[info] Using makefile-style concurrent boot in runlevel 2. [ 24.398989] audit: type=1800 audit(1541565677.939:21): pid=5498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [ 24.423393] audit: type=1800 audit(1541565677.939:22): pid=5498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2447 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.59' (ECDSA) to the list of known hosts. 2018/11/07 04:41:31 fuzzer started 2018/11/07 04:41:33 dialing manager at 10.128.0.26:33665 2018/11/07 04:41:41 syscalls: 1 2018/11/07 04:41:41 code coverage: enabled 2018/11/07 04:41:41 comparison tracing: enabled 2018/11/07 04:41:41 setuid sandbox: enabled 2018/11/07 04:41:41 namespace sandbox: enabled 2018/11/07 04:41:41 Android sandbox: /sys/fs/selinux/policy does not exist 2018/11/07 04:41:41 fault injection: enabled 2018/11/07 04:41:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/11/07 04:41:41 net packed injection: enabled 2018/11/07 04:41:41 net device setup: enabled 04:44:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) flock(r2, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={r3, 0x7fffffff}, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) syzkaller login: [ 206.490230] IPVS: ftp: loaded support on port[0] = 21 04:44:20 executing program 1: mmap(&(0x7f000053a000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f000094a000/0x9000)=nil, 0x9000, 0xffffff, &(0x7f0000000500), 0x0, 0x2000000000002) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x0, 0x5}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000480)=0x4) write(0xffffffffffffffff, &(0x7f0000fa8000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000cfd000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) [ 206.706613] IPVS: ftp: loaded support on port[0] = 21 04:44:20 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0xffffffe9, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0xa9e, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x2100, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x0, 0xad4]}) [ 206.991490] IPVS: ftp: loaded support on port[0] = 21 04:44:20 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, "717565756530000000000000000000000537ea24082edebd0000000000000000ffffffe3000000000000000000000000008100"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x404c534a, &(0x7f000021af98)={0x0, 0x0, 0xfffffdfd}) [ 207.451522] IPVS: ftp: loaded support on port[0] = 21 04:44:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cuse\x00', 0x2, 0x0) [ 208.005057] IPVS: ftp: loaded support on port[0] = 21 [ 208.115522] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.122493] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.150812] device bridge_slave_0 entered promiscuous mode [ 208.309736] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.338408] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.346221] device bridge_slave_1 entered promiscuous mode 04:44:21 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='attr/prev\x00') sendfile(r0, r1, &(0x7f0000000040), 0x10000000000443) [ 208.492249] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 208.584030] IPVS: ftp: loaded support on port[0] = 21 [ 208.586269] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.599942] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.607485] device bridge_slave_0 entered promiscuous mode [ 208.637826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 208.727437] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.752279] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.759650] device bridge_slave_1 entered promiscuous mode [ 208.855886] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.873526] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.881308] device bridge_slave_0 entered promiscuous mode [ 208.942995] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.011111] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.023324] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.044536] device bridge_slave_1 entered promiscuous mode [ 209.066333] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.113822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 209.170138] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 209.215496] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.313766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 209.453307] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.572868] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.605020] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.611481] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.632387] device bridge_slave_0 entered promiscuous mode [ 209.697070] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 209.717760] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 209.732760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.763741] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.771664] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.797013] device bridge_slave_1 entered promiscuous mode [ 209.821072] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 209.862375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 209.897979] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.917097] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 209.932984] team0: Port device team_slave_0 added [ 209.955733] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 209.966400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.988642] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 210.057571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 210.071311] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.087508] team0: Port device team_slave_1 added [ 210.095662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 210.132778] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.184343] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.209285] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.243099] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.257671] device bridge_slave_0 entered promiscuous mode [ 210.267782] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.275585] team0: Port device team_slave_0 added [ 210.321591] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.359628] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.388518] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.397521] device bridge_slave_1 entered promiscuous mode [ 