[info] Using makefile-style concurrent boot in runlevel 2. [ 23.857488] audit: type=1800 audit(1540487295.103:21): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 23.885578] audit: type=1800 audit(1540487295.113:22): pid=5174 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts. 2018/10/25 17:08:27 fuzzer started 2018/10/25 17:08:28 dialing manager at 10.128.0.26:36343 2018/10/25 17:08:29 syscalls: 1 2018/10/25 17:08:29 code coverage: enabled 2018/10/25 17:08:29 comparison tracing: enabled 2018/10/25 17:08:29 setuid sandbox: enabled 2018/10/25 17:08:29 namespace sandbox: enabled 2018/10/25 17:08:29 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/25 17:08:29 fault injection: enabled 2018/10/25 17:08:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/25 17:08:29 net packed injection: enabled 2018/10/25 17:08:29 net device setup: enabled 17:11:35 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'team0\x00', &(0x7f0000000300)=@ethtool_eeprom={0x24}}) close(r1) syzkaller login: [ 224.657184] IPVS: ftp: loaded support on port[0] = 21 17:11:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000057fee)='/dev/input/event#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42c00) [ 224.904605] IPVS: ftp: loaded support on port[0] = 21 17:11:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000140)={0x0, 0x2000000001, 0x0, &(0x7f0000000300)}) [ 225.368344] IPVS: ftp: loaded support on port[0] = 21 17:11:37 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x400448df, &(0x7f0000000140)) [ 225.895122] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.918910] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.938834] device bridge_slave_0 entered promiscuous mode [ 225.995776] IPVS: ftp: loaded support on port[0] = 21 [ 226.041697] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.055290] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.063625] device bridge_slave_1 entered promiscuous mode [ 226.182359] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 17:11:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000140), 0x20010000) [ 226.282699] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.335762] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.359121] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.366549] device bridge_slave_0 entered promiscuous mode [ 226.497461] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.527909] IPVS: ftp: loaded support on port[0] = 21 [ 226.539346] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.546889] device bridge_slave_1 entered promiscuous mode [ 226.697757] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 17:11:38 executing program 5: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc028660f) [ 226.771739] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.838975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 226.909212] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.990372] IPVS: ftp: loaded support on port[0] = 21 [ 227.082979] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 227.091399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.295905] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.430857] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.590473] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 227.599966] team0: Port device team_slave_0 added [ 227.610427] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.620428] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.638985] device bridge_slave_0 entered promiscuous mode [ 227.649623] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 227.656460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.723984] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 227.740441] team0: Port device team_slave_1 added [ 227.808976] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.815383] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.838501] device bridge_slave_1 entered promiscuous mode [ 227.862787] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 227.931583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.943734] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.962166] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 228.055263] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.069049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.076988] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.145690] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.156464] team0: Port device team_slave_0 added [ 228.165308] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 228.188481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.206573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.229705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.302525] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.315640] team0: Port device team_slave_1 added [ 228.361918] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.377303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.386918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.459615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.543561] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.559051] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.566448] device bridge_slave_0 entered promiscuous mode [ 228.606838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.635527] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 228.693344] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 228.712373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.720757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.757429] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 228.772296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.787533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.799320] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.805689] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.821365] device bridge_slave_1 entered promiscuous mode [ 228.830791] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 228.958045] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.970572] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.977895] device bridge_slave_0 entered promiscuous mode [ 228.986949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 229.000833] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.031864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.088397] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.112565] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.120098] device bridge_slave_1 entered promiscuous mode [ 229.138464] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 229.154172] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 229.175388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.192281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.289426] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 229.296632] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.309539] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.320716] device bridge_slave_0 entered promiscuous mode [ 229.450772] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.457158] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.470033] device bridge_slave_1 entered promiscuous mode [ 229.606477] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 229.614761] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 229.639749] team0: Port device team_slave_0 added [ 229.669003] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 229.681320] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.756186] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 229.800380] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.827113] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.833636] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.840570] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.846932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.856388] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 229.870300] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 229.889895] team0: Port device team_slave_1 added [ 229.900221] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 229.949457] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 229.956741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.009882] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.016842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.037800] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.050633] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 230.059828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 230.093050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.107815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.141857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 230.148701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.159650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.169308] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.278199] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.302416] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.319729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.334800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.439523] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.446697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.459751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.491713] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.498104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.504832] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.511247] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.522574] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 230.563639] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.579679] team0: Port device team_slave_0 added [ 230.660224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.669179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.694837] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.702651] team0: Port device team_slave_0 added [ 230.711184] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.721233] team0: Port device team_slave_1 added [ 230.839875] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 230.846735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.864542] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.885599] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.899586] team0: Port device team_slave_1 added [ 230.907562] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.928669] team0: Port device team_slave_0 added [ 230.968042] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 230.993301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.003056] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.040273] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 231.060366] team0: Port device team_slave_1 added [ 231.067821] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 231.090434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.098300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.128663] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.149140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.165657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.191604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 231.199379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 231.230254] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.246461] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 231.264345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.282852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.302106] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 231.328382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.339938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.372981] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.392140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.406878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.429820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.501861] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 231.539156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.549598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.560336] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 231.582086] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.592387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.669587] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 231.676745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.688588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.023056] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.029487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.036154] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.042575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.069698] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.695172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.851902] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.858294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.865030] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.871466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.904755] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 232.965650] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.972454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.979576] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.985955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.010670] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 233.126364] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.132819] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.139593] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.145962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.164619] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 233.729010] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.747141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.769613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.598943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.910524] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.111992] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.434804] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 236.611486] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.625430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 236.649592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.991661] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 236.997846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.006073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.057749] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.147270] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.487099] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.637236] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 237.887887] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.933414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.207830] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 238.229880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.245569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.296951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.336918] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.487565] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.669511] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.732546] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.838460] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 