f00000007c0)=[{0x0}, {0x0}], 0x2}}], 0x2, 0x2, 0x0) 11:38:42 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) [ 222.990297] audit: type=1804 audit(1573385923.018:45): pid=7971 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir548130106/syzkaller.cxXo8d/9/bus" dev="sda1" ino=16564 res=1 11:38:43 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) [ 223.271249] audit: type=1804 audit(1573385923.018:46): pid=7955 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir548130106/syzkaller.cxXo8d/9/bus" dev="sda1" ino=16564 res=1 11:38:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) alarm(0x0) 11:38:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) socket(0x400000000000010, 0x802, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000080)={@multicast2, @multicast2}, 0xc) [ 223.659767] audit: type=1804 audit(1573385923.118:47): pid=7939 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir171031459/syzkaller.bXQe8E/5/file0/file0" dev="sda1" ino=16560 res=1 11:38:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() semget$private(0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) dup(0xffffffffffffffff) 11:38:43 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() getpid() r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:44 executing program 5: r0 = socket(0x10, 0x80002, 0x0) write(r0, &(0x7f0000000340)="2600000022004701050000000000000005006d20002b5fee839cd53400b017ca5b0000000000", 0x26) [ 224.091391] audit: type=1804 audit(1573385923.278:48): pid=7971 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir548130106/syzkaller.cxXo8d/9/bus" dev="sda1" ino=16564 res=1 [ 224.340452] audit: type=1804 audit(1573385923.288:49): pid=7971 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir548130106/syzkaller.cxXo8d/9/bus" dev="sda1" ino=16564 res=1 11:38:44 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x102}) getresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x1f, 0x7, 0x0, 'queue1\x00', 0x4}) open(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) pipe(0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, 0xffffffffffffffff, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x10180, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, 0x0, 0x0) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x20000, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="ffd934aa54cdfc15009c5b7213f6012f66b000000000e00700ffffffff816f00000062c3a119ff2e9374f021566ecabd3d9ca9d6171079c1998bfe5d315f3685d430665a14067fef7fbe2d40000000000000000000005d78df18f57a8ac75f3e9ca77b4db77b74412c65365d3d"], 0x6d) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fff) ioctl$DRM_IOCTL_AUTH_MAGIC(r5, 0x40046411, &(0x7f0000000200)=0xff) geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) 11:38:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000240)={0xffff, 0x0, 0x1000}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 11:38:44 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:44 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=@newsa={0x138, 0x10, 0xd99b919c2adf351f, 0x0, 0x0, {{@in, @in6=@loopback}, {@in6, 0x0, 0x33}, @in=@empty, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x24}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 11:38:44 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x80000000000000bd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r1) [ 224.765283] audit: type=1400 audit(1573385924.798:50): avc: denied { name_connect } for pid=8126 comm="syz-executor.3" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 11:38:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = memfd_create(&(0x7f0000000180)='vmnet0ppp0@!lo\'\x00', 0x5) dup3(r2, r3, 0x0) 11:38:44 executing program 5: 11:38:45 executing program 3: 11:38:45 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:45 executing program 5: [ 225.152594] protocol 88fb is buggy, dev hsr_slave_0 [ 225.157912] protocol 88fb is buggy, dev hsr_slave_1 11:38:45 executing program 3: [ 225.312359] protocol 88fb is buggy, dev hsr_slave_0 [ 225.317553] protocol 88fb is buggy, dev hsr_slave_1 11:38:46 executing program 1: 11:38:46 executing program 3: 11:38:46 executing program 5: ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast2, @in=@initdev}}, {{@in6}, 0x0, @in6=@initdev}}, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000980)=""/34) 