210.406903] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 210.433201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.448709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.468723] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 210.484103] team0: Port device team_slave_0 added [ 210.489631] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.500417] team0: Port device team_slave_1 added [ 210.524736] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 210.535013] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 210.544746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.565729] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.585587] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 210.601070] team0: Port device team_slave_1 added [ 210.608354] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.616759] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.624228] device bridge_slave_0 entered promiscuous mode [ 210.633302] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.643506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.651681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.684016] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 210.712859] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 210.724467] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 210.731340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.757002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.807416] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.820151] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.833731] device bridge_slave_1 entered promiscuous mode [ 210.847413] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 210.860417] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 210.873704] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.889435] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.939958] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 210.953318] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 210.960970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.983962] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.995219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.009374] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 211.020433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.030210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.048127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.062374] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 211.070922] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.092371] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 211.102337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.111814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.141241] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 211.151617] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.169761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.187769] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.240927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.256798] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.279481] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 211.308082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.328831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.472462] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.500059] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 211.537461] team0: Port device team_slave_0 added [ 211.613502] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.666947] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 211.682795] team0: Port device team_slave_1 added [ 211.773060] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 211.779966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.792944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.802742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 211.864647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.892537] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 211.900906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.926980] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.933517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.940600] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.947004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.978658] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 211.989308] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 212.012487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.020358] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.070383] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.093058] team0: Port device team_slave_0 added [ 212.111577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.133078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.141077] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.244711] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 212.265483] team0: Port device team_slave_1 added [ 212.272958] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.296659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.313338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.345390] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 212.363588] team0: Port device team_slave_0 added [ 212.395465] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.457261] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 212.474312] team0: Port device team_slave_1 added [ 212.561779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.615246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.633916] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.651920] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.658326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.665010] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.671377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.685380] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.694246] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.700612] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.707317] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.713699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.721497] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 212.730719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.758016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.783395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.808983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 