238.851864] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.865588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.910099] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 238.924101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.950102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.185064] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 239.191644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.201310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.382937] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.427581] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.666401] 8021q: adding VLAN 0 to HW filter on device team0 17:11:51 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback}, 0x10) setsockopt(r0, 0x20000100000114, 0xa, &(0x7f00003cbffc)="02000000", 0x4) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f00000000c0)=0x7, 0x4) connect$inet(r0, &(0x7f0000adf000)={0x2, 0x0, @loopback}, 0x10) read(r0, &(0x7f000083b000)=""/1, 0x1) sendmsg$alg(r0, &(0x7f0000159fc8)={0x0, 0x0, &(0x7f0000fc8000), 0x0, &(0x7f0000000e8e)}, 0x0) 17:11:51 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x8, &(0x7f00000000c0)={@local}, &(0x7f0000000100)=0x20) 17:11:51 executing program 0: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_open_dev$audion(&(0x7f0000000780)='/dev/audio#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x2ef, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x457d10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000840)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000800), 0xc, &(0x7f0000000900)={&(0x7f0000000180)=ANY=[]}}, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x4) close(r0) [ 240.510238] sched: DL replenish lagged too much [ 240.550609] hrtimer: interrupt took 38614 ns 17:11:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000100)={0x3}, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 17:11:52 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000100), 0x8) 17:11:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000100)={0x3}, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 17:11:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000100)={0x3}, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 17:11:52 executing program 1: r0 = socket(0x1e, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind(r0, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000afb000)=@generic={0x1e, "0103000000000000000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) close(r0) [ 241.553143] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 17:11:52 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="0204007f0a0000000000000000000000030006000000000002000000e000000100000010000000000200010000000000000000000000000003000500000000000000e00000010000000000000000"], 0x50}}, 0x0) 17:11:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x7, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000080)=0x78) io_setup(0x1000, &(0x7f00000000c0)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000002c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000300)) r4 = gettid() r5 = getpgid(r4) migrate_pages(r5, 0x800, &(0x7f0000000240), &(0x7f0000000280)=0x9) io_getevents(r1, 0x1, 0x1, &(0x7f0000000180)=[{}], &(0x7f0000000200)={r2, r3+10000000}) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/74, 0x4a) 17:11:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x400000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7ff}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000001c0)) 17:11:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000100)={0x3}, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180), 0x8}) 17:11:53 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x5, 0x18002) ioctl$KIOCSOUND(r1, 0x4b2f, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r3 = gettid() socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)={0xffffffffffffffff}) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r3, r2, 0x0, 0x12, &(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=r5, 0x4) wait4(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000008c0)=""/153, &(0x7f0000000140)=0x99) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000000c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001780)=ANY=[]) r6 = memfd_create(&(0x7f0000000580)='trusted.overlay.redirect\x00', 0x7) r7 = socket$inet6(0x2, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000080)={@mcast2}, &(0x7f0000000100)=0x14) ptrace$peekuser(0x3, r3, 0x4) vmsplice(r7, &(0x7f0000000200), 0x0, 0x2) kcmp(r3, r3, 0x4, 0xffffffffffffffff, r4) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000003c0), 0xffffffa5) tkill(r3, 0x11) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x1) clock_gettime(0x0, &(0x7f0000000740)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000480)=@assoc_value, &(0x7f0000000980)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) mkdirat(r0, &(0x7f0000000200)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0xf0, 0x0) 17:11:53 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)={0x2, 0xe, 0x800, 0xf, 0xf, 0x0, 0x70bd2b, 0x25dfdbfb, [@sadb_spirange={0x2, 0x10, 0x4d6, 0x4d5}, @sadb_spirange={0x2, 0x10, 0x4d5, 0x4d2}, @sadb_sa={0x2, 0x1, 0x4d3, 0x7, 0x20, 0x8a, 0x0, 0xc0000000}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e21, 0xdad, @dev={0xfe, 0x80, [], 0x1f}, 0x7fffffff}, @in={0x2, 0x4e21, @multicast1}}]}, 0x78}}, 0x20040000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)}}, 0x20) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000300)="6597f29303822def8dc64f12f89519035dffe077d69e8af78b467955e02e71b86342f7a3b770e8803161723cb6434a8ea20b130e9e4491a6c8bde26782f5d28eb41ef62c68ba7fd04da8d2a750fe7dceed17af605e4d1b05d52cdc49eeebca16b3da044a352178a72ba06f966eefde5aca3f5b334d5e405fc30160e1e192e74e4854ba726f937cea8997c3d9b9b3957aa6902d563d112f3599044246c081449e0bb6fc34d59e75d6424bc643a459710e7b092fefef8e931cfbb2ca8314521ed5073343cde33a870a5451e3199558a0df984ecc4be641f57cec65f95134219e363a7d34a1ab5339d2205e3156a0063cd483", 0xf1) close(r0) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000080)=@un=@abs, 0x14, &(0x7f0000000240)=[{&(0x7f0000000280)=""/126, 0x7e}], 0x1, 0x0, 0xfffffe43}, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) 17:11:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000140), 0x20010000) 17:11:53 executing program 0: mknod(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x207f, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000004c0)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000540)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x1}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000580), 0x106, 0x5}}, 0x20) sendmsg$nl_netfilter(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xc4, 0x9, 0xf, 0x800, 0x70bd25, 0x25dfdbfd, {0xf, 0x0, 0x9}, [@nested={0xb0, 0x3d, [@generic="14b0558c9fd55adb9fc9a887f04a0a6f9f4fd2df4a46a4ddd67bd51cb9716482c52006846c483c7d73f7bd32ebbb07c1e6014df2017ff98791c81195a21fdb3ed078413547b20b55", @generic="bd69350dc5bf32fe1f80164f9ae4bd4cb28100d74514fce5983ee1b11f5e09fd817e2f471a8c2c184266ac424a223f982acebdc78e1b1f21e850fbe34c18f9c1fe78eb99a885cb5884a1baaf5b23351eafb08862ea07752f546be38f02cea01ed99e"]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x1}, 0x10) 17:11:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x6, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0x9af8, @mcast1, 0x46}}, [0x2, 0x7f, 0x7, 0x7, 0x9, 0x6, 0x2, 0x0, 0x74, 0x2, 0x3, 0x49c, 0xf8000000000, 0x8, 0x3f]}, &(0x7f0000000100)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0x5, 0x30}, 0xc) 17:11:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000140), 0x20010000) 17:11:53 executing program 0: r0 = socket$inet(0x10, 0x3, 0x101) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x56, 0x1) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @multicast2}, 0x0, 0x1, 0x4, 0x1}}, 0x26) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a600800000000000000068354015002c00020000001180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 17:11:53 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x4, 0x4, 0x7}, 0x2c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80a00, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r3, 0x2}}, 0x18) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r1, &(0x7f0000000000), &(0x7f000089b000)}, 0x18) 17:11:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ppp\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000200)={0x1d6}, &(0x7f0000000240)=0x4) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x10401, 0x0) set_tid_address(&(0x7f0000000580)) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f0000000140)={0x1000, 0x8, 0x7, 0x401}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0), r5, 0xa0010000, 0x1, 0x4}}, 0x20) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc4, 0xdc, 0x773b, {"4295836480061dfb65f8c75d858149fe573d76841ab16e4088168f1c8fef888f52ae8451791616d06459116b3077a234430f7a1015248ceb303ef5044fbe4dbf5ca9086faa2dc68dc08a0f730f8d1f88c20d4da94231c9a2dd47bfd9838ebd5399a141cd24daa1c760cd93f2a0efceeaa1c2df147ed3f96e20e01c8b69bc1954b6bd1908c80ad3a05a984d8263a828eb87dd77b4ac6f157dbb1a1ddbf0079dedbe843bae04724ee91603634aa07d3985a715d5221cce64faea427e7285b283aebe60e4"}}, {0x0, "2eec8f65b3133e2fb3559eb984ed1a600b4cb5474ea87c351387bdcadb1388e0c72281c6c5cfdef005a28974779e0ae369a55c0d36828d146c4fcfe23a6075034bf816b51aa54f45384378e443c918c641aeb867dbd26951980758453fe36aad6b88b76ed44e3e089bca73dd7a19773253d94c425284175022cf9ce14ee33017d558005acead62e96809500d7734dd88215f3e58af4b7b96c51ee32d"}}, &(0x7f00000004c0)=""/145, 0x17a, 0x91, 0x1}, 0x20) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x0, [0x4b564d04, 0x6e864762]}) 17:11:54 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x15) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) r2 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x0) dup2(r1, r2) 17:11:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x7b, &(0x7f0000000040)={r2}, &(0x7f0000000100)=0x8) close(r3) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x7a, &(0x7f00000000c0)={r4}, &(0x7f00000001c0)=0x10) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f0000000180)=@in={0x4, 0xffffffffa0028000, @rand_addr, [0x1fffff, 0x6]}, 0x10, &(0x7f0000000140), 0x7c, &(0x7f0000000000)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x7c}}], 0x30}], 0x1, 0x0) 17:11:54 executing program 3: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4000, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:11:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000140), 0x20010000) 17:11:54 executing program 1: r0 = socket(0x40000000015, 0x805, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x2000, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x3, 0x2000000000000140) renameat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'rmd256-generic\x00'}}) getsockopt(r0, 0x114, 0x2715, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x7ffff000) 17:11:54 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x5, 0x18002) ioctl$KIOCSOUND(r1, 0x4b2f, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r3 = gettid() socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)={0xffffffffffffffff}) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r3, r2, 0x0, 0x12, &(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=r5, 0x4) wait4(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000008c0)=""/153, &(0x7f0000000140)=0x99) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000000c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001780)=ANY=[]) r6 = memfd_create(&(0x7f0000000580)='trusted.overlay.redirect\x00', 0x7) r7 = socket$inet6(0x2, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000080)={@mcast2}, &(0x7f0000000100)=0x14) ptrace$peekuser(0x3, r3, 0x4) vmsplice(r7, &(0x7f0000000200), 0x0, 0x2) kcmp(r3, r3, 0x4, 0xffffffffffffffff, r4) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000003c0), 0xffffffa5) tkill(r3, 0x11) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x1) clock_gettime(0x0, &(0x7f0000000740)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000480)=@assoc_value, &(0x7f0000000980)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) mkdirat(r0, &(0x7f0000000200)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0xf0, 0x0) 17:11:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) socketpair(0x8, 0x5, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000200)={0x1, r3, 0x1}) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) r4 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)) readv(r4, &(0x7f0000000040)=[{&(0x7f0000000340)=""/165, 0xa5}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/164, 0xa4}, {&(0x7f0000000540)=""/201, 0xc9}], 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:11:54 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000640)='/dev/vcs#\x00', 0x5, 0x18002) ioctl$KIOCSOUND(r1, 0x4b2f, 0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) r3 = gettid() socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)={0xffffffffffffffff}) ptrace$setopts(0x4206, r3, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r3, r2, 0x0, 0x12, &(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000440)=r5, 0x4) wait4(0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000008c0)=""/153, &(0x7f0000000140)=0x99) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000000c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001780)=ANY=[]) r6 = memfd_create(&(0x7f0000000580)='trusted.overlay.redirect\x00', 0x7) r7 = socket$inet6(0x2, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000080)={@mcast2}, &(0x7f0000000100)=0x14) ptrace$peekuser(0x3, r3, 0x4) vmsplice(r7, &(0x7f0000000200), 0x0, 0x2) kcmp(r3, r3, 0x4, 0xffffffffffffffff, r4) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000003c0), 0xffffffa5) tkill(r3, 0x11) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x1) clock_gettime(0x0, &(0x7f0000000740)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000480)=@assoc_value, &(0x7f0000000980)) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x2) mkdirat(r0, &(0x7f0000000200)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0xf0, 0x0) 17:11:54 executing program 3: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4000, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:11:54 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4000, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:11:54 executing program 4: r0 = socket$kcm(0x11, 0x2, 0x0) r1 = semget(0x1, 0x2, 0x40) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f0000000040)=""/95) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000180)=@l2={0x1f, 0xffffdd86, {0x9}}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="501466b2c88ffca5cace74562659da966e53f0105b9bd78cdde503e5824f0fcf7a734f9db9dfc4d2", 0x28}], 0x1}, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x9, 0x402000) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000140)={0x23, 0x35, 0x2, 0x17, 0x0, 0x7fffffff, 0x4, 0xa, 0x1}) 17:11:54 executing program 1: socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)={[{@fat=@errors_continue='errors=continue'}], [{@smackfstransmute={'smackfstransmute', 0x3d, "2540657468319f"}}, {@obj_role={'obj_role', 0x3d, '%self'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}]}) setxattr$security_smack_transmute(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) [ 243.437162] FAT-fs (loop1): Unrecognized mount option "smackfstransmute=%@eth1Ÿ" or missing value 17:11:54 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000a80)=ANY=[]}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000740)=@can, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000fc0)=""/230, 0xe6, 0x400fff}, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0xe0, "99a19c7fc0e714ecef01bf7ad48882f0ebddebad4d77d37a54f0a0fbfdf402658f76c48257d592ce241b0fa83528429df332bf4dd8fd160171aa1fb9940a2684da14ee62dd130bc2e9eaabc31b6056cdc13165d1e452ceea940429386c6a9f3697c4b19a9994d2f51407ec3fe4f7d031c1f9008e72ce35a24f262758e2c5a9cdb1827f8f6b96241bac56b13628e6e44f70527b30491504253daaf63b0da6361a7feef128b0d68ed2e16b3719697dfe2e8d308bd8115220fdfc5226b58eb0c8a87bbdaa1929d87338b2c7e2ebf021bd673b590665171193917697fdf7363c0962"}, &(0x7f0000000100)=0xe8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r1, 0xfffffffffffffff9}, &(0x7f0000000180)=0x8) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000380)={0xe, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80f}) 17:11:54 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ftruncate(r0, 0x9) r1 = socket$can_bcm(0x1d, 0x2, 0x2) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000000), 0x10) accept(r1, 0x0, &(0x7f00000002c0)=0xffffffd5) 17:11:54 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x4000, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 17:11:54 executing program 3: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='disable_sparse=']) 17:11:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = semget(0x0, 0x7, 0x4) semctl$GETZCNT(r1, 0x7, 0xf, &(0x7f00000000c0)=""/20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x6) getsockopt$inet_int(r2, 0x0, 0x19, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = creat(&(0x7f0000000000)='./file0\x00', 0xd0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000680)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f00000006c0)={r4, 0x1, 0x6, @broadcast}, 0x10) [ 243.720639] __ntfs_error: 8 callbacks suppressed [ 243.720662] ntfs: (device loop3): parse_options(): The disable_sparse option requires a boolean argument. 