11:38:46 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:46 executing program 4: 11:38:46 executing program 2: 11:38:46 executing program 4: 11:38:46 executing program 3: 11:38:46 executing program 2: 11:38:46 executing program 5: 11:38:46 executing program 1: 11:38:46 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:46 executing program 4: 11:38:46 executing program 3: 11:38:46 executing program 2: 11:38:46 executing program 5: 11:38:47 executing program 3: 11:38:47 executing program 1: 11:38:47 executing program 2: 11:38:47 executing program 4: 11:38:47 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:47 executing program 5: 11:38:47 executing program 5: 11:38:47 executing program 3: 11:38:47 executing program 4: 11:38:47 executing program 1: 11:38:47 executing program 2: 11:38:47 executing program 5: 11:38:47 executing program 3: 11:38:47 executing program 4: 11:38:47 executing program 5: 11:38:47 executing program 2: 11:38:47 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:47 executing program 1: 11:38:47 executing program 3: 11:38:47 executing program 5: 11:38:47 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) ftruncate(r0, 0x48280) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000017000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000018000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x23, 0x700, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 11:38:47 executing program 4: 11:38:47 executing program 1: 11:38:47 executing program 0: r0 = syz_open_dev$video(0x0, 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:47 executing program 4: 11:38:47 executing program 3: 11:38:47 executing program 1: 11:38:47 executing program 5: 11:38:47 executing program 4: [ 227.773872] audit: type=1804 audit(1573385927.808:51): pid=8364 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir139802962/syzkaller.iU3grr/17/bus" dev="sda1" ino=16603 res=1 11:38:47 executing program 1: 11:38:47 executing program 3: 11:38:47 executing program 0: r0 = syz_open_dev$video(0x0, 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:48 executing program 2: 11:38:48 executing program 1: 11:38:48 executing program 5: 11:38:48 executing program 4: 11:38:48 executing program 3: 11:38:48 executing program 0: r0 = syz_open_dev$video(0x0, 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) [ 228.080769] audit: type=1804 audit(1573385928.108:52): pid=8359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir139802962/syzkaller.iU3grr/17/bus" dev="sda1" ino=16603 res=1 11:38:48 executing program 3: 11:38:48 executing program 4: 11:38:48 executing program 1: 11:38:48 executing program 5: 11:38:48 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:48 executing program 2: 11:38:48 executing program 4: 11:38:48 executing program 5: 11:38:48 executing program 1: 11:38:48 executing program 3: 11:38:48 executing program 1: 11:38:48 executing program 3: 11:38:48 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:48 executing program 2: 11:38:48 executing program 4: 11:38:48 executing program 5: 11:38:48 executing program 4: 11:38:48 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:48 executing program 3: 11:38:48 executing program 2: 11:38:48 executing program 1: 11:38:48 executing program 5: 11:38:48 executing program 4: 11:38:48 executing program 2: 11:38:48 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:48 executing program 3: 11:38:48 executing program 1: 11:38:48 executing program 5: 11:38:49 executing program 2: 11:38:49 executing program 4: 11:38:49 executing program 1: 11:38:49 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:49 executing program 3: 11:38:49 executing program 2: 11:38:49 executing program 5: 11:38:49 executing program 4: 11:38:49 executing program 2: 11:38:49 executing program 3: 11:38:49 executing program 1: 11:38:49 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:49 executing program 5: 11:38:49 executing program 4: 11:38:49 executing program 2: 11:38:49 executing program 1: 11:38:49 executing program 3: 11:38:49 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, 0x0, 0x0, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:49 executing program 5: 11:38:49 executing program 2: timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = gettid() r1 = inotify_init1(0x0) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1) r2 = getpid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f0000000000)=""/7, 0x57b}], 0x1000000000000102, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x30b, 0x0) tkill(r0, 0x1000000000000014) 11:38:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000003000/0x18000)=nil, &(0x7f00000008c0)=[@textreal={0x8, &(0x7f0000000240)="66b8000000000f23c00f21f8663503000d000f23f80f01c3660fdb7705f30f092e6fbaf80c66b85841958866efbafc0c66b81c00000066efbaf80c66b882938a8c66efbafc0cb80a00ef660f38826d8036660f382a130f01ca"}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:38:49 executing program 3: 11:38:49 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) flock(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 11:38:49 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, 0x0, 0x0, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:49 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:49 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() getpid() r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:49 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) 11:38:49 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, 0x0, 0x0, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() getpid() r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800), 0x0, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() getpid() r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800), 0x0, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() getpid() r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) 11:38:50 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800), 0x0, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000001ac0)) 11:38:50 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(twofish)\x00'}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getpid() r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x84f6f96cdc1ea4c5, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, 0x0) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000001ac0)) [ 382.112504] INFO: task syz-executor.3:8533 blocked for more than 140 seconds. [ 382.119941] Not tainted 4.19.82 #0 [ 382.125472] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 382.133507] syz-executor.3 D28216 8533 7584 0x00000004 [ 382.139149] Call Trace: [ 382.141801] __schedule+0x866/0x1dc0 [ 382.145590] ? pci_mmcfg_check_reserved+0x170/0x170 [ 382.150696] ? mark_held_locks+0x100/0x100 [ 382.154985] ? __lock_is_held+0xb6/0x140 [ 382.159054] schedule+0x92/0x1c0 [ 382.162472] schedule_timeout+0x8c8/0xfc0 [ 382.166631] ? wait_for_completion+0x294/0x440 [ 382.171211] ? find_held_lock+0x35/0x130 [ 382.175387] ? usleep_range+0x170/0x170 [ 382.179374] ? _raw_spin_unlock_irq+0x28/0x90 [ 382.183931] ? wait_for_completion+0x294/0x440 [ 382.188518] ? _raw_spin_unlock_irq+0x28/0x90 [ 382.193325] ? lockdep_hardirqs_on+0x415/0x5d0 [ 382.197991] ? trace_hardirqs_on+0x67/0x220 [ 382.202428] ? kasan_check_read+0x11/0x20 [ 382.206609] wait_for_completion+0x29c/0x440 [ 382.211076] ? try_to_wake_up+0xcc/0xf50 [ 382.215303] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 382.221111] ? wake_up_q+0x100/0x100 [ 382.224959] kthread_stop+0x116/0x6c0 [ 382.228842] vivid_stop_generating_vid_cap+0x1e0/0x6e2 [ 382.234225] ? _vb2_fop_release+0x3f/0x2a0 [ 382.238574] vid_cap_stop_streaming+0x8a/0xe0 [ 382.243140] ? vid_cap_buf_queue+0x280/0x280 [ 382.247566] __vb2_queue_cancel+0xb1/0x790 [ 382.251801] ? lock_downgrade+0x880/0x880 [ 382.256609] ? v4l2_fh_is_singular+0xff/0x160 [ 382.261111] vb2_core_streamoff+0x60/0x150 [ 382.265425] __vb2_cleanup_fileio+0x78/0x170 [ 382.269840] vb2_core_queue_release+0x20/0x80 [ 382.274517] _vb2_fop_release+0x1cf/0x2a0 [ 382.278669] vb2_fop_release+0x75/0xc0 [ 382.282620] vivid_fop_release+0x18e/0x430 [ 382.286871] ? vivid_remove+0x460/0x460 [ 382.290841] ? dev_debug_store+0x110/0x110 [ 382.295122] v4l2_release+0xf9/0x1a0 [ 382.298896] __fput+0x2dd/0x8b0 [ 382.302221] ____fput+0x16/0x20 [ 382.305579] task_work_run+0x145/0x1c0 [ 382.309495] exit_to_usermode_loop+0x273/0x2c0 [ 382.314258] do_syscall_64+0x53d/0x620 [ 382.318168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.323432] RIP: 0033:0x413db1 [ 382.326634] Code: c0 c3 0f 1f 80 00 00 00 00 c7 07 00 00 00 00 31 c0 c3 0f 1f 80 00 00 00 00 31 c0 c3 