212.829248] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.847446] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.865082] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 212.877040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.901300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.948227] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 212.978003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.996475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.053709] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 213.060814] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.070119] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.582690] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.589103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.595742] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.602125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.630449] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.647106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.668396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.676076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.195186] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.201603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.208313] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.214723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.225088] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 214.365535] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.371933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.378689] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.385197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.436766] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 214.652302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 214.662917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.993951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.477713] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 217.526098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.908279] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 217.920562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.953237] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.975782] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 217.983442] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.192469] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.310081] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.383657] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 218.389839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.402838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.452795] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 218.626273] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 218.836788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.875842] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.918924] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 218.925801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.936582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.060965] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 219.079313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.094164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.233610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.350122] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 219.403721] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.478784] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.626838] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 219.764113] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 219.771186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.779115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.184982] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 220.191340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.199371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.226114] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.673473] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.268213] hrtimer: interrupt took 38083 ns [ 221.587823] dccp_invalid_packet: invalid packet type [ 221.605020] dccp_invalid_packet: invalid packet type 04:44:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0xffffffe9, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0xa9e, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x2100, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x0, 0xad4]}) 04:44:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) flock(r2, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={r3, 0x7fffffff}, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) [ 221.788295] dccp_invalid_packet: invalid packet type 04:44:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0xffffffe9, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0xa9e, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x2100, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x0, 0xad4]}) [ 221.883505] dccp_invalid_packet: invalid packet type 04:44:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0xffffffe9, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0xa9e, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x140]}, @local, {[], @tcp={{0x2100, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x0, 0xad4]}) [ 222.058903] dccp_invalid_packet: invalid packet type 04:44:35 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, "717565756530000000000000000000000537ea24082edebd0000000000000000ffffffe3000000000000000000000000008100"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x404c534a, &(0x7f000021af98)={0x0, 0x0, 0xfffffdfd}) 04:44:35 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) flock(r2, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={r3, 0x7fffffff}, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) 04:44:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) flock(r2, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={r3, 0x7fffffff}, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) [ 222.377553] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 04:44:36 executing program 1: mmap(&(0x7f000053a000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f000094a000/0x9000)=nil, 0x9000, 0xffffff, &(0x7f0000000500), 0x0, 