17:11:55 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x541282, 0x10) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuseblk(&(0x7f0000000480)='/dev/loop0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='fuseblk\x00', 0x0, &(0x7f0000000980)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 243.804448] ntfs: (device loop3): parse_options(): The disable_sparse option requires a boolean argument. 17:11:55 executing program 4: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000001c0)={0x4, 0x0, 0x0, 0x10001, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff00000001, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x0, 0x0, [0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000001580)=""/4096, &(0x7f0000000480)=0x1000) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x100000001, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') recvmmsg(r1, &(0x7f0000001500)=[{{0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/179, 0xb3}}], 0x2b, 0x40000042, &(0x7f0000001540)={0x77359400}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:11:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67affcdf031a5a2080000001c26b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000080)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="fc187ed9af988e114f322345b9ad3b6fc71694e7477acbc900eea05306261eef11", 0x21}], 0x1, &(0x7f00000001c0)}], 0x1, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timerfd_settime(r2, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {r3, r4+30000000}}, &(0x7f0000000300)) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r2, 0x800448d3, &(0x7f0000000400)={{0xffffffff, 0x1ff, 0x8001, 0x5, 0x5, 0x7}, 0x7, 0x84, 0x0, 0x3, 0x7, "809986ceaae1fbc73f02996dacf1ce9ee0ab1e70d239d3a32345f2a3be2d2571473989dfaacbc9faa66b880a519665d4a307d52b1de9e410b1c328bbefa35b25d2cdb1302fe826cdb33cdf67878c9c29814db06e31b432c8416388b6802ced4eea2d3af0c1bcd86c269e24112444df85436a6c847d800838dc5f025cd64e1b8f"}) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000100)}}, {{&(0x7f0000000200)=@sco, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/12, 0xc}, {&(0x7f0000000580)=""/80, 0x50}], 0x2}}], 0x2, 0x0, 0x0) 17:11:55 executing program 5: r0 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r0, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x3, 0x0, @mcast2}, 0x1c, &(0x7f0000fc8000)}, 0x8000) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000), 0x1c) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) 17:11:55 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000001640)='/dev/snd/pcmC#D#c\x00', 0x8, 0x80000) sendmsg$nfc_llcp(r0, &(0x7f0000003900)={&(0x7f0000001680)={0x27, 0x1, 0x0, 0x7, 0x96, 0x0, "3e08fe74dc6e9139cf9d73f93713b52853ac11a1a4fc09abed49bdc83354d6708b6366c58a904ac2463fb500257001aa11e80b344527566e7d58b82e598601", 0x23}, 0x60, &(0x7f0000003800)=[{&(0x7f0000001700)="42cfcb8ffd5ab19d56b252038fe45a102239724d0099b953aac11b19f7d51ac29d18ca758e39dc97ca65f5c4eb17aa8cf963953de3e6bbb7cc9561a345670f7d63a72774aac1a357ae41772ad8251a832e3420be0a3d921ae66838273930503803dff447d4c57d49074b39d30b9a905ebbcbf17f9d67023c1510a4efce7b744336eca512c81e03c7495425ce3dcb32cee024b98c56d78b9c52db221bef0766e10165d5bc91f2e207f5fafcd355843a1d215704f4922e81bb8ec5adf66da098140f0a7c63a7e62696ea0ec4e80c5309c0cbb42f1b52f2f72611676aafdbeb8c4b8719035aeb2a69ca85af10b21c61", 0xee}, {&(0x7f0000001800)="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", 0x1000}, {&(0x7f0000002800)="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", 0x1000}], 0x3, &(0x7f0000003840)={0xb8, 0x0, 0x0, "57e9bcfed86f5c0c6049d9d0b0142c6cf2b51cf4c814185f866a12387929bb48e86c652051b774cbc789618e613d6c28039a4c5a0bed0dc4b0af395abce013d2db9dc26b3aabe579b57f6504e27caa0d3513f856faca78f2367ad26dd60caee1b04e62636f698b0acfc6ce89379e9936536908cf63cd5ca3996ebed302858a0a341482b1086db0317b8588841c4ef39955d3380e93057aaf2ff7aa96dac8c89462629165df"}, 0xb8, 0xc0}, 0x800) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x800452d3, &(0x7f0000000100)) 17:11:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fcntl$getownex(r0, 0x10, &(0x7f0000000440)={0x0, 0x0}) r2 = fcntl$getown(r0, 0x9) tgkill(r1, r2, 0x28) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x2400, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000540)='memory.swap.current\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x10, 0x0, 0x9, 0x0, 0x0, 0x1, 0xf4a}, 0x2c) recvmsg(0xffffffffffffff9c, &(0x7f0000006980)={&(0x7f00000054c0)=@can, 0x80, &(0x7f0000005900), 0x5, &(0x7f0000005980)=""/4096, 0x1000, 0xfff}, 0x10042) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2e, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be000", &(0x7f00000000c0)=""/41, 0x100}, 0x28) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1) bind$bt_l2cap(r5, &(0x7f0000000580)={0x1f, 0x800000000000000, {0x0, 0x2, 0x7, 0x40, 0x6, 0x2}, 0x80e, 0xfffffffffffffffb}, 0xe) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000000740), &(0x7f0000000780)=0x4) getpid() r8 = getuid() stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r6, &(0x7f00000007c0)={0x90, 0xffffffffffffffda, 0x5, {0x2, 0x1, 0x5, 0x7ff, 0xe1c, 0x7fff, {0x3, 0x8000, 0x1, 0x7, 0x1f, 0x40, 0xa8d, 0x600000, 0x0, 0x100000000, 0x81, r8, r9, 0x1f, 0x6}}}, 0x90) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000480), &(0x7f00000004c0)=0x8) r10 = semget$private(0x0, 0x6, 0x80) semctl$SEM_INFO(r10, 0x0, 0x13, &(0x7f0000000680)=""/164) accept$inet(0xffffffffffffff9c, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) 17:11:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="0fc75af38f49189b26440f00d6c441cb5cc00fc71bc442f932d10f225c0f01cb66baf80cb8a4d35b8bef66bafc0c66edb805000000b9020000000f01c1", 0x3d}], 0x1, 0x40, &(0x7f0000000180), 0x0) socketpair(0x8, 0x5, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000200)={0x1, r3, 0x1}) clone(0x0, &(0x7f0000000400), &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000280)) r4 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000240)) readv(r4, &(0x7f0000000040)=[{&(0x7f0000000340)=""/165, 0xa5}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/164, 0xa4}, {&(0x7f0000000540)=""/201, 0xc9}], 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:11:55 executing program 3: socket$inet6(0xa, 0x2000000000000001, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x9, 0x7fffffff, 0x0, 0x3fc00000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x5124, 0x0, 0x7, 0x0, 0x1000, 0x4, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x8}, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000280)) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0xd, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000='version=9p2000'}, {@access_any='access=any'}, {@access_any='access=any'}], [{@obj_type={'obj_type', 0x3d, '/dev/vsock\x00'}}]}}) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c746500000000000000000000000026ff1affffffffff00000000007472d4d70000206529978bb4e9a39f54350e1fe386aef7c7a7fb434fa7538a27ca"], &(0x7f0000000100)=0x3f) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0x0, 0x300000000000000, 0x0, 0x0, 0x4000000]}}}, 0x98) [ 244.341828] Unknown ioctl 44664 17:11:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000340)={'ip6_vti0\x00', &(0x7f00000005c0)=@ethtool_coalesce={0xe}}) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000000)) [ 244.390167] Unknown ioctl 44664 17:11:55 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x801, 0x0) bind$unix(r0, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r1 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1c, &(0x7f0000000240)=""/164, &(0x7f0000000040)=0x10) accept4$inet(r1, &(0x7f0000000100), &(0x7f00000000c0)=0x10, 0xfffffffffffffffe) 17:11:55 executing program 5: r0 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r0, &(0x7f0000a29000)={&(0x7f00005dafe4)=@in6={0xa, 0x3, 0x0, @mcast2}, 0x1c, &(0x7f0000fc8000)}, 0x8000) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000), 0x1c) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) 17:11:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000900)='./file0\x00', 0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000540)="1de5019d30822cd7b599af793080c198dff5d08875a2bbb86f2566df5b7a3d60575f1757c5c88a6cae1e333c97fa1f1a41682a182e390e9a3471d09917eee54e3acc14746a3382919084dfd3f725e301ad18e837ae864db6452f1db53aa03b457145ba9d0a16d1434a86674ba41046c48001237f1e21105c9f76a75d1759e245e11a99f932b175ae2df4aca5565213dd", 0x1bd, 0x6}, {&(0x7f0000000680)="af32f110b7a066e8a889a2534bbd850374ace3e01eb1e8cef782132e23d45ad5e3305d6e4b391c07a0aaf28791d99a600841beebfecc47cf320d512c1bf55ba50c2f2eff49c43e16b2002cca", 0x4c, 0x1}, {&(0x7f0000000940)="2c6165273dffead5fa6dfa950f2854c1b5a7cf9366fde3fba18ad2a40b5dfe90b5eb3eea4f9f8aaf5811f5676312e313e0312cf2f11dfecd2ecc71b07b003b9fd4e8a047be6b79eafe8ee8c075a0f6799be7bc2d08fb06d022da50daf5c8512911637846ae708f52b5a4dccb07ec6525ae5f099fcb4c56a785516112a1147a808f562b1f74e0c3c89bf9037ac46bf2e6f34432960ba038c6ffffacaf0881a09e190fd77ae56368f049abc5ecc0d7176857a772afb1244fdc2f76ded463e04975d5", 0xc1, 0x4}, {&(0x7f0000000700)="9c813f0aeae4eb9dce244a43e80df5934009bd9ec7bbf65abd9421159817f9d24d6f89df3f878acacbccaebaca4d1c39554fd8373b62b2ac39bcfb179fb0f1d97df5ee10940e502a4ca712e45117c406942bdf9bfc60", 0x56, 0x4}], 0x0, &(0x7f00000008c0)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000c00)}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x360d, &(0x7f0000000600)) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/sctp\x00') ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000400)) ptrace$getenv(0x4201, 0x0, 0x14c, &(0x7f0000000380)) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f00000002c0)={0x0, 0x9}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000180)) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) setxattr$security_smack_entry(&(0x7f0000000800)='./file1\x00', &(0x7f0000000840)='security.SMACK64MMAP\x00', &(0x7f0000000880)='[}$keyring\x00', 0xb, 0x2) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001ac0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001bc0)=0xe8) stat(&(0x7f0000001e00)='./file1\x00', &(0x7f0000001e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001ec0)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@mcast2}}}, &(0x7f0000001fc0)=0xe8) getuid() syz_mount_image$reiserfs(&(0x7f0000000300)='reiserfs\x00', &(0x7f0000000340)='./file1\x00', 0x1, 0x1, &(0x7f0000000640)=[{&(0x7f0000000480)="cefe9ff80f37c5e46f54", 0xa}], 0x0, &(0x7f00000004c0)={[], [{@pcr={'pcr'}}]}) 17:11:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fcntl$getownex(r0, 0x10, &(0x7f0000000440)={0x0, 0x0}) r2 = fcntl$getown(r0, 0x9) tgkill(r1, r2, 0x28) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x2400, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000540)='memory.swap.current\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x10, 0x0, 0x9, 0x0, 0x0, 0x1, 0xf4a}, 0x2c) recvmsg(0xffffffffffffff9c, &(0x7f0000006980)={&(0x7f00000054c0)=@can, 0x80, &(0x7f0000005900), 0x5, &(0x7f0000005980)=""/4096, 0x1000, 0xfff}, 0x10042) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2e, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be000", &(0x7f00000000c0)=""/41, 0x100}, 0x28) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1) bind$bt_l2cap(r5, &(0x7f0000000580)={0x1f, 0x800000000000000, {0x0, 0x2, 0x7, 0x40, 0x6, 0x2}, 0x80e, 0xfffffffffffffffb}, 0xe) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000000740), &(0x7f0000000780)=0x4) getpid() r8 = getuid() stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r6, &(0x7f00000007c0)={0x90, 0xffffffffffffffda, 0x5, {0x2, 0x1, 0x5, 0x7ff, 0xe1c, 0x7fff, {0x3, 0x8000, 0x1, 0x7, 0x1f, 0x40, 0xa8d, 0x600000, 0x0, 0x100000000, 0x81, r8, r9, 0x1f, 0x6}}}, 0x90) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000480), &(0x7f00000004c0)=0x8) r10 = semget$private(0x0, 0x6, 0x80) semctl$SEM_INFO(r10, 0x0, 0x13, &(0x7f0000000680)=""/164) accept$inet(0xffffffffffffff9c, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) [ 244.712972] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 244.886425] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "pcr=00000000000000000000" 17:11:56 executing program 4: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000001c0)={0x4, 0x0, 0x0, 0x10001, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff00000001, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x0, 0x0, [0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000001580)=""/4096, &(0x7f0000000480)=0x1000) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x100000001, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') recvmmsg(r1, &(0x7f0000001500)=[{{0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/179, 0xb3}}], 0x2b, 0x40000042, &(0x7f0000001540)={0x77359400}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:11:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fcntl$getownex(r0, 0x10, &(0x7f0000000440)={0x0, 0x0}) r2 = fcntl$getown(r0, 0x9) tgkill(r1, r2, 0x28) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000080)=0x1e) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x2400, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000540)='memory.swap.current\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x10, 