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 b8 <2d> f8 ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 31 c0 c3 66 66 66 66 [ 382.345604] RSP: 002b:00007ffd49fbc6d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 382.353353] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413db1 [ 382.360742] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 382.368074] RBP: 0000000000000001 R08: ffffffff81009b8b R09: 00000000b38c8ba9 [ 382.375390] R10: 00007ffd49fbc7b0 R11: 0000000000000293 R12: 000000000075c9a0 [ 382.383462] R13: 000000000075c9a0 R14: 0000000000760da0 R15: 000000000075bfd4 [ 382.390760] ? prepare_exit_to_usermode+0x1eb/0x2f0 [ 382.395893] [ 382.395893] Showing all locks held in the system: [ 382.402227] 1 lock held by khungtaskd/1036: [ 382.406596] #0: 000000003eb0d385 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 382.415295] 1 lock held by rsyslogd/7410: [ 382.419432] #0: 0000000045932f46 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 382.427412] 2 locks held by getty/7533: [ 382.431385] #0: 0000000063841ae9 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 382.439719] #1: 000000007feef746 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 382.448745] 2 locks held by getty/7534: [ 382.452743] #0: 00000000ef872f5b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 382.461060] #1: 000000003b7fbd87 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 382.470039] 2 locks held by getty/7535: [ 382.474074] #0: 000000004c10c938 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 382.482391] #1: 00000000e08d800f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 382.491292] 2 locks held by getty/7536: [ 382.495304] #0: 00000000f647933b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 382.503647] #1: 00000000b6faed81 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 382.513187] 2 locks held by getty/7537: [ 382.517163] #0: 0000000012f582d8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 382.525471] #1: 00000000c2c45cb4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 382.534362] 2 locks held by getty/7538: [ 382.538348] #0: 00000000d03dd2ef (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 382.546646] #1: 00000000f230d680 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 382.555557] 2 locks held by getty/7539: [ 382.559513] #0: 0000000049077aaf (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 382.567809] #1: 000000003d43f94e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b30 [ 382.576730] [ 382.578340] ============================================= [ 382.578340] [ 382.585394] NMI backtrace for cpu 0 [ 382.589024] CPU: 0 PID: 1036 Comm: khungtaskd Not tainted 4.19.82 #0 [ 382.595496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.604837] Call Trace: [ 382.607508] dump_stack+0x172/0x1f0 [ 382.611123] nmi_cpu_backtrace.cold+0x63/0xa4 [ 382.615644] ? lapic_can_unplug_cpu.cold+0x47/0x47 [ 382.620562] nmi_trigger_cpumask_backtrace+0x1b0/0x1f8 [ 382.625833] arch_trigger_cpumask_backtrace+0x14/0x20 [ 382.631047] watchdog+0x9df/0xee0 [ 382.634553] kthread+0x354/0x420 [ 382.637908] ? reset_hung_task_detector+0x30/0x30 [ 382.642766] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 382.648300] ret_from_fork+0x24/0x30 [ 382.652146] Sending NMI from CPU 0 to CPUs 1: [ 382.656724] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0xe/0x10 [ 382.658819] Kernel panic - not syncing: hung_task: blocked tasks [ 382.670430] CPU: 0 PID: 1036 Comm: khungtaskd Not tainted 4.19.82 #0 [ 382.676919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.686274] Call Trace: [ 382.688917] dump_stack+0x172/0x1f0 [ 382.692594] panic+0x26a/0x50e [ 382.695777] ? __warn_printk+0xf3/0xf3 [ 382.699690] ? lapic_can_unplug_cpu.cold+0x47/0x47 [ 382.704620] ? ___preempt_schedule+0x16/0x18 [ 382.709084] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 382.714533] ? nmi_trigger_cpumask_backtrace+0x1c1/0x1f8 [ 382.719978] ? nmi_trigger_cpumask_backtrace+0x1cb/0x1f8 [ 382.725431] ? nmi_trigger_cpumask_backtrace+0x165/0x1f8 [ 382.730876] watchdog+0x9f0/0xee0 [ 382.734322] kthread+0x354/0x420 [ 382.737672] ? reset_hung_task_detector+0x30/0x30 [ 382.742507] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 382.748039] ret_from_fork+0x24/0x30 [ 382.753317] Kernel Offset: disabled [ 382.756952] Rebooting in 86400 seconds..