0x2000000000002) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x0, 0x5}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000480)=0x4) write(0xffffffffffffffff, &(0x7f0000fa8000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000cfd000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) 04:44:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, "717565756530000000000000000000000537ea24082edebd0000000000000000ffffffe3000000000000000000000000008100"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x404c534a, &(0x7f000021af98)={0x0, 0x0, 0xfffffdfd}) 04:44:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) flock(r2, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={r3, 0x7fffffff}, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) 04:44:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cuse\x00', 0x2, 0x0) 04:44:36 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='attr/prev\x00') sendfile(r0, r1, &(0x7f0000000040), 0x10000000000443) 04:44:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, "717565756530000000000000000000000537ea24082edebd0000000000000000ffffffe3000000000000000000000000008100"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x404c534a, &(0x7f000021af98)={0x0, 0x0, 0xfffffdfd}) 04:44:36 executing program 1: mmap(&(0x7f000053a000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f000094a000/0x9000)=nil, 0x9000, 0xffffff, &(0x7f0000000500), 0x0, 0x2000000000002) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x0, 0x5}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000480)=0x4) write(0xffffffffffffffff, &(0x7f0000fa8000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000cfd000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) 04:44:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f0000000640), 0x0) 04:44:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cuse\x00', 0x2, 0x0) 04:44:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) flock(r2, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={r3, 0x7fffffff}, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) 04:44:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cuse\x00', 0x2, 0x0) [ 223.470421] Unknown ioctl 1075883590 [ 223.478909] Unknown ioctl 1075883590 [ 223.507657] Unknown ioctl 1075883590 04:44:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cuse\x00', 0x2, 0x0) [ 223.525777] Unknown ioctl 1075883590 [ 223.529705] Unknown ioctl 1075883590 [ 223.534582] Unknown ioctl 1075883590 [ 223.538468] Unknown ioctl 1075883590 [ 223.552791] Unknown ioctl 1075883590 [ 223.556723] Unknown ioctl 1075883590 [ 223.561986] Unknown ioctl 1075883590 [ 223.569979] Unknown ioctl 1075883590 04:44:37 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='attr/prev\x00') sendfile(r0, r1, &(0x7f0000000040), 0x10000000000443) [ 223.577730] Unknown ioctl 1075883590 [ 223.582648] Unknown ioctl 1075883590 [ 223.586552] Unknown ioctl 1075883590 [ 223.594767] Unknown ioctl 1075883590 [ 223.604865] Unknown ioctl 1075883590 [ 223.608598] Unknown ioctl 1075883590 [ 223.608611] Unknown ioctl 1075883590 [ 223.608621] Unknown ioctl 1075883590 [ 223.608629] Unknown ioctl 1075883590 [ 223.608644] Unknown ioctl 1075883590 04:44:37 executing program 1: mmap(&(0x7f000053a000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f000094a000/0x9000)=nil, 0x9000, 0xffffff, &(0x7f0000000500), 0x0, 0x2000000000002) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)={0x0, 0x0, 0x5}) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000480)=0x4) write(0xffffffffffffffff, &(0x7f0000fa8000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000cfd000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c7442400090000006766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) [ 223.608652] Unknown ioctl 1075883590 [ 223.608663] Unknown ioctl 1075883590 [ 223.617658] Unknown ioctl 1075883590 [ 223.640800] Unknown ioctl 1075883590 [ 223.651922] Unknown ioctl 1075883590 [ 223.656380] Unknown ioctl 1075883590 [ 223.660158] Unknown ioctl 1075883590 [ 223.664282] Unknown ioctl 1075883590 [ 223.667994] Unknown ioctl 1075883590 [ 223.671699] Unknown ioctl 1075883590 [ 223.676354] Unknown ioctl 1075883590 [ 223.680095] Unknown ioctl 1075883590 [ 223.684103] Unknown ioctl 1075883590 [ 223.687825] Unknown ioctl 1075883590 [ 223.687835] Unknown ioctl 1075883590 [ 223.687844] Unknown ioctl 1075883590 [ 223.687853] Unknown ioctl 1075883590 [ 223.687862] Unknown ioctl 1075883590 [ 223.687871] Unknown ioctl 1075883590 [ 223.687881] Unknown ioctl 1075883590 [ 223.687889] Unknown ioctl 1075883590 [ 223.687897] Unknown ioctl 1075883590 [ 223.687905] Unknown ioctl 1075883590 [ 223.687914] Unknown ioctl 1075883590 [ 223.687927] Unknown ioctl 1075883590 [ 223.687934] Unknown ioctl 1075883590 [ 223.687941] Unknown ioctl 1075883590 [ 223.687947] Unknown ioctl 1075883590 [ 223.687954] Unknown ioctl 1075883590 04:44:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f0000000640), 0x0) 04:44:37 executing program 4: clock_settime(0x100, &(0x7f0000000240)) 04:44:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cuse\x00', 0x2, 0x0) 04:44:37 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='attr/prev\x00') sendfile(r0, r1, &(0x7f0000000040), 0x10000000000443) 04:44:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) flock(r2, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={r3, 0x7fffffff}, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r5, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) [ 224.034932] Unknown ioctl 1075883590 04:44:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000080)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000301ffff808fddde000000000000001f"], 0x14}}, 0x0) recvmmsg(r1, &(0x7f00000013c0), 0x1ad, 0x200002, &(0x7f0000000c40)={0x77359400}) [ 224.058239] Unknown ioctl 1075883590 04:44:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cuse\x00', 0x2, 0x0) [ 224.082315] Unknown ioctl 1075883590 [ 224.102464] Unknown ioctl 1075883590 [ 224.122407] Unknown ioctl 1075883590 [ 224.126604] Unknown ioctl 1075883590 [ 224.132000] Unknown ioctl 1075883590 04:44:37 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x4c000000) [ 224.195950] Unknown ioctl 1075883590 [ 224.199866] Unknown ioctl 1075883590 [ 224.206816] Unknown ioctl 1075883590 [ 224.215911] Unknown ioctl 1075883590 [ 224.219795] Unknown ioctl 1075883590 [ 224.224751] Unknown ioctl 1075883590 [ 224.228623] Unknown ioctl 1075883590 [ 224.233140] Unknown ioctl 