0x0, 0x9, 0x0, 0x0, 0x1, 0xf4a}, 0x2c) recvmsg(0xffffffffffffff9c, &(0x7f0000006980)={&(0x7f00000054c0)=@can, 0x80, &(0x7f0000005900), 0x5, &(0x7f0000005980)=""/4096, 0x1000, 0xfff}, 0x10042) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x2e, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be000", &(0x7f00000000c0)=""/41, 0x100}, 0x28) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0xfb01cbdd028b9044) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1) bind$bt_l2cap(r5, &(0x7f0000000580)={0x1f, 0x800000000000000, {0x0, 0x2, 0x7, 0x40, 0x6, 0x2}, 0x80e, 0xfffffffffffffffb}, 0xe) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000000740), &(0x7f0000000780)=0x4) getpid() r8 = getuid() stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r6, &(0x7f00000007c0)={0x90, 0xffffffffffffffda, 0x5, {0x2, 0x1, 0x5, 0x7ff, 0xe1c, 0x7fff, {0x3, 0x8000, 0x1, 0x7, 0x1f, 0x40, 0xa8d, 0x600000, 0x0, 0x100000000, 0x81, r8, r9, 0x1f, 0x6}}}, 0x90) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000480), &(0x7f00000004c0)=0x8) r10 = semget$private(0x0, 0x6, 0x80) semctl$SEM_INFO(r10, 0x0, 0x13, &(0x7f0000000680)=""/164) accept$inet(0xffffffffffffff9c, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) 17:11:56 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth0_to_bond\x00', 0x102}) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = epoll_create1(0x80000) ioctl(r1, 0x8, &(0x7f0000000100)="153f6234488dd25d7660705b81f2f2ecee6c3c69596b203df7f7ca04fe9a8dc2d9ca5dcdfeda7285690821735fcaa9b7d16f2fb849d543cc6cb77f8bf47415ed4fa62d2f31e5dd166ade92236d33c00e5f7b1c281ab34975e61d81a87db31645643b386349fec1deef9cf812f12061affbf16feb2e9b7e2cd268a651218e93af2ba95c5b02470fa69b466a363baf8552762f030c74dc537e68a6ab6066d573ba5808a509c11cf8f66d38895d58bcacb38ef5dc8c7f3f") ioctl$TCXONC(r1, 0x540a, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x10, &(0x7f0000000080)={0xfffffffffffffffa}, 0x4) 17:11:56 executing program 5: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x81, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000080)={0x0, @aes256}) getsockname$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10) r1 = socket(0x10, 0x3, 0xc) write(r1, &(0x7f00000008c0)="130000001000ffdde200f49ff60f050000230a009d0000001100c53022e5f9ec364f0000c0ff030000001c24bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efc28ceb4ec3ff429592e5de7e4f28bca763acd06f40ad03226af55e3129849ae3c726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b2684ade4025722c962d916c00000000000000340000000000", 0xb1) [ 245.015292] overlayfs: filesystem on './file0' not supported as upperdir 17:11:56 executing program 5: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000001c0)={0x4, 0x0, 0x0, 0x10001, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff00000001, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x0, 0x0, [0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000001580)=""/4096, &(0x7f0000000480)=0x1000) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x100000001, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') recvmmsg(r1, &(0x7f0000001500)=[{{0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/179, 0xb3}}], 0x2b, 0x40000042, &(0x7f0000001540)={0x77359400}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:11:56 executing program 0: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000001c0)={0x4, 0x0, 0x0, 0x10001, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff00000001, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x0, 0x0, [0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000001580)=""/4096, &(0x7f0000000480)=0x1000) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x100000001, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') recvmmsg(r1, &(0x7f0000001500)=[{{0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/179, 0xb3}}], 0x2b, 0x40000042, &(0x7f0000001540)={0x77359400}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:11:56 executing program 2: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000001c0)={0x4, 0x0, 0x0, 0x10001, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff00000001, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x0, 0x0, [0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000001580)=""/4096, &(0x7f0000000480)=0x1000) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x100000001, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') recvmmsg(r1, &(0x7f0000001500)=[{{0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/179, 0xb3}}], 0x2b, 0x40000042, &(0x7f0000001540)={0x77359400}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:11:56 executing program 4: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000001c0)={0x4, 0x0, 0x0, 0x10001, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff00000001, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x0, 0x0, [0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000001580)=""/4096, &(0x7f0000000480)=0x1000) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x100000001, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') recvmmsg(r1, &(0x7f0000001500)=[{{0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/179, 0xb3}}], 0x2b, 0x40000042, &(0x7f0000001540)={0x77359400}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:11:56 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000c7df60)={0x7ff, @in6}, &(0x7f000064b000)=0x98) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfffffffffffff001, 0x82) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f0000000080)=0x1f, 0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, 0x20) 17:11:56 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0xffff, {{0xa, 0x4e22, 0x42f3000000000000, @dev={0xfe, 0x80, [], 0x16}, 0x9}}, 0x0, 0x6, [{{0xa, 0x4e24, 0x7ff, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe}}, 0x80}}, {{0xa, 0x4e22, 0xe48, @dev={0xfe, 0x80, [], 0x1b}, 0x6}}, {{0xa, 0x4e23, 0xe444, @mcast1, 0xe07}}, {{0xa, 0x4e20, 0xc77c, @loopback, 0x8001}}, {{0xa, 0x4e22, 0x3ff, @loopback, 0x7}}, {{0xa, 0x4e21, 0xd9c6, @dev={0xfe, 0x80, [], 0x11}, 0x7fffffff}}]}, 0x390) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000080)=0xcb) sendmsg$nl_xfrm(r2, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="480000001e000107008848f6064649ae3c72bf14c2c051110000000000000000000008000000000000000000000000000000170000000000ff010000000000000000000000000001000000000000000008000b0000000000"], 0x48}, 0x8}, 0x0) 17:11:56 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa5e0936e7f46bf5c) fchmodat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x1, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) kcmp(r3, 0x0, 0x0, 0xffffffffffffffff, r2) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup(0xffffffffffffffff) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000380)={0x31, 0x5, 0x1fbed9a1, "5267514a774b2e2270016157cbbce8b9ccffa086db90144ee57337c4de48c52d97a347e8d452edc3ea2b89fdd67d7f6576"}) ioctl$FS_IOC_GETFSLABEL(r5, 0x81009431, &(0x7f0000000880)) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10, &(0x7f0000000540), &(0x7f0000000640)=0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f00000003c0)={0x40000000}) getpid() write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000440)={0x14, 0x11, 0x2, {0x20}}, 0x14) r6 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge0\x00'}) write$FUSE_NOTIFY_INVAL_INODE(r6, &(0x7f00000002c0)={0x28, 0x2, 0x0, {0x3, 0x20, 0x1}}, 0x28) 17:11:57 executing program 5: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000001c0)={0x4, 0x0, 0x0, 0x10001, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff00000001, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x0, 0x0, [0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000001580)=""/4096, &(0x7f0000000480)=0x1000) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x100000001, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') recvmmsg(r1, &(0x7f0000001500)=[{{0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/179, 0xb3}}], 0x2b, 0x40000042, &(0x7f0000001540)={0x77359400}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 245.698023] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. [ 245.718957] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 17:11:57 executing program 4: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000001c0)={0x4, 0x0, 0x0, 0x10001, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff00000001, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x0, 0x0, [0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000001580)=""/4096, &(0x7f0000000480)=0x1000) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x100000001, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') recvmmsg(r1, &(0x7f0000001500)=[{{0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/179, 0xb3}}], 0x2b, 0x40000042, &(0x7f0000001540)={0x77359400}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:11:57 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) getitimer(0x0, &(0x7f00000000c0)) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) getitimer(0x1, &(0x7f0000000140)) 17:11:57 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x52, 0x40800) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000140)) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000180)='projid_map\x00') syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f00000000c0)="c4c379146600006543a02d0000000000000064670f01cab8010000000f01d946d8f1e1b066ba400066edb9f60800000f32f2400f0964460f35", 0x39}], 0x1, 0x0, &(0x7f0000000000), 0x0) listen(r2, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) 17:11:57 executing program 0: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="1020f5f20100070009000000030000000c0000000900000034000000020000000000000000300000000000000e00000016", 0x31, 0x1400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="92f7ce41d2a376e08a00227ff82f46"]) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x200, 0x0) 17:11:57 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000700)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x2, 0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x0, 0x0, {"6d3a03a22ad13804238c25806cdd75ac"}}}}, 0xa5e0936e7f46bf5c) fchmodat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x1, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x40, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) kcmp(r3, 0x0, 0x0, 0xffffffffffffffff, r2) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup(0xffffffffffffffff) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000240)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000380)={0x31, 0x5, 0x1fbed9a1, "5267514a774b2e2270016157cbbce8b9ccffa086db90144ee57337c4de48c52d97a347e8d452edc3ea2b89fdd67d7f6576"}) ioctl$FS_IOC_GETFSLABEL(r5, 0x81009431, &(0x7f0000000880)) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10, &(0x7f0000000540), &(0x7f0000000640)=0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f00000003c0)={0x40000000}) getpid() write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000440)={0x14, 0x11, 0x2, {0x20}}, 0x14) r6 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge0\x00'}) write$FUSE_NOTIFY_INVAL_INODE(r6, &(0x7f00000002c0)={0x28, 0x2, 0x0, {0x3, 0x20, 0x1}}, 0x28) [ 245.914472] Unknown ioctl 22023 17:11:57 executing program 5: ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000001c0)={0x4, 0x0, 0x0, 0x10001, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff00000001, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000380)={0x0, 0x0, [0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000001580)=""/4096, &(0x7f0000000480)=0x1000) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x100000001, 0x4, 0x3}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') recvmmsg(r1, &(0x7f0000001500)=[{{0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/179, 0xb3}}], 0x2b, 0x40000042, &(0x7f0000001540)={0x77359400}) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 245.984866] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 245.992883] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 17:11:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000200), &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240), 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x6c400, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000400)="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", 0x200) sendfile(r1, r3, 0x0, 0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000280)={0x0, r0, 0x7, 0x1, 0x10000, 0x9}) linkat(r4, &(0x7f0000000140)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x1400) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100)={0x3800, 0x8, 0x2, 0x1000}, 0x6) write$FUSE_INIT(r1, &(0x7f0000000000)={0x50, 0x0, 0x5, {0x7, 0x1b, 0x49d9, 0x0, 0x10001, 0x200, 0x6, 0x2}}, 0x50) [ 246.031448] F2FS-fs (loop0): Invalid segment/section count (22, 14 x 52) [ 246.040282] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 246.077799] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 246.090893] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 246.111178] F2FS-fs (loop0): Invalid segment/section count (22, 14 x 52) [ 246.123324] audit: type=1800 audit(1540487517.373:31): pid=7238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16570 res=0 [ 246.126006] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 246.166035] audit: type=1804 audit(1540487517.393:32): pid=7238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir591230060/syzkaller.SB1Hd3/11/file0" dev="sda1" ino=16570 res=1 [ 246.192584] audit: type=1800 audit(1540487517.393:33): pid=7238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16570 res=0 17:11:57 executing program 3: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x301000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000001c0)={{0xffffffffffffffff, 0x0, 0x3ff, 0x1, 0xfffffffffffff67d}}) sendto$inet6(r0, &(0x7f0000000100), 0xfffffffffffffd05, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x1ff, @mcast2}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)=@nl=@proc, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=""/36, 0xffffffffffffff1b}, 0x2000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)='\n') ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000480)=""/133) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000540)={0xdb8, 0x7, 0xffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r4) connect$pppoe(r2, &(0x7f0000000200)={0x18, 0x0, {0x4, @remote, 'veth1\x00'}}, 0x1e) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000005c0)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e21, 0x4, @local, 0x8}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, @in6={0xa, 0x4e21, 0x0, @loopback, 0x40}], 0x58) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e23, 0x800, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1a}}, 0x3ff}}}, &(0x7f00000003c0)=0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000440)={r6, 0x0, 0x17, "346353df94e47330551a6ffc0380333ee238eba368702b"}, 0x1f) 17:11:57 executing program 5: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x0, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000200)={"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"}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 17:11:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) r2 = socket$inet6(0xa, 0x806, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)) 17:11:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup(r0) r2 = socket$inet6(0xa, 0x806, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)) [ 246.675294] Unknown ioctl 22023 [ 247.012527] Unknown ioctl 22023 [ 247.053157] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 17:11:58 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) getitimer(0x0, &(0x7f00000000c0)) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) getitimer(0x1, &(0x7f0000000140)) 17:11:58 executing program 2: setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000001c0), 0x4) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="38ca1accba4f335844cbd01bea510b1b249cf327e4bbb285208f2521785c4aaa153a40ea9fa67c6ba7284813414e6c4d80c7a94443d3314757058bc4e0ae82cb93a71ac80e45424ab5a9700997ee254b308d85d0637c3039e77113c5d7f76460214725b90441bfe0111d2fa721b41d60d6feef", 0x73}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffff8f) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0xfffffffffffffffd}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@empty, 0x2, 0x3, 0x0, 0x4, 0x9, 0x0, 0x9}, &(0x7f0000000100)=0x20) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, &(0x7f00007d1fff), &(0x7f0000000000), &(0x7f0000915ffc), &(0x7f0000000080)) read(r0, &(0x7f0000009f9c)=""/100, 0x64) 17:11:58 executing program 3: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x301000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000001c0)={{0xffffffffffffffff, 0x0, 0x3ff, 0x1, 0xfffffffffffff67d}}) sendto$inet6(r0, &(0x7f0000000100), 0xfffffffffffffd05, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x1ff, @mcast2}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)=@nl=@proc, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=""/36, 0xffffffffffffff1b}, 0x2000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)='\n') ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000480)=""/133) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000540)={0xdb8, 0x7, 0xffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r4) connect$pppoe(r2, &(0x7f0000000200)={0x18, 0x0, {0x4, @remote, 'veth1\x00'}}, 0x1e) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000005c0)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e21, 0x4, @local, 0x8}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, @in6={0xa, 0x4e21, 0x0, @loopback, 0x40}], 0x58) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e23, 0x800, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1a}}, 0x3ff}}}, &(0x7f00000003c0)=0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000440)={r6, 0x0, 0x17, "346353df94e47330551a6ffc0380333ee238eba368702b"}, 0x1f) 17:11:58 executing program 0: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x301000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000001c0)={{0xffffffffffffffff, 0x0, 0x3ff, 0x1, 0xfffffffffffff67d}}) sendto$inet6(r0, &(0x7f0000000100), 0xfffffffffffffd05, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x1ff, @mcast2}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)=@nl=@proc, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=""/36, 0xffffffffffffff1b}, 0x2000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)='\n') ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000480)=""/133) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0xe000, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000540)={0xdb8, 0x7, 0xffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r4) connect$pppoe(r2, &(0x7f0000000200)={0x18, 0x0, {0x4, @remote, 'veth1\x00'}}, 0x1e) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000005c0)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e21, 0x4, @local, 0x8}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, @in6={0xa, 0x4e21, 0x0, @loopback, 0x40}], 0x58) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e23, 0x800, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1a}}, 0x3ff}}}, &(0x7f00000003c0)=0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000440)={r6, 0x0, 0x17, "346353df94e47330551a6ffc0380333ee238eba368702b"}, 0x1f) [ 247.660577] audit: type=1804 audit(1540487518.903:34): pid=7238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir591230060/syzkaller.SB1Hd3/11/file0" dev="sda1" ino=16570 res=1 [ 247.714927] audit: type=1800 audit(1540487518.903:35): pid=7238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16570 res=0 [ 247.782260] syz-executor5 (7248) used greatest stack depth: 15424 bytes left 17:11:59 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) getitimer(0x0, &(0x7f00000000c0)) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) getitimer(0x1, &(0x7f0000000140)) 17:11:59 executing program 5: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x0, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000200)={"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"}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) [ 248.047049] Unknown ioctl 22023 17:11:59 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x60040, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x20}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000006c0)={r1, @in={{0x2, 0x4e23, @remote}}, 0xba71, 0x3f}, &(0x7f0000000780)=0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb4a2f044190002a3ead01829d22a314bb6d3c794f374f6812a4f836f83581485272edd3042be2d4816a95e6bbcffa87ae7d5cc0ebd7f657e5dba6ab04ff7d29fae7503132d24f186fa436f51fd75da3a4e1656ca7f5ba58b8b80f9494908b30016d49e34ac7287515ad870cbc36ef516d433ea91915cb93e60701eb8436f00197465dc0d449f48f8e0f36ddb5666123d536e1478f30b4f14d28ddf3a7c9b34e000827675599c754abd71b94b0352f035288d5a0980ed224a45aed48674d464bccb7256ff1de2db84e673bc7fd6c17bfe044f6cf51a0d94fa9539f"], &(0x7f0000000040)=""/174, 0x8, 0xae, 0x1}, 0x20) r2 = socket$inet(0x2, 0x3, 0x800000000000b) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x2a0, [0x20000800, 0x0, 0x0, 0x20000830, 0x20000860], 0x0, &(0x7f0000000140), &(0x7f0000000340)=ANY=[@ANYBLOB="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"]}, 0x39e) r4 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x1c, 0x80800) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000300)={0x7, 0x0, 0x800000004, 0x7, 0xd69e}, 0x3dc) 17:11:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000200), &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240), 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x6c400, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000400)="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", 0x200) sendfile(r1, r3, 0x0, 0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000280)={0x0, r0, 0x7, 0x1, 0x10000, 0x9}) linkat(r4, &(0x7f0000000140)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x1400) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100)={0x3800, 0x8, 0x2, 0x1000}, 0x6) write$FUSE_INIT(r1, &(0x7f0000000000)={0x50, 0x0, 0x5, {0x7, 0x1b, 0x49d9, 0x0, 0x10001, 0x200, 0x6, 0x2}}, 0x50) [ 248.294331] audit: type=1800 audit(1540487519.543:36): pid=7304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor4" name="file0" dev="sda1" ino=16574 res=0 [ 248.354964] kernel msg: ebtables bug: please report to author: Wrong len argument [ 248.361030] audit: type=1804 audit(1540487519.573:37): pid=7304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir591230060/syzkaller.SB1Hd3/12/file0" dev="sda1" ino=16574 res=1 [ 248.457084] kernel msg: ebtables bug: please report to author: Wrong len argument 17:11:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000200), &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240), 0xfffffffffffffe01) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0xfffffffffffffffe) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x6c400, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r1, r3, 0x0, 0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000280)={0x0, r0, 0x7, 0x1, 0x10000, 0x9}) linkat(r4, &(0x7f0000000140)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00', 0x1400) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000100)={0x3800, 0x8, 0x2, 0x1000}, 0x6) write$FUSE_INIT(r1, &(0x7f0000000000)={0x50, 0x0, 0x5, {0x7, 0x1b, 0x49d9, 0x0, 0x10001, 0x200, 0x6, 0x2}}, 0x50) 17:11:59 executing program 2: setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000001c0), 0x4) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="38ca1accba4f335844cbd01bea510b1b249cf327e4bbb285208f2521785c4aaa153a40ea9fa67c6ba7284813414e6c4d80c7a94443d3314757058bc4e0ae82cb93a71ac80e45424ab5a9700997ee254b308d85d0637c3039e77113c5d7f76460214725b90441bfe0111d2fa721b41d60d6feef", 0x73}], 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffff8f) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0xfffffffffffffffd}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@empty, 0x2, 0x3, 0x0, 0x4, 0x9, 0x0, 0x9}, &(0x7f0000000100)=0x20) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, &(0x7f00007d1fff), &(0x7f0000000000), &(0x7f0000915ffc), &(0x7f0000000080)) read(r0, &(0x7f0000009f9c)=""/100, 0x64) 17:11:59 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0xfffffffffffffffe, 0x84) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000080)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000008c0), 0x10000000000000a2, &(0x7f0000000500)}, 0x40814) r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r1, r2, 0x15, &(0x7f0000000000)={0x5, 0x5, 0xfffffffffffffffe}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x420040, 0x0) ioctl$KDENABIO(r3, 0x4b36) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) [ 248.686725] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop2. 17:12:00 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) getitimer(0x0, &(0x7f00000000c0)) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) getitimer(0x1, &(0x7f0000000140)) 17:12:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000009c0)={0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000001840)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000080)=[{&(0x7f00000006c0)="863979", 0x3}], 0x1, &(0x7f00000017c0)}, 0x0) close(0xffffffffffffffff) [ 249.807069] Unknown ioctl 22023 17:12:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}]}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) sched_setaffinity(r2, 0x8, &(0x7f0000000100)=0xcc8c) r3 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x69e7, 0x800) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x17) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r1, r4, &(0x7f0000000000), 0x800000080000002) 17:12:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1d}, 0xe) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="b400000000000000c70000004c4b98c5a3d200000000070000000000000000000000000000009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x450, &(0x7f000000cf3d)=""/195}, 0x48) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 17:12:01 executing program 5: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000080)={0xc5, 0x6, 0xffffffffffffffff, 0x0, 0x3, 0x10001, 0x5, 0x3f, 0x7, 0x8, 0x0, 0x5, 0x0, 0x6, 0x3, 0x1, 0x400, 0x2cb, 0x40}) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000200)={"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"}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0xd0dd0000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr, [0x800000000000000]}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) 17:12:01 executing program 2: socket$nl_xfrm(0xa, 0x3, 0x87) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x20000000, &(0x7f0000000380)={0x2, 0x4004e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x12, 0x3d, 0x4, 0x400000000078}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000040), &(0x7f0000000200)=""/70}, 0x18) 17:12:01 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000222000)=0x9, 0x4) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x4080, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f00000000c0)={0x6, 0xf4eb, 0x800, 'queue0\x00', 0x800}) connect$inet6(r0, &(0x7f0000001fe4)={0xa, 0x0, 0x0, @mcast1}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x20000000000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="00ff0f000000000000094c416a91b112a5d6c47337cb1942a23936ff030000ab8a5a0ed8423001009c83493d6f10fa02c7102fe43c717d855dc2c536"], &(0x7f0000000000)=0x725) 17:12:01 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x3, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x70}}, 0x0) sendto(r0, &(0x7f00000000c0)="fa29e03e485521b80ee7dc20c6cfeef38f6e0b6eaba92051477ba589afdd6174460a67cfba5ce7a5c131e2824011e302de585468ef3502e9", 0x38, 0x10, &(0x7f0000000100)=@sco={0x1f, {0x2, 0x7, 0x80000000, 0x8, 0x100000001, 0x20}}, 0x80) 17:12:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200800, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x13, &(0x7f0000000100)=0x1, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f0000000140)="abbaf7", 0x3, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendto$inet6(r1, &(0x7f0000000340)="cba01d3331cd4e93512f15a398432cb933c040774ff4f854ae4422a34d34392d99eeaeff968239ca44fdc85b73e9f558bb0183b33174405bcc7abe80eba2ee42e9ab", 0x42, 0x0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local}, 0x1c) 17:12:01 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'bcsh0\x00'}) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x100, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000007c0)=0x7fc000000) recvfrom$inet6(r0, &(0x7f0000000180)=""/60, 0x3c, 0x100, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @remote, 0xffffffff}, 0x1c) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000040)=""/95, 0x630}, {&(0x7f0000000600)=""/85, 0xfb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xf0}, {&(0x7f0000000280)=""/77, 0xa}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x96, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f0, 0x0, &(0x7f0000003700)={0x77359400}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000380)={'filter\x00', 0x0, 0x3, 0x22, [], 0xa, &(0x7f0000000700)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000200)=""/34}, &(0x7f0000000240)=0x78) lsetxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) [ 250.432952] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:12:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x6, 0x31, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs(r3, &(0x7f0000000080)='net/connector\x00') ioctl$sock_inet_tcp_SIOCINQ(r2, 0x894b, &(0x7f0000000040)) [ 250.631708] syz-executor5 (7347) used greatest stack depth: 14064 bytes left 17:12:02 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='oom_adj\x00') ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000140)={0x0, 0x2}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003ec0)=[{0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000001701000003000000499401000000be00"], 0x18}], 0x1, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000080)=[@op={0x18}], 0x18}], 0x4924944, 0x0) 17:12:02 executing program 4: kexec_load(0x0, 0x10, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1) r0 = getpgrp(0xffffffffffffffff) r1 = getpgid(0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x204000, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x38785966, 0x0) kcmp(r0, r1, 0x5, r2, r3) 17:12:02 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) getitimer(0x0, &(0x7f00000000c0)) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) 17:12:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000540)={{{@in, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xe8) semget(0x2, 0x0, 0x300) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000500)={0xffffffffffff15f0, 