1075883590 [ 224.237021] Unknown ioctl 1075883590 [ 224.240857] Unknown ioctl 1075883590 [ 224.246665] Unknown ioctl 1075883590 04:44:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'authenc(sha3-512,ctr(des3_ede))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(twofish)\x00'}, 0x58) [ 224.286349] Unknown ioctl 1075883590 [ 224.295296] Unknown ioctl 1075883590 [ 224.309192] Unknown ioctl 1075883590 [ 224.316246] Unknown ioctl 1075883590 [ 224.320107] Unknown ioctl 1075883590 [ 224.330836] Unknown ioctl 1075883590 [ 224.335077] Unknown ioctl 1075883590 04:44:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f0000000640), 0x0) 04:44:37 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 224.437393] Unknown ioctl 1075883590 [ 224.441304] Unknown ioctl 1075883590 [ 224.446041] Unknown ioctl 1075883590 [ 224.450090] Unknown ioctl 1075883590 [ 224.454867] Unknown ioctl 1075883590 [ 224.458742] Unknown ioctl 1075883590 [ 224.463924] Unknown ioctl 1075883590 [ 224.467805] Unknown ioctl 1075883590 [ 224.471663] Unknown ioctl 1075883590 [ 224.475924] Unknown ioctl 1075883590 [ 224.479813] Unknown ioctl 1075883590 [ 224.484117] Unknown ioctl 1075883590 04:44:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00syz1\x00', 0x200002, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x20201) fcntl$setstatus(r4, 0x4, 0x2800) ioctl$TCXONC(r4, 0x540a, 0x0) write(r4, &(0x7f0000000240)=')', 0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000698000)=0xe) close(r3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x28, &(0x7f0000000300)}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r1, r0, 0xf}, 0xfffffffffffffe38) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000640)={r1, 0xffffffffffffffff, 0xa}, 0x10) [ 224.488038] Unknown ioctl 1075883590 [ 224.491987] Unknown ioctl 1075883590 [ 224.496082] Unknown ioctl 1075883590 [ 224.499991] Unknown ioctl 1075883590 [ 224.504114] Unknown ioctl 1075883590 [ 224.508011] Unknown ioctl 1075883590 [ 224.522251] Unknown ioctl 1075883590 [ 224.527018] Unknown ioctl 1075883590 [ 224.531957] Unknown ioctl 1075883590 [ 224.537129] Unknown ioctl 1075883590 [ 224.543304] Unknown ioctl 1075883590 [ 224.563665] Unknown ioctl 1075883590 [ 224.571858] [ 224.587020] ********************************************************** [ 224.597690] Unknown ioctl 1075883590 04:44:38 executing program 5: clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) ioprio_set$pid(0x2, 0xffffffffffffffff, 0x0) [ 224.628163] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 224.657941] ** ** [ 224.665626] ** trace_printk() being used. Allocating extra memory. ** [ 224.697209] ** ** [ 224.735544] ** This means that this is a DEBUG kernel and it is ** 04:44:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f0000000640), 0x0) 04:44:38 executing program 1: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000040)="1f0000000104ff40003b54c007110000f30501000b000300000000000000cf", 0x1f) [ 224.764771] ** unsafe for production use. ** 04:44:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={&(0x7f0000000240)=@setlink={0x24, 0x13, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4}]}, 0x24}}, 0x0) 04:44:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 04:44:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) [ 224.827523] ** ** [ 224.890649] ** If you see this message and you are not debugging ** [ 224.906172] ** the kernel, report this immediately to your vendor! ** [ 224.915631] ** ** [ 224.926590] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** 04:44:38 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000640)=""/20, 0x14}, {&(0x7f00000006c0)=""/13, 0xd}], 0x5}, 0x9}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/136, 0x88}], 0x1, &(0x7f0000000900)=""/47, 0x2f, 0x7}, 0x6}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/175, 0xaf}], 0x2, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}, 0x435}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c80)=""/231, 0xe7}, {&(0x7f0000000d80)=""/84, 0x54}], 0x2, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/186, 0xba}, {&(0x7f0000002500)=""/21, 0x15}], 0x2, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000003600)=@l2, 0x80, &(0x7f0000003780), 0x0, &(0x7f00000037c0)=""/220, 0xdc, 0x100}, 0xb}], 0x6, 0x102, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 224.930145] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 224.933948] ********************************************************** [ 224.957591] Unknown ioctl 1075883590 [ 224.963241] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 224.970690] Unknown ioctl 1075883590 [ 224.978064] Unknown ioctl 1075883590 [ 224.985090] Unknown ioctl 1075883590 [ 224.988980] Unknown ioctl 1075883590 [ 225.002668] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 225.007566] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 225.019845] Unknown ioctl 1075883590 [ 225.038716] Unknown ioctl 1075883590 [ 225.052698] Unknown ioctl 1075883590 [ 225.059252] Unknown ioctl 1075883590 [ 225.063506] Unknown ioctl 1075883590 [ 225.067377] Unknown ioctl 1075883590 [ 225.071242] Unknown ioctl 1075883590 [ 225.075436] Unknown ioctl 1075883590 [ 225.079315] Unknown ioctl 1075883590 [ 225.084489] Unknown ioctl 1075883590 [ 225.088362] Unknown ioctl 1075883590 [ 225.092537] Unknown ioctl 1075883590 [ 225.096405] Unknown ioctl 1075883590 [ 225.100263] Unknown ioctl 1075883590 [ 225.106363] Unknown ioctl 1075883590 [ 225.110316] Unknown ioctl 1075883590 [ 225.115694] Unknown ioctl 1075883590 [ 225.119593] Unknown ioctl 1075883590 [ 225.144174] Unknown ioctl 1075883590 [ 225.154665] Unknown ioctl 1075883590 04:44:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)="6f6f6d5f61646a00000026e7080900040000") sendfile(r1, r0, &(0x7f0000000000)=0x5d, 0x11) 04:44:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x40) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0xffffffffffffffee}, 0x8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x14) sendto$inet6(r2, &(0x7f0000000180)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}, [0x0, 0x7]}}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) [ 225.252977] syz-executor0 (7405): /proc/7404/oom_adj is deprecated, please use /proc/7404/oom_score_adj instead. [ 225.294049] syz-executor4 (7394) used greatest stack depth: 15744 bytes left 04:44:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 04:44:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ff8000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000000, 0x800002c0, 0x40000001, 0x3]}) 04:44:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000240)=ANY=[]) symlink(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000240)='./file1/file0\x00') mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='./file2\x00') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000), 0x315, &(0x7f0000000180)={&(0x7f0000000700)=@acquire={0x128, 0x17, 0x0, 0x0, 0x0, {{@in=@loopback}, @in6=@local, {@in=@multicast1, @in6}, {{@in=@broadcast, @in6=@local}}}}, 0x128}, 0x8}, 0x0) rename(&(0x7f0000000140)='./file2\x00', &(0x7f00000019c0)='./file1\x00') 04:44:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) 04:44:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x40) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0xffffffffffffffee}, 0x8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x14) sendto$inet6(r2, &(0x7f0000000180)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}, [0x0, 0x7]}}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) [ 225.680760] __ntfs_error: 8 callbacks suppressed [ 225.680771] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 04:44:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ff8000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000000, 0x800002c0, 0x40000001, 0x3]}) 04:44:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000640)=""/20, 0x14}, {&(0x7f00000006c0)=""/13, 0xd}], 0x5}, 0x9}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/136, 0x88}], 0x1, &(0x7f0000000900)=""/47, 0x2f, 0x7}, 0x6}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/175, 0xaf}], 0x2, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}, 0x435}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c80)=""/231, 0xe7}, {&(0x7f0000000d80)=""/84, 0x54}], 0x2, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/186, 0xba}, {&(0x7f0000002500)=""/21, 0x15}], 0x2, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000003600)=@l2, 0x80, &(0x7f0000003780), 0x0, &(0x7f00000037c0)=""/220, 0xdc, 0x100}, 0xb}], 0x6, 0x102, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 04:44:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000240)=ANY=[]) symlink(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000240)='./file1/file0\x00') mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='./file2\x00') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000), 0x315, &(0x7f0000000180)={&(0x7f0000000700)=@acquire={0x128, 0x17, 0x0, 0x0, 0x0, {{@in=@loopback}, @in6=@local, {@in=@multicast1, @in6}, {{@in=@broadcast, @in6=@local}}}}, 0x128}, 0x8}, 0x0) rename(&(0x7f0000000140)='./file2\x00', &(0x7f00000019c0)='./file1\x00') 04:44:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 04:44:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ff8000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000000, 0x800002c0, 0x40000001, 0x3]}) 04:44:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) 04:44:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x40) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0xffffffffffffffee}, 0x8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x14) sendto$inet6(r2, &(0x7f0000000180)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}, [0x0, 0x7]}}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) [ 226.413434] overlayfs: failed to resolve './file1': -2 04:44:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000ff8000/0x1000)=nil}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x40000000, 0x800002c0, 0x40000001, 0x3]}) [ 226.526715] ntfs: (device loop3): parse_options(): Unrecognized mount option ./file1/file0. 04:44:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000240)=ANY=[]) symlink(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000240)='./file1/file0\x00') mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='./file2\x00') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000), 0x315, &(0x7f0000000180)={&(0x7f0000000700)=@acquire={0x128, 0x17, 0x0, 0x0, 0x0, {{@in=@loopback}, @in6=@local, {@in=@multicast1, @in6}, {{@in=@broadcast, @in6=@local}}}}, 0x128}, 0x8}, 0x0) rename(&(0x7f0000000140)='./file2\x00', &(0x7f00000019c0)='./file1\x00') 04:44:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) [ 226.816407] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 04:44:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000640)=""/20, 0x14}, {&(0x7f00000006c0)=""/13, 0xd}], 0x5}, 0x9}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/136, 0x88}], 0x1, &(0x7f0000000900)=""/47, 0x2f, 0x7}, 0x6}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/175, 0xaf}], 0x2, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}, 0x435}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c80)=""/231, 0xe7}, {&(0x7f0000000d80)=""/84, 0x54}], 0x2, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/186, 0xba}, {&(0x7f0000002500)=""/21, 0x15}], 0x2, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000003600)=@l2, 0x80, &(0x7f0000003780), 0x0, &(0x7f00000037c0)=""/220, 0xdc, 0x100}, 0xb}], 0x6, 0x102, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 04:44:40 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000640)=""/20, 0x14}, {&(0x7f00000006c0)=""/13, 0xd}], 0x5}, 0x9}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/136, 0x88}], 0x1, &(0x7f0000000900)=""/47, 0x2f, 0x7}, 0x6}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/175, 0xaf}], 0x2, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}, 0x435}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c80)=""/231, 0xe7}, {&(0x7f0000000d80)=""/84, 0x54}], 0x2, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/186, 0xba}, {&(0x7f0000002500)=""/21, 0x15}], 0x2, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000003600)=@l2, 0x80, &(0x7f0000003780), 0x0, &(0x7f00000037c0)=""/220, 0xdc, 0x100}, 0xb}], 0x6, 0x102, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 04:44:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 04:44:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x40) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0xffffffffffffffee}, 0x8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x14) sendto$inet6(r2, &(0x7f0000000180)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}, [0x0, 0x7]}}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) 