0x9d68, 0x101, 0x2, 0x8, 0x882c}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x10000, 0x0, 0xc8ba7a4, 0x1947}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000003c0)=@assoc_value={r2, 0x6}, &(0x7f0000000400)=0x8) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "7c70ee3800d5ab5f2036f872e0ac57cbd592bca0d671633f50a3102066d6e765f5a64731e3fb8d90d250eda2cc33b60a7ff98074cdc3f1dd1a2df26a381d95974e0925d521c6b48c3dee0d430d398884316091aff6adb6153dc3c92549957d3488efc02d6f6fb172524b095c30c1bd35aae04236bdd42694d613eb54c0b65a338c48dc4c8bad70754fc81d9928e4a1b81f9c77075258a0805b4494867247966b24a023311fd91ef3754b98d3acde6f2ef0617f123c22fccb81c11389fdfa2e21c2365aabfc8916e02151d8643ae21cab7fcbec6142186d3bb57546c106484bc4c28a48da2b75dd82aabe99464558e60cd101f6b65856fabee614d271741a68dd550c8772f06a93cf8e5c0de549c3b75a72f8a590bd50b2af5f64009c969ed7596f0192b0f98b1afac0e8c5f4c653f611b4a71776400a9ae3f18e75f856788c97195749042510735880b9bb0ccb23210832a4f1c6f134d68f8e299837c426e0c9a45d5d2c959446cc363f370c67cd01a063c91254d692fe35abee92fabda4f66d93228c979ebe036c5c2e0028ec76562d67d0919ca28258fec0ed60603142b5c57c4cfb1ea1e892d0fd2f33970142b179c415d6bea344fbcc82d133052e848a885160737c69eb02ca9f544831c8e3ffcf40cb7b415d24795fc8aaeb8e76bec262aea5e28fe5d6495c4b5895a612b1cc2122286add66356f3ecd309f970634f1b09da1507964d35575167317f13c7fd9f11af27ceea86e9a5b3494a27ba98ba38dd1fb72ef2c6163664fd8f7c946935cd4833121f505ff277c03d959d9a12f3389e9eb6701a8b29f72c20c6abb7bd8349dd2e120bdd59dca9f1a2a877f1677b59d7920ddf29b9d94f7c6879b78e31cf1b65b60fe349ef9d4976f46609ee34e33f647aafbf64f6323d18598905f2e73af75661397595b8f9c1e9a4e993946820da5378ca5b363560e95edce316e99bac6e6250efcf1cb58fdcf94c7557c2d7f763a688543462d54b64e178c2e64c6ebba356894973051907fd8de8ba908e822168b171c1707efcd9ac827e64313721876e2ff26ac34e88557a4a0dfde08eda81cf0c1465a89b68429e48966044c767563e1121db48c9b619fd7362afd15ec6aa19b28759d7977be4fbcad0cf8dd5dc5362259bd5cb5089a9d18db969afe1192571f5fcc0c4d6be281d23b9c1f9f32873c058adfa1bf57a3718686957edfd6e4b58aa959541127696d59fb2810d042ced227961eb19a424e4cf45bc6243217bb7561b7ee11f8c0b8f39480343a26f2da5fe79d5e213c01ea47155ffa91e7d7ba0bc8ccb018bd69cfe71dd8565a645d678b404a295397e83ae69dbf8505f6947a836b44823a92861124330fccd4bc4a2e20d9047bd919d82c89623caa87eb09bd584d58f42b35ef55fddc06dfb3957f3f507e5ca9b8b98947cc5bb68846755527ddf32ffa444e1c7a5654d4d377e04a9f22e1069804fdcdb251acb6bd6b32d100feb44286991d779d2b3e2b7f5cc5f8eb3ae166a3b6fb9df11e1867989a6f9b2028e4c73b4d418b51f6e870713cadafddb47a48c9a97283da214f02db3326d42438d9a7db580693ad1887f99d86bb5fafd6d07c2647fc80c2c5a1ed9ea3b95be65ca422080ddefca5b49ccd538f6bc67390f892d9e416f7e835f76dd90edc56256348d20560caeea05c0922cab60dbf0b57ddaaed6ded5a336e01485fd571dc12050461271cee347c31ac245bfee9128630dfcc43b6d88b5ba9937a6f6ab70b7d256784ff72297cfcfd0ffacd09b55fb832bf60f04d87c48c74972b9f18fa178ce4880b025d1c1097ddb929e8f7e02f1c0e03012bec0fa61a49eb1c2a50a45fc0d98b6649de325184006938e421321e8b366649d9b6ebadf77509c9d48844e80f7752fd7daaa5c938b946feaaac0d871203270a747035c7e2f697c84e792a55cbce76c0a25360f7acbeaab60627aa9c37064af75b67f46732844eb2f6b37226004afe451a9fbfbbcf7e72ade67b017e9209b5627fbe16789abd90326751a1fd1d93efc59f2650f979ba71938d784064922bee2874c4b76d5f26e39ea0a98cf175950137feff9456c88c6a295830183fae3a9c2312c25f3d81708d73488d15a587e7e7cdde3b77917eef29c8b5965c916a65c3c5a53b7313c3115d0a8bb4e16f6b80ff6f78adb756aba94ced86047562a2cd2fb25e9a4656f6359c3f2fde8b5ab38852853cbd7221cb4d59b7f0e79bd37f9ade073f62b75edbe63c13c0d02bf076d88f5b750ea640aad47ce97d6a0783398dd3fbb63734ed969470cf45200235650532224fc28caf1e36ca6b402ec4c978add40fc59f2113485875682139f8aa9aeb48d09178de919370b0cd0ebcab5e60e1b0a2fc153db0dae8e50b48561622a677d0f1afc149676f832e016e14007fb298dcb96f11a92a1ac8bd4cc7b34d659d6cd2c9817b586585e72080255b083bc84512277ffb7f561c6a7a08cd128bfe9b525da531f0bf04f11d3de102b3538835807ac0b2f4325fc6765d02d692ec82f5b338c8257029136fcd3427c09874ecc7492becdd6608eac4adf1abc3f7e08868a72e57ce4dcfc288a25af73d19f1118a9254963c1548cdca5fc7c921a7f218f8e71edd7969dfb35beae1091d7530e32236397fa9fcd232b441ff1b0177829468c198d659d247ccca4fbd58c625501e4368075d0e5e69a6f90952f5bbe48e85a303131dedf7f1a513b291598a545784e1013521877c25d6069d3a855652a4bad5b2df2e4da2de756a20e790b756dd2925ce824561e5892b5e064c7c7b996acc4e29597e0cd00956e9c57ec374714f846be7632d3075e38bead499163498810886c78a2cc73fb64fd48e186083ce911e0751b4dc63476859c2824fa532a4b1711c244619e702eeab19380aeb7b17f67fade3dcad8ddddd893a526cd5d04d8ae982c88029ec71bdd0772fd74adbdb378fc204ca411a2d8a50331516a28552be78f9725f32d1b3a6c7bdf3277c5f7e385c7ebbacc419ec7ca3c5b8f46dbefee59b6422a6b22d60527edc012f852077d925619874f7709f283e01678fed36528003a696ee431a817f34f453c143dc56b70e1f810a5380a555cc8c4fc6522ab544ce5d715caa302ebdd0aa8286b7ef5dd6dd48a8ad9566818f7509daf02db0b98b432f57f1d107ee95a86228728cab4062e27922381e1e2ee351af5e2ea0fd6d1cea70b3b8f4a50f0776fc9aa2a7d2dff6e1ea3769864104f09137b99960b69af13895d842649eacaed8ddf183beba3323640af8deb52b902c0974d685d19fc87c93eb80ad5d28e54363705ad39231d989522e94f000256bc8d93af138a45d67dad3e21fa9fb31d9327c6e71f61956d9daf4f97333112704136d3d1bf6fe0e4c002e10b684d2344300ec70fae0b50532ebace58f0e8318354a172cceacf27d01ff41cc8fef42443f62b0e15b5fcc0728630b96fb2c2b59634f4993bb1ce2eace6fb0f53e5f84bc5f58b1b66d59e3c75a98670496f105a703607211aa9e882e72f13e9fe07f0767ad4e5ac5c732b65301d8ceab36b5ff2f71958fb1b51d2e703ac506e68d4026160fd3f60440b8b8f554f1feeba5d53f71cbe60d143620f8fa779acb94c965b729207a5ab11f4a51b694c31606171da44a28d80cde296dff5724ff718d6377eb8534e616cff39af943ee4ce87b4fadded30c702d370a71072ab3e20f19b8c1b73fdbbb9c675352bb73ee85e22597fc0c439a33f5febe1629bd084af7193f8d1a1415b02ca54706711505cbae11ec6411b012cc3a3eddcfb002901b6e7565b9fbf4d605c147031888ceb590c14697d00970ce9095c6f7fee41ec6a15d7ef52dfedfff2a0d3dbb387b61232aee6ca202787038021e6aabda18e2adf6fd89aa491e65f9813d73412fbfff089752d713d7efa690ec4fc254b56908d3057f65997acf81aea589e272f8fa852849e488f1e0c0cb6cdb5f46ca92e36d39224e704850056d2e9b91909aed0f55d054e274415ecc39b8958335a14cfb0a42d7f26ef8e82592dfd03b3550b5193fba077994c682951968869574fd94976760d9bd9b334353eeda836cc8dab244e72095cc46833f02bb2f6df35601b3085664261abb67fc9ab9f27210e6827cd15ce16c55f0f7f5b8ab401f24032b19a53a9299b62ebf4a8cf7f4753d95126f008a8ce349036666de66bcaf40b27fa875efa98873e1ef9302e2a24bfe07bd1054bdf9ba9ad1b1075402f26d682833b947c762513ba5f07537bb712473184a60e04ace5adb8d982d6153b011ae0b2034adc0ff4a64e2c6561c2e0840cdab2120bc916cde9b7a92c4d332d0f83945fe55e3c8f4d93f22e7759c20241d92cca0ae5a3d06a127e5614df708cea1ad3b2f231c81460ff4c3f349c67a87135a4b67589ffce311832923f71796276e81f0537e265404c0ee06d5ed98a5ec5f8ad62db589eb585fc4627173b51fd4e897a3e8d2acbb82ec2996ac3a6823368a1e12a0536a9d1a7b2d31d80c46c292ff51395481d4f65c53fab867e27bec9156ee189d245d94877a1405dc9e1e996822ad47071a9ab36c9bfd02c41ea5ba21591793053b1b64758bae0addfcd69d169849bc1ee6ce5c08f0d3da5ecc1b6ab31e13af2fa5ce4d921163270901264a88ac6350e8fb6371663dd04146932238597258b123a8036250c190fbb3cfc6ebbf9e06c4a9053e8332c95c91a890a3d35ddd35f47e7ab606f3e345e12560e6d52243883da7b8910834042ad12e7fb3f08a0b14ef6aee22251999e6079be2ef5666d7d5ae00d161720262761da3f378c63cb151f4e94d034e9de949dfe796b905804ca555691023c30ea7cf0cb276e1e3ba65793291f8287d1064606bf5787421b9b9bfc05e9c5eac750de92519fe9e2592cd34a2ef6ec18efed5e7c13bfcfce47327cbecac358bbe6d44164849308cf91cd5ea87fa4b02ba4939e28141c7dad42714b019470d91808a8f46150677b6c90f267ecb39ef42afc95de0cbd016775c89d8213ec9d4e061e6493f237296f91abfc64176c0e885ef54af4136a724fadfe89a25d7599998acebc4a27f8fb5b26936bda5c3d5fec3373dcd9a0e99fc939641c50669adc54119582e8835575d1c57fa955cd29d870360620f91c3ff90d264013816352317ae226f7d7bad5db711f8973382f6cebd63cd519ddd08e1772649be75f64f4acc15f828dc0b305584b6dd2213194603c44e2964358d305aa97fb08568a0a955ad7a6f8d042754b4bbf2fb3414052719fd9841bef8360d1d3195c69414be882115c2c64fecdcbdaed3a2e943fdfef9a13520e41d32a787bcfe4f61e2b378d35aa70784a772cf8ebcaaeb105e4627516db2ababfcb8c11f224c3a48c86160d34d0ee59f02c31648ae4b0309b378f0bf63266967dcfb4f1cc1902f613c6d0d48915a9cf28a52b106544cde1b38ff2e2a1275fd0d3899ce7f7c6653c9017f7ac4aaa35bcb2811a8f9dbb56746b45475350e7c13d42abb5692377da7a4045ee644ce00f8699e3251d75621c82cd659ea3add277affe3ff792f7d24a3d0979ef82cfc0d409697ae2e8598854a8327f46974c901d309dc6dbe31913c59d821aa50c0fe95cc822e8f07bbb00e9a09bc9a570b9778d29308740bc336a41258d209c206f87a709aa43415da0096f7d177e509a7d625645fb098ccc45367d82235e952670ac5f82f8ced3f59fd9ee20ac75be609cc832417e807ddc40630cba4c91e0785edcb5f20b9e6dedb1ec172cd16fc034f410e9ce375ea855144aa3076317f649cf4efe4d7abf244984c4e", 0x1000}, 0x130f) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000440)={0x0, 0x9, 0xfff, @dev={[], 0x1f}, 'team_slave_1\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x21) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000300)={0xffffffff, 0x4, 0x5, 0x5}, 0x8) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000200)={'gre0\x00', {0x2, 0x0, @dev}}) setxattr$security_smack_transmute(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000140)) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000480)={{0x2, 0xffffffffffffffff, @loopback}, {}, 0x10048, {0x2, 0x4e24}, 'veth1\x00'}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x9000400}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x50, r3, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x40}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xf97}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffffffffff80}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x23d}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x40004) 17:12:02 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) getsockopt$sock_buf(r0, 0x1, 0x4000038, &(0x7f0000000500)=""/30, 0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f00000000c0)=0x4) r2 = dup(r0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000100)=0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000240)=0x10, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x4000000101ff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000004c0)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) write$nbd(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="95934f81acf4acbab811d16d845467450734e30ab7af400859d3014df37daf080a292f3c1ad62a0802ea67a41b62ec355200c9d0a2e0860bdfe37b5a1b7b82a8124d388f31d859fcbb5f80873046b724330000"], 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local}}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x13f}}, 0x20) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x11fc) 17:12:02 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x8400, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000180)={0x0, &(0x7f0000000140)=""/29}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000000)={{0x8, 0x9, 0x5e26, 0x9, 0x3, 0x7f}, 0x3}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)) socket$inet(0x2b, 0x0, 0x0) 17:12:02 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) [ 251.636506] Unknown ioctl 22023 [ 251.639076] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 4294907376 (only 16 groups) 17:12:03 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs(r0, &(0x7f0000000080)='net/udplite6\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000040)='./file1\x00', 0x4000000000003fd, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010a0200027400f001", 0x17}], 0x0, &(0x7f0000000200)) 17:12:03 executing program 3: alarm(0x100000001) alarm(0x7) 17:12:03 executing program 3: r0 = socket$inet6(0xa, 0x1400000000003, 0x400000080) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000040)=0x4006, 0x4) sendto$inet6(r1, &(0x7f0000000800)="0581c7000500000000000000ffa2ad88050000000000008c39160aaacb57a80000067d1a80e19e33e3c2e7725f4a5861153709000000f7402810247f0139d643ba0708e265756fe5eb8f5972eaecfffc2bd9e9aba5568a12843d4342277bd6adf74af03e90f5490f2a38ff07e4b0a084b53a683747f955a47ddc7100080000395da1a7ba8a7069cdb5f4eff4aae8b98ccd4245ad64ceaa7ad4974418b715a624f2cfdaf236512e17960229a1b3bc79b3603a800292fa7c36fb4f6c1342c60e17e6539f6bfeef0bae71fd57b9798d8b6370", 0xd1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x100000001}, 0x1c) recvfrom$packet(r1, &(0x7f0000000240)=""/209, 0xd1, 0x0, &(0x7f0000008140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="faed7c6ee51d"}, 0x70e000) 17:12:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000080)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r0, 0x0) mprotect(&(0x7f0000fa9000/0x3000)=nil, 0x3000, 0x4) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x3, {0xa, 0x4e20, 0x9, @mcast2, 0xf39000000000}, r2}}, 0x38) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)}}, 0xfcf3) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 17:12:03 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x241) 17:12:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) getsockopt$sock_buf(r0, 0x1, 0x4000038, &(0x7f0000000500)=""/30, 0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f00000000c0)=0x4) r2 = dup(r0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000100)=0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000240)=0x10, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x4000000101ff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000004c0)=ANY=[], 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r4 = socket$l2tp(0x18, 0x1, 0x1) write$nbd(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="95934f81acf4acbab811d16d845467450734e30ab7af400859d3014df37daf080a292f3c1ad62a0802ea67a41b62ec355200c9d0a2e0860bdfe37b5a1b7b82a8124d388f31d859fcbb5f80873046b724330000"], 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local}}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x13f}}, 0x20) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x11fc) 17:12:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x440000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000180)={0x9, 0x101, 0x9, 0x5, 0x7fffffff, 0x10000}) syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x7, 0x80100) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) prctl$setname(0xf, &(0x7f0000000100)='fd') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x3, 0x0) close(r1) 17:12:03 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) getitimer(0x0, &(0x7f00000000c0)) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) [ 252.509469] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 4294907376 (only 16 groups) [ 252.526305] Unknown ioctl 22023 [ 410.848961] INFO: task syz-executor2:7395 blocked for more than 140 seconds. [ 410.856314] Not tainted 4.19.0+ #303 [ 410.861945] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 410.870209] syz-executor2 D21216 7395 5385 0x00000004 [ 410.876151] Call Trace: [ 410.879381] __schedule+0x8cf/0x21d0 [ 410.883134] ? __sched_text_start+0x8/0x8 [ 410.887354] ? kasan_check_read+0x11/0x20 [ 410.891942] ? mark_held_locks+0xc7/0x130 [ 410.896109] ? print_usage_bug+0xc0/0xc0 [ 410.900590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.905367] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 410.910302] ? retint_kernel+0x2d/0x2d [ 410.914256] ? trace_hardirqs_on_caller+0xc0/0x310 [ 410.919566] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.924350] schedule+0xfe/0x460 [ 410.927725] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.932887] ? __schedule+0x21d0/0x21d0 [ 410.936890] ? retint_kernel+0x2d/0x2d [ 410.941136] ? _raw_spin_unlock_irq+0x56/0x80 [ 410.945657] rwsem_down_read_failed+0x371/0x710 [ 410.950842] ? rwsem_down_write_failed_killable+0x10/0x10 [ 410.956401] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.961651] ? retint_kernel+0x2d/0x2d [ 410.965573] ? lock_acquire+0x268/0x520 [ 410.970024] ? perf_trace_sched_process_exec+0x860/0x860 [ 410.975544] ? __get_super.part.11+0x107/0x2e0 [ 410.980538] call_rwsem_down_read_failed+0x18/0x30 [ 410.985497] down_read+0x9b/0x120 [ 410.990254] ? __get_super.part.11+0x207/0x2e0 [ 410.994856] ? __down_interruptible+0x700/0x700 [ 410.999895] __get_super.part.11+0x207/0x2e0 [ 411.004326] get_super+0x2d/0x50 [ 411.007767] fsync_bdev+0x17/0xc0 [ 411.011669] invalidate_partition+0x35/0x60 [ 411.016036] drop_partitions.isra.14+0xe1/0x200 [ 411.021070] ? delete_partition+0x2c0/0x2c0 [ 411.025411] ? retint_kernel+0x2d/0x2d [ 411.029749] ? apparmor_cred_prepare+0x5a0/0x5a0 [ 411.034527] rescan_partitions+0x72/0x8e0 [ 411.038701] __blkdev_reread_part+0x1ad/0x230 [ 411.043582] blkdev_reread_part+0x26/0x40 [ 411.047827] loop_reread_partitions+0x163/0x190 [ 411.052840] ? __loop_update_dio+0x6b0/0x6b0 [ 411.057281] loop_set_status+0xb95/0x1010 [ 411.061919] loop_set_status64+0xaa/0x100 [ 411.066575] ? loop_set_status_old+0x920/0x920 [ 411.071587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.077169] ? ns_capable_common+0x13f/0x170 [ 411.081915] lo_ioctl+0x90e/0x1d80 [ 411.085488] ? find_held_lock+0x36/0x1c0 [ 411.089889] ? lo_rw_aio+0x1ef0/0x1ef0 [ 411.093795] blkdev_ioctl+0x9ac/0x2010 [ 411.097694] ? blkpg_ioctl+0xc10/0xc10 [ 411.101915] ? lock_downgrade+0x900/0x900 [ 411.106127] ? check_preemption_disabled+0x48/0x280 [ 411.111578] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 411.116527] ? kasan_check_read+0x11/0x20 [ 411.122017] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 411.127315] ? rcu_softirq_qs+0x20/0x20 [ 411.131668] ? __fget+0x4d1/0x740 [ 411.135146] ? ksys_dup3+0x680/0x680 [ 411.139228] ? __might_fault+0x12b/0x1e0 [ 411.143307] ? lock_downgrade+0x900/0x900 [ 411.147475] block_ioctl+0xee/0x130 [ 411.151487] ? blkdev_fallocate+0x400/0x400 [ 411.155838] do_vfs_ioctl+0x1de/0x1720 [ 411.160072] ? ioctl_preallocate+0x300/0x300 [ 411.164500] ? __fget_light+0x2e9/0x430 [ 411.168488] ? fget_raw+0x20/0x20 [ 411.172511] ? _copy_to_user+0xc8/0x110 [ 411.176509] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 411.182498] ? put_timespec64+0x10f/0x1b0 [ 411.186666] ? nsecs_to_jiffies+0x30/0x30 [ 411.191212] ? do_syscall_64+0x9a/0x820 [ 411.195207] ? do_syscall_64+0x9a/0x820 [ 411.199537] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 411.204210] ? security_file_ioctl+0x94/0xc0 [ 411.208640] ksys_ioctl+0xa9/0xd0 [ 411.212472] __x64_sys_ioctl+0x73/0xb0 [ 411.216379] do_syscall_64+0x1b9/0x820 [ 411.220621] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 411.226006] ? syscall_return_slowpath+0x5e0/0x5e0 [ 411.231282] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 411.236144] ? trace_hardirqs_on_caller+0x310/0x310 [ 411.241529] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 411.246569] ? prepare_exit_to_usermode+0x291/0x3b0 [ 411.253009] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 411.257902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.263549] RIP: 0033:0x457569 [ 411.266773] Code: Bad RIP value. [ 411.270494] RSP: 002b:00007f2f984fec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 411.278226] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 411.285839] RDX: 0000000020000380 RSI: 0000000000004c04 RDI: 0000000000000005 [ 411.293541] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 411.301141] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f984ff6d4 [ 411.308437] R13: 00000000004c0481 R14: 00000000004d0630 R15: 00000000ffffffff [ 411.316065] INFO: task syz-executor2:7407 blocked for more than 140 seconds. [ 411.323547] Not tainted 4.19.0+ #303 [ 411.327790] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 411.336037] syz-executor2 D24168 7407 5385 0x00000004 [ 411.341988] Call Trace: [ 411.344601] __schedule+0x8cf/0x21d0 [ 411.348326] ? mark_held_locks+0x130/0x130 [ 411.352908] ? __sched_text_start+0x8/0x8 [ 411.357077] ? print_usage_bug+0xc0/0xc0 [ 411.361490] ? mark_held_locks+0x130/0x130 [ 411.365747] ? zap_class+0x640/0x640 [ 411.369836] ? zap_class+0x640/0x640 [ 411.373570] ? __lock_acquire+0x62f/0x4c20 [ 411.377830] ? find_held_lock+0x36/0x1c0 [ 411.383257] schedule+0xfe/0x460 [ 411.386641] ? __mutex_lock+0xafa/0x16f0 [ 411.391038] ? __schedule+0x21d0/0x21d0 [ 411.395037] ? kasan_check_read+0x11/0x20 [ 411.399538] ? do_raw_spin_unlock+0xa7/0x330 [ 411.403962] ? do_raw_spin_trylock+0x270/0x270 [ 411.408555] ? __ww_mutex_add_waiter.part.15+0x120/0x120 [ 411.414484] ? mutex_destroy+0x200/0x200 [ 411.418573] schedule_preempt_disabled+0x13/0x20 [ 411.423675] __mutex_lock+0xaff/0x16f0 [ 411.427582] ? __blkdev_get+0x19b/0x13c0 [ 411.431971] ? mutex_trylock+0x2b0/0x2b0 [ 411.436057] ? zap_class+0x640/0x640 [ 411.440143] ? zap_class+0x640/0x640 [ 411.443874] ? __lock_acquire+0x62f/0x4c20 [ 411.448128] ? find_held_lock+0x36/0x1c0 [ 411.452644] ? get_gendisk+0xd2/0x380 [ 411.456469] ? lock_downgrade+0x900/0x900 [ 411.460955] ? lock_release+0xa00/0xa00 [ 411.464949] ? perf_trace_sched_process_exec+0x860/0x860 [ 411.470763] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 411.475713] ? get_disk_and_module+0xf0/0xf0 [ 411.480492] ? kasan_check_write+0x14/0x20 [ 411.484802] ? up_read+0x225/0x2c0 [ 411.488353] ? down_read+0x8d/0x120 [ 411.492904] ? up_read_non_owner+0x100/0x100 [ 411.497334] ? __down_interruptible+0x700/0x700 [ 411.502381] ? blkdev_ioctl+0x2010/0x2010 [ 411.506562] mutex_lock_nested+0x16/0x20 [ 411.511924] ? mutex_lock_nested+0x16/0x20 [ 411.516179] __blkdev_get+0x19b/0x13c0 [ 411.520461] ? check_disk_change+0x140/0x140 [ 411.524899] blkdev_get+0xc1/0xb50 [ 411.528466] ? bdget+0x5b0/0x5b0 [ 411.532394] ? do_raw_spin_trylock+0x270/0x270 [ 411.537016] ? apparmor_capable+0x6c0/0x6c0 [ 411.541724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.547976] ? errseq_sample+0xe5/0x130 [ 411.552392] ? _copy_to_user+0x110/0x110 [ 411.556491] ? _raw_spin_unlock+0x2c/0x50 [ 411.560984] blkdev_open+0x1fb/0x280 [ 411.564806] do_dentry_open+0x499/0x1250 [ 411.569206] ? bd_acquire+0x2c0/0x2c0 [ 411.573029] ? chown_common+0x730/0x730 [ 411.577018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.582925] ? security_inode_permission+0xd2/0x100 [ 411.587966] ? inode_permission+0xb2/0x560 [ 411.592561] vfs_open+0xa0/0xd0 [ 411.595862] path_openat+0x12bc/0x5150 [ 411.600085] ? rcu_softirq_qs+0x20/0x20 [ 411.604154] ? unwind_dump+0x190/0x190 [ 411.608072] ? path_lookupat.isra.43+0xc00/0xc00 [ 411.613183] ? unwind_get_return_address+0x61/0xa0 [ 411.618133] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 411.623511] ? expand_files.part.8+0x571/0x9a0 [ 411.628119] ? find_held_lock+0x36/0x1c0 [ 411.632559] ? __alloc_fd+0x347/0x6e0 [ 411.636377] ? lock_downgrade+0x900/0x900 [ 411.641888] ? getname+0x19/0x20 [ 411.645291] ? kasan_check_read+0x11/0x20 [ 411.649860] ? do_raw_spin_unlock+0xa7/0x330 [ 411.654295] ? do_raw_spin_trylock+0x270/0x270 [ 411.659197] ? __lock_is_held+0xb5/0x140 [ 411.663275] ? __check_object_size+0xb1/0x782 [ 411.667788] ? _raw_spin_unlock+0x2c/0x50 [ 411.672303] ? __alloc_fd+0x347/0x6e0 [ 411.676141] do_filp_open+0x255/0x380 [ 411.680432] ? may_open_dev+0x100/0x100 [ 411.684463] ? get_unused_fd_flags+0x122/0x1a0 [ 411.689374] ? __alloc_fd+0x6e0/0x6e0 [ 411.693221] do_sys_open+0x568/0x700 [ 411.696952] ? filp_open+0x80/0x80 [ 411.700837] ? trace_hardirqs_off_caller+0x310/0x310 [ 411.705957] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 411.711835] __x64_sys_open+0x7e/0xc0 [ 411.715660] do_syscall_64+0x1b9/0x820 [ 411.719878] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 411.725263] ? syscall_return_slowpath+0x5e0/0x5e0 [ 411.730544] ? trace_hardirqs_on_caller+0x310/0x310 [ 411.735579] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 411.740917] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 411.747605] ? __switch_to_asm+0x40/0x70 [ 411.752078] ? __switch_to_asm+0x34/0x70 [ 411.756167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 411.761365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.766571] RIP: 0033:0x4111a1 [ 411.771034] Code: 74 3b 44 89 f1 ba 00 33 44 00 44 89 f6 31 ff 31 c0 ff 15 aa 82 24 00 e9 90 fc ff ff c6 02 00 4c 8b 7c 24 28 49 89 ca 49 83 c7 <01> 4c 89 7c 24 28 e9 44 fb ff ff 4d 89 d7 e9 3c fb ff ff b9 40 95 [ 411.790718] RSP: 002b:00007f2f984dd7a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 411.798460] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004111a1 [ 411.806087] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f2f984dd850 [ 411.813700] RBP: 000000000072bfa0 R08: 000000000000000f R09: 0000000000000000 [ 411.821282] R10: 0000000000000000 R11: 0000000000000293 R12: 00007f2f984de6d4 [ 411.828574] R13: 00000000004c4ca7 R14: 00000000004d8070 R15: 00000000ffffffff [ 411.836254] INFO: task syz-executor0:7394 blocked for more than 140 seconds. [ 411.843721] Not tainted 4.19.0+ #303 [ 411.847959] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 411.856202] syz-executor0 D23160 7394 5344 0x00000004 [ 411.862154] Call Trace: [ 411.864766] __schedule+0x8cf/0x21d0 [ 411.868497] ? kasan_check_read+0x11/0x20 [ 411.873272] ? try_to_wake_up+0x10a/0x12e0 [ 411.877690] ? __sched_text_start+0x8/0x8 [ 411.882319] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 411.887454] ? zap_class+0x640/0x640 [ 411.891544] ? zap_class+0x640/0x640 [ 411.895285] ? migrate_swap_stop+0x8a0/0x8a0 [ 411.900959] ? find_held_lock+0x36/0x1c0 [ 411.905043] schedule+0xfe/0x460 [ 411.908429] ? __mutex_lock+0xafa/0x16f0 [ 411.912858] ? __schedule+0x21d0/0x21d0 [ 411.916855] ? kasan_check_read+0x11/0x20 [ 411.921324] ? do_raw_spin_unlock+0xa7/0x330 [ 411.925751] ? do_raw_spin_trylock+0x270/0x270 [ 411.930693] ? __ww_mutex_add_waiter.part.15+0x120/0x120 [ 411.936156] ? mutex_destroy+0x200/0x200 [ 411.940682] schedule_preempt_disabled+0x13/0x20 [ 411.946063] __mutex_lock+0xaff/0x16f0 [ 411.950286] ? blkdev_put+0x34/0x540 [ 411.954024] ? mutex_trylock+0x2b0/0x2b0 [ 411.958094] ? __lock_acquire+0x62f/0x4c20 [ 411.962704] ? mark_held_locks+0x130/0x130 [ 411.966963] ? wake_up_new_task+0x6f7/0xcf0 [ 411.971697] ? exit_robust_list+0x280/0x280 [ 411.976036] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 411.980955] ? trace_hardirqs_on+0xbd/0x310 [ 411.985294] ? kasan_check_read+0x11/0x20 [ 411.989782] ? wake_up_new_task+0x6f7/0xcf0 [ 411.994136] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 412.000195] ? locks_remove_posix+0x47d/0x840 [ 412.004719] ? zap_class+0x640/0x640 [ 412.008449] ? lock_pin_lock+0x350/0x350 [ 412.012874] ? do_lock_file_wait.part.29+0x260/0x260 [ 412.017997] ? zap_class+0x640/0x640 [ 412.022058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.027640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 412.034507] ? locks_remove_file+0x3c6/0x5c0 [ 412.039257] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 412.044811] ? ima_file_free+0x132/0x650 [ 412.049203] ? blkdev_put+0x540/0x540 [ 412.053037] mutex_lock_nested+0x16/0x20 [ 412.057105] ? mutex_lock_nested+0x16/0x20 [ 412.061697] blkdev_put+0x34/0x540 [ 412.065259] ? blkdev_put+0x540/0x540 [ 412.069375] blkdev_close+0x8b/0xb0 [ 412.073032] __fput+0x385/0xa30 [ 412.076324] ? get_max_files+0x20/0x20 [ 412.080582] ? trace_hardirqs_on+0xbd/0x310 [ 412.084920] ? kasan_check_read+0x11/0x20 [ 412.089496] ? task_work_run+0x1af/0x2a0 [ 412.093575] ? trace_hardirqs_off_caller+0x310/0x310 [ 412.098690] ? filp_close+0x1cd/0x250 [ 412.102835] ____fput+0x15/0x20 [ 412.106137] task_work_run+0x1e8/0x2a0 [ 412.110471] ? task_work_cancel+0x240/0x240 [ 412.114815] ? copy_fd_bitmaps+0x210/0x210 [ 412.119371] ? do_syscall_64+0x9a/0x820 [ 412.123380] exit_to_usermode_loop+0x318/0x380 [ 412.127982] ? __bpf_trace_sys_exit+0x30/0x30 [ 412.132821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.138383] do_syscall_64+0x6be/0x820 [ 412.142630] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 412.148036] ? syscall_return_slowpath+0x5e0/0x5e0 [ 412.153326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.158201] ? trace_hardirqs_on_caller+0x310/0x310 [ 412.164544] ? prepare_exit_to_usermode+0x291/0x3b0 [ 412.170889] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.175764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.181283] RIP: 0033:0x411021 [ 412.184506] Code: 4c 89 f6 48 89 c7 48 89 ca 48 89 4c 24 10 4c 89 54 24 08 e8 b1 a3 ff ff 48 8b 4c 24 10 41 c6 04 0f 00 4c 8b 7c 24 28 4c 8b 54 <24> 08 45 0f b6 37 e9 db fc ff ff 0f 1f 40 00 41 80 f8 29 74 7f ba [ 412.203816] RSP: 002b:00007ffc8bc18bd0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 412.211844] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000411021 [ 412.219432] RDX: 0000000000000000 RSI: 00000000007338e8 RDI: 0000000000000004 [ 412.226720] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 412.234343] R10: 00007ffc8bc18af0 R11: 0000000000000293 R12: 0000000000000000 [ 412.242045] R13: 0000000000000001 R14: 0000000000000017 R15: 0000000000000000 [ 412.249678] INFO: task syz-executor0:7414 blocked for more than 140 seconds. [ 412.256877] Not tainted 4.19.0+ #303 [ 412.261388] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 412.269651] syz-executor0 D23520 7414 5344 0x00000004 [ 412.275302] Call Trace: [ 412.277904] __schedule+0x8cf/0x21d0 [ 412.281979] ? mark_held_locks+0x130/0x130 [ 412.286242] ? __sched_text_start+0x8/0x8 [ 412.291691] ? print_usage_bug+0xc0/0xc0 [ 412.295775] ? mark_held_locks+0x130/0x130 [ 412.300372] ? zap_class+0x640/0x640 [ 412.304110] ? zap_class+0x640/0x640 [ 412.307832] ? __lock_acquire+0x62f/0x4c20 [ 412.312433] ? find_held_lock+0x36/0x1c0 [ 412.316546] schedule+0xfe/0x460 [ 412.320235] ? __mutex_lock+0xafa/0x16f0 [ 412.324317] ? __schedule+0x21d0/0x21d0 [ 412.328308] ? kasan_check_read+0x11/0x20 [ 412.332798] ? do_raw_spin_unlock+0xa7/0x330 [ 412.337225] ? do_raw_spin_trylock+0x270/0x270 [ 412.342158] ? __ww_mutex_add_waiter.part.15+0x120/0x120 [ 412.347621] ? mutex_destroy+0x200/0x200 [ 412.352017] schedule_preempt_disabled+0x13/0x20 [ 412.356787] __mutex_lock+0xaff/0x16f0 [ 412.361101] ? __blkdev_get+0x19b/0x13c0 [ 412.365190] ? mutex_trylock+0x2b0/0x2b0 [ 412.369602] ? zap_class+0x640/0x640 [ 412.373334] ? zap_class+0x640/0x640 [ 412.377061] ? __lock_acquire+0x62f/0x4c20 [ 412.381661] ? find_held_lock+0x36/0x1c0 [ 412.385748] ? get_gendisk+0xd2/0x380 [ 412.389867] ? lock_downgrade+0x900/0x900 [ 412.394037] ? lock_release+0xa00/0xa00 [ 412.398020] ? perf_trace_sched_process_exec+0x860/0x860 [ 412.403827] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 412.409087] ? get_disk_and_module+0xf0/0xf0 [ 412.413522] ? kasan_check_write+0x14/0x20 [ 412.417765] ? up_read+0x225/0x2c0 [ 412.422645] ? down_read+0x8d/0x120 [ 412.426292] ? up_read_non_owner+0x100/0x100 [ 412.431120] ? __down_interruptible+0x700/0x700 [ 412.435824] ? blkdev_ioctl+0x2010/0x2010 [ 412.440307] mutex_lock_nested+0x16/0x20 [ 412.444388] ? mutex_lock_nested+0x16/0x20 [ 412.448641] __blkdev_get+0x19b/0x13c0 [ 412.453427] ? check_disk_change+0x140/0x140 [ 412.457876] blkdev_get+0xc1/0xb50 [ 412.461773] ? bdget+0x5b0/0x5b0 [ 412.465163] ? do_raw_spin_trylock+0x270/0x270 [ 412.470155] ? apparmor_capable+0x6c0/0x6c0 [ 412.474497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.480363] ? errseq_sample+0xe5/0x130 [ 412.484374] ? _copy_to_user+0x110/0x110 [ 412.488489] ? _raw_spin_unlock+0x2c/0x50 [ 412.493005] blkdev_open+0x1fb/0x280 [ 412.496744] do_dentry_open+0x499/0x1250 [ 412.501129] ? bd_acquire+0x2c0/0x2c0 [ 412.504957] ? chown_common+0x730/0x730 [ 412.509270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.514835] ? security_inode_permission+0xd2/0x100 [ 412.520178] ? inode_permission+0xb2/0x560 [ 412.524454] vfs_open+0xa0/0xd0 [ 412.527744] path_openat+0x12bc/0x5150 [ 412.532116] ? rcu_softirq_qs+0x20/0x20 [ 412.536105] ? unwind_dump+0x190/0x190 [ 412.540371] ? path_lookupat.isra.43+0xc00/0xc00 [ 412.545152] ? unwind_get_return_address+0x61/0xa0 [ 412.551346] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 412.556380] ? expand_files.part.8+0x571/0x9a0 [ 412.561337] ? find_held_lock+0x36/0x1c0 [ 412.565434] ? __alloc_fd+0x347/0x6e0 [ 412.569587] ? lock_downgrade+0x900/0x900 [ 412.573754] ? getname+0x19/0x20 [ 412.577149] ? kasan_check_read+0x11/0x20 [ 412.581693] ? do_raw_spin_unlock+0xa7/0x330 [ 412.586119] ? do_raw_spin_trylock+0x270/0x270 [ 412.591119] ? __lock_is_held+0xb5/0x140 [ 412.595201] ? __check_object_size+0xb1/0x782 [ 412.600033] ? _raw_spin_unlock+0x2c/0x50 [ 412.604205] ? __alloc_fd+0x347/0x6e0 [ 412.608030] do_filp_open+0x255/0x380 [ 412.612189] ? may_open_dev+0x100/0x100 [ 412.616203] ? get_unused_fd_flags+0x122/0x1a0 [ 412.621134] ? __alloc_fd+0x6e0/0x6e0 [ 412.624967] do_sys_open+0x568/0x700 [ 412.628700] ? filp_open+0x80/0x80 [ 412.632657] ? trace_hardirqs_off_caller+0x310/0x310 [ 412.637779] ? do_sys_ftruncate+0x449/0x550 [ 412.642457] __x64_sys_open+0x7e/0xc0 [ 412.646281] do_syscall_64+0x1b9/0x820 [ 412.650537] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 412.655920] ? syscall_return_slowpath+0x5e0/0x5e0 [ 412.661297] ? trace_hardirqs_on_caller+0x310/0x310 [ 412.666334] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 412.671729] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 412.678422] ? __switch_to_asm+0x40/0x70 [ 412.683790] ? __switch_to_asm+0x34/0x70 [ 412.687878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.693130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.698335] RIP: 0033:0x4111a1 [ 412.701944] Code: 74 3b 44 89 f1 ba 00 33 44 00 44 89 f6 31 ff 31 c0 ff 15 aa 82 24 00 e9 90 fc ff ff c6 02 00 4c 8b 7c 24 28 49 89 ca 49 83 c7 <01> 4c 89 7c 24 28 e9 44 fb ff ff 4d 89 d7 e9 3c fb ff ff b9 40 95 [ 412.721210] RSP: 002b:00007fa48b2e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 412.729252] RAX: ffffffffffffffda RBX: 00000000200001e8 RCX: 00000000004111a1 [ 412.736535] RDX: 00007fa48b2e7afa RSI: 0000000000000002 RDI: 00007fa48b2e7af0 [ 412.744145] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 412.751747] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000008 [ 412.759328] R13: 0000000000000001 R14: 00000000004d7e48 R15: 00000000ffffffff [ 412.766629] [ 412.766629] Showing all locks held in the system: [ 412.773292] 1 lock held by khungtaskd/980: [ 412.777533] #0: 000000004288c5b0 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 412.786543] 1 lock held by rsyslogd/5213: [ 412.791409] #0: 00000000e2e70481 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 412.799794] 2 locks held by getty/5303: [ 412.803777] #0: 00000000d8bd2a56 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 412.815127] #1: 000000009f9ed684 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 412.824469] 2 locks held by getty/5304: [ 412.828461] #0: 000000004f29783b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 412.837150] #1: 0000000042c1ba90 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 412.846363] 2 locks held by getty/5305: [ 412.850669] #0: 000000007e02ad22 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 412.859253] #1: 000000003e86e782 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 412.868150] 2 locks held by getty/5306: [ 412.872460] #0: 000000006e15495f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 412.881247] #1: 00000000b19e8ea1 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 412.890480] 2 locks held by getty/5307: [ 412.894465] #0: 000000009872c4aa (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 412.903055] #1: 00000000fe2288f7 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 412.912258] 2 locks held by getty/5308: [ 412.916238] #0: 00000000389a63c8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 412.924912] #1: 00000000023ca39a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 412.934138] 2 locks held by getty/5309: [ 412.938119] #0: 0000000030c3cd28 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 412.947660] #1: 00000000080e9931 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 412.956863] 3 locks held by syz-executor2/7395: [ 412.961838] #0: 000000001fb32b61 (&lo->lo_ctl_mutex/1){+.+.}, at: lo_ioctl+0x8e/0x1d80 [ 412.970429] #1: 00000000f2079680 (&bdev->bd_mutex){+.+.}, at: blkdev_reread_part+0x1e/0x40 [ 412.979285] #2: 000000009463c595 (&type->s_umount_key#54){++++}, at: __get_super.part.11+0x207/0x2e0 [ 412.988709] 1 lock held by syz-executor2/7407: [ 412.993629] #0: 00000000f2079680 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x13c0 [ 413.002235] 1 lock held by syz-executor0/7394: [ 413.006823] #0: 00000000f2079680 (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x34/0x540 [ 413.015072] 1 lock held by syz-executor0/7397: [ 413.019955] 1 lock held by syz-executor0/7414: [ 413.024541] #0: 00000000f2079680 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x19b/0x13c0 [ 413.033138] 1 lock held by blkid/7402: [ 413.037034] #0: 00000000f2079680 (&bdev->bd_mutex){+.+.}, at: blkdev_put+0x34/0x540 [ 413.045271] [ 413.046908] ============================================= [ 413.046908] [ 413.054259] NMI backtrace for cpu 0 [ 413.057968] CPU: 0 PID: 980 Comm: khungtaskd Not tainted 4.19.0+ #303 [ 413.065033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.074389] Call Trace: [ 413.077052] dump_stack+0x244/0x39d [ 413.080698] ? dump_stack_print_info.cold.1+0x20/0x20 [ 413.085900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.091468] nmi_cpu_backtrace.cold.1+0x5c/0xa1 [ 413.096199] ? lapic_can_unplug_cpu.cold.26+0x3f/0x3f [ 413.101403] nmi_trigger_cpumask_backtrace+0x1b3/0x1ed [ 413.106713] arch_trigger_cpumask_backtrace+0x14/0x20 [ 413.111910] watchdog+0xb3e/0x1050 [ 413.115478] ? reset_hung_task_detector+0xd0/0xd0 [ 413.120336] ? __kthread_parkme+0xce/0x1a0 [ 413.124680] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 413.129793] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 413.134908] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 413.139531] ? trace_hardirqs_on+0xbd/0x310 [ 413.143860] ? kasan_check_read+0x11/0x20 [ 413.148040] ? __kthread_parkme+0xce/0x1a0 [ 413.152279] ? trace_hardirqs_off_caller+0x310/0x310 [ 413.157389] ? trace_hardirqs_off_caller+0x310/0x310 [ 413.162508] ? lockdep_init_map+0x9/0x10 [ 413.166584] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 413.171841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.177389] ? __kthread_parkme+0xfb/0x1a0 [ 413.181642] kthread+0x35a/0x420 [ 413.185017] ? reset_hung_task_detector+0xd0/0xd0 [ 413.189865] ? kthread_stop+0x900/0x900 [ 413.193851] ret_from_fork+0x3a/0x50 [ 413.197710] Sending NMI from CPU 0 to CPUs 1: [ 413.204215] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.725 msecs [ 413.204270] NMI backtrace for cpu 1 [ 413.204277] CPU: 1 PID: 7397 Comm: syz-executor0 Not tainted 4.19.0+ #303 [ 413.204285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.204290] RIP: 0010:mark_page_accessed+0x14c/0x2040 [ 413.204304] Code: f2 c7 40 74 00 f2 f2 f2 c7 40 78 f2 f2 f2 f2 c7 40 7c 00 f2 f2 f2 c7 80 80 00 00 00 f2 f2 f2 f2 c7 80 84 00 00 00 00 f2 f2 f2 80 88 00 00 00 f2 f2 f2 f2 c7 80 8c 00 00 00 00 f2 f2 f2 c7 80 [ 413.204309] RSP: 0018:ffff88018193e9b8 EFLAGS: 00000296 [ 413.204319] RAX: ffffed0030327d3a RBX: ffffea0006286e80 RCX: ffffc90001e6c000 [ 413.204326] RDX: 0000000000040000 RSI: ffffffff819d53a5 RDI: ffffea0006286e80 [ 413.204332] RBP: ffff88018193eed8 R08: ffff880181930400 R09: ffffed003b5e5b57 [ 413.204338] R10: 0000000000000002 R11: ffff8801daf2dabb R12: ffff88018193eeb0 [ 413.204345] R13: ffffea0006286e88 R14: 1ffff10030327d3a R15: dffffc0000000000 [ 413.204352] FS: 00007fa48b32a700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 413.204357] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 413.204363] CR2: ffffffffff600400 CR3: 00000001c2da5000 CR4: 00000000001406e0 [ 413.204367] Call Trace: [ 413.204371] ? activate_page+0x1040/0x1040 [ 413.204375] ? find_held_lock+0x36/0x1c0 [ 413.204380] ? find_get_entry+0x2cb/0xc40 [ 413.204384] ? lock_downgrade+0x900/0x900 [ 413.204389] ? check_preemption_disabled+0x48/0x280 [ 413.204394] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 413.204398] ? kasan_check_read+0x11/0x20 [ 413.204403] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 413.204408] ? rcu_softirq_qs+0x20/0x20 [ 413.204412] ? find_get_entry+0x2f2/0xc40 [ 413.204427] ? filemap_map_pages+0x1990/0x1990 [ 413.204432] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 413.204438] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 413.204449] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.204454] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 413.204458] ? zap_class+0x640/0x640 [ 413.204463] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.204468] ? pagecache_get_page+0x2d8/0xf00 [ 413.204472] ? __lock_is_held+0xb5/0x140 [ 413.204477] ? add_lock_to_list.isra.28+0x4c0/0x4c0 [ 413.204483] ? perf_trace_sched_process_exec+0x860/0x860 [ 413.204487] ? print_usage_bug+0xc0/0xc0 [ 413.204492] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 413.204496] ? __might_sleep+0x95/0x190 [ 413.204500] pagecache_get_page+0x7cd/0xf00 [ 413.204506] ? find_get_pages_contig+0x15b0/0x15b0 [ 413.204510] ? __find_get_block+0x2f7/0xf20 [ 413.204514] ? __find_get_block+0x2f7/0xf20 [ 413.204519] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 413.204524] ? trace_hardirqs_on+0xbd/0x310 [ 413.204528] ? __getblk_gfp+0x2b3/0xd50 [ 413.204533] ? trace_hardirqs_off_caller+0x310/0x310 [ 413.204538] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.204543] ? check_preemption_disabled+0x48/0x280 [ 413.204547] ? __find_get_block+0x3be/0xf20 [ 413.204552] ? try_to_free_buffers+0xc80/0xc80 [ 413.204557] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 413.204562] ? unlock_page+0x2c2/0x4c0 [ 413.204566] ? wake_up_page_bit+0x6f0/0x6f0 [ 413.204571] ? write_comp_data+0x70/0x70 [ 413.204576] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.204581] ? init_page_buffers+0x433/0x570 [ 413.204586] ? __set_page_dirty_buffers+0x810/0x810 [ 413.204590] ? __getblk_gfp+0x2ea/0xd50 [ 413.204594] ? __getblk_gfp+0x2d2/0xd50 [ 413.204598] __getblk_gfp+0x3b0/0xd50 [ 413.204603] ? __find_get_block+0xf20/0xf20 [ 413.204607] ? __lock_is_held+0xb5/0x140 [ 413.204613] ? perf_trace_sched_process_exec+0x860/0x860 [ 413.204617] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 413.204622] ? kasan_check_write+0x14/0x20 [ 413.204626] ? __brelse+0x104/0x180 [ 413.204630] ? block_commit_write+0x30/0x30 [ 413.204634] __bread_gfp+0x2d/0x310 [ 413.204639] fat__get_entry+0x5a6/0xa40 [ 413.204643] ? fat_ioctl_filldir+0x560/0x560 [ 413.204648] ? fat_get_short_entry+0x202/0x2c0 [ 413.204652] fat_get_short_entry+0x13c/0x2c0 [ 413.204656] fat_subdirs+0x142/0x290 [ 413.204661] ? fat_dir_ioctl+0x1b0/0x1b0 [ 413.204665] ? _raw_spin_unlock+0x2c/0x50 [ 413.204670] ? inode_sb_list_add+0x213/0x2f0 [ 413.204674] ? evict_inodes+0x610/0x610 [ 413.204678] ? no_open+0x10/0x10 [ 413.204682] ? _raw_spin_unlock+0x2c/0x50 [ 413.204687] fat_fill_super+0x2a16/0x42e0 [ 413.204691] ? fat_flush_inodes+0x1a0/0x1a0 [ 413.204697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.204701] ? vsnprintf+0x20d/0x1b60 [ 413.204705] ? pointer+0x990/0x990 [ 413.204709] ? snprintf+0xae/0xe0 [ 413.204713] ? vsprintf+0x40/0x40 [ 413.204717] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 413.204722] ? set_blocksize+0x2c1/0x340 [ 413.204726] msdos_fill_super+0x2e/0x40 [ 413.204730] mount_bdev+0x30c/0x3e0 [ 413.204734] ? msdos_mount+0x40/0x40 [ 413.204738] msdos_mount+0x34/0x40 [ 413.204742] mount_fs+0xae/0x31d [ 413.204746] vfs_kern_mount.part.35+0xdc/0x4f0 [ 413.204750] ? may_umount+0xb0/0xb0 [ 413.204755] ? _raw_read_unlock+0x2c/0x50 [ 413.204759] ? __get_fs_type+0x97/0xc0 [ 413.204763] do_mount+0x581/0x31f0 [ 413.204768] ? check_preemption_disabled+0x48/0x280 [ 413.204772] ? copy_mount_string+0x40/0x40 [ 413.204777] ? copy_mount_options+0x5f/0x430 [ 413.204782] ? rcu_read_lock_sched_held+0x14f/0x180 [ 413.204787] ? kmem_cache_alloc_trace+0x353/0x750 [ 413.204792] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.204797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.204802] ? copy_mount_options+0x315/0x430 [ 413.204806] ksys_mount+0x12d/0x140 [ 413.204810] __x64_sys_mount+0xbe/0x150 [ 413.204814] do_syscall_64+0x1b9/0x820 [ 413.204819] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 413.204824] ? syscall_return_slowpath+0x5e0/0x5e0 [ 413.204829] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.204834] ? trace_hardirqs_on_caller+0x310/0x310 [ 413.204839] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 413.204844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.204849] ? prepare_exit_to_usermode+0x291/0x3b0 [ 413.204854] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.204859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.204863] RIP: 0033:0x459fda [ 413.204877] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 413.204881] RSP: 002b:00007fa48b329a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 413.204892] RAX: ffffffffffffffda RBX: 00007fa48b329b30 RCX: 0000000000459fda [ 413.204899] RDX: 00007fa48b329ad0 RSI: 0000000020000100 RDI: 00007fa48b329af0 [ 413.204905] RBP: 0000000020000100 R08: 00007fa48b329b30 R09: 00007fa48b329ad0 [ 413.204911] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 413.204918] R13: 0000000000000000 R14: 00000000004d7e48 R15: 00000000ffffffff [ 413.212475] Kernel panic - not syncing: hung_task: blocked tasks [ 413.855620] CPU: 0 PID: 980 Comm: khungtaskd Not tainted 4.19.0+ #303 [ 413.862203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.871559] Call Trace: [ 413.874166] dump_stack+0x244/0x39d [ 413.877808] ? dump_stack_print_info.cold.1+0x20/0x20 [ 413.883090] panic+0x238/0x4e7 [ 413.886294] ? add_taint.cold.5+0x16/0x16 [ 413.890472] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 413.895936] ? nmi_trigger_cpumask_backtrace+0x1c4/0x1ed [ 413.901402] ? nmi_trigger_cpumask_backtrace+0x173/0x1ed [ 413.906878] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 413.912356] watchdog+0xb4f/0x1050 [ 413.915917] ? reset_hung_task_detector+0xd0/0xd0 [ 413.920776] ? __kthread_parkme+0xce/0x1a0 [ 413.925025] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 413.930137] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 413.935263] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 413.939854] ? trace_hardirqs_on+0xbd/0x310 [ 413.944206] ? kasan_check_read+0x11/0x20 [ 413.948363] ? __kthread_parkme+0xce/0x1a0 [ 413.952606] ? trace_hardirqs_off_caller+0x310/0x310 [ 413.957889] ? trace_hardirqs_off_caller+0x310/0x310 [ 413.963006] ? lockdep_init_map+0x9/0x10 [ 413.967081] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 413.972193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.977737] ? __kthread_parkme+0xfb/0x1a0 [ 413.981984] kthread+0x35a/0x420 [ 413.985365] ? reset_hung_task_detector+0xd0/0xd0 [ 413.990215] ? kthread_stop+0x900/0x900 [ 413.994200] ret_from_fork+0x3a/0x50 [ 413.998849] Kernel Offset: disabled [ 414.002479] Rebooting in 86400 seconds..