04:44:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000240)=ANY=[]) symlink(&(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000240)='./file1/file0\x00') mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)='./file2\x00') r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000), 0x315, &(0x7f0000000180)={&(0x7f0000000700)=@acquire={0x128, 0x17, 0x0, 0x0, 0x0, {{@in=@loopback}, @in6=@local, {@in=@multicast1, @in6}, {{@in=@broadcast, @in6=@local}}}}, 0x128}, 0x8}, 0x0) rename(&(0x7f0000000140)='./file2\x00', &(0x7f00000019c0)='./file1\x00') [ 227.441408] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 04:44:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x40) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0xffffffffffffffee}, 0x8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x14) sendto$inet6(r2, &(0x7f0000000180)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}, [0x0, 0x7]}}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) 04:44:41 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000640)=""/20, 0x14}, {&(0x7f00000006c0)=""/13, 0xd}], 0x5}, 0x9}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/136, 0x88}], 0x1, &(0x7f0000000900)=""/47, 0x2f, 0x7}, 0x6}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/175, 0xaf}], 0x2, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}, 0x435}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c80)=""/231, 0xe7}, {&(0x7f0000000d80)=""/84, 0x54}], 0x2, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/186, 0xba}, {&(0x7f0000002500)=""/21, 0x15}], 0x2, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000003600)=@l2, 0x80, &(0x7f0000003780), 0x0, &(0x7f00000037c0)=""/220, 0xdc, 0x100}, 0xb}], 0x6, 0x102, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 04:44:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) 04:44:41 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x200, 0x8000000000079) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000080)=ANY=[@ANYBLOB="23031c"]) 04:44:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000640)=""/20, 0x14}, {&(0x7f00000006c0)=""/13, 0xd}], 0x5}, 0x9}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/136, 0x88}], 0x1, &(0x7f0000000900)=""/47, 0x2f, 0x7}, 0x6}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/175, 0xaf}], 0x2, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}, 0x435}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c80)=""/231, 0xe7}, {&(0x7f0000000d80)=""/84, 0x54}], 0x2, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/186, 0xba}, {&(0x7f0000002500)=""/21, 0x15}], 0x2, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000003600)=@l2, 0x80, &(0x7f0000003780), 0x0, &(0x7f00000037c0)=""/220, 0xdc, 0x100}, 0xb}], 0x6, 0x102, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 04:44:41 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x21, 0x0, 0x0) 04:44:41 executing program 5: creat(&(0x7f0000000700)='./bus\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) [ 228.105998] vhci_hcd: invalid port number 0 04:44:41 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000bd7000)={&(0x7f0000648eac)=@newsa={0x154, 0x10, 0x717, 0x0, 0x0, {{@in6=@mcast2, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0xa}, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@dev}}, @algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x154}}, 0x0) 04:44:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x40) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0xffffffffffffffee}, 0x8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x14) sendto$inet6(r2, &(0x7f0000000180)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}, [0x0, 0x7]}}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) 04:44:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000), 0xfffffffffffffd2b) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[], 0x0, 0x1) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0 '], 0xb) close(r0) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000080)={0x1d}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000440)='{user}eth0eth1\x00', &(0x7f0000000480)='trusted.overlay.upper\x00'], &(0x7f0000000140)) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000140)) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000100)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) 04:44:41 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x8001}) rt_tgsigqueueinfo(r1, r1, 0x1d, &(0x7f0000000140)={0x0, 0x0, 0xfffffffffffffff7}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) 04:44:41 executing program 5: creat(&(0x7f0000000700)='./bus\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 04:44:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) 04:44:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x1, &(0x7f00000001c0)) 04:44:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000440)=""/123, 0x7b}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000640)=""/20, 0x14}, {&(0x7f00000006c0)=""/13, 0xd}], 0x5}, 0x9}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000007c0)=""/136, 0x88}], 0x1, &(0x7f0000000900)=""/47, 0x2f, 0x7}, 0x6}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/175, 0xaf}], 0x2, &(0x7f0000000bc0)=""/189, 0xbd, 0xffffffffffffff7f}, 0x435}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c80)=""/231, 0xe7}, {&(0x7f0000000d80)=""/84, 0x54}], 0x2, &(0x7f0000000e40)=""/63, 0x3f, 0xeb6}, 0x7}, {{&(0x7f00000023c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/186, 0xba}, {&(0x7f0000002500)=""/21, 0x15}], 0x2, &(0x7f0000002600)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000003600)=@l2, 0x80, &(0x7f0000003780), 0x0, &(0x7f00000037c0)=""/220, 0xdc, 0x100}, 0xb}], 0x6, 0x102, &(0x7f0000003b00)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 04:44:42 executing program 5: creat(&(0x7f0000000700)='./bus\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 04:44:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x40) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000140)={0xffffffffffffffee}, 0x8) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x14) sendto$inet6(r2, &(0x7f0000000180)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}, [0x0, 0x7]}}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x98) 04:44:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001040101ffb0b3fffdffff2e0a0800000c000300010000007f0000010c00020000878600003c16ff"], 0x2c}}, 0x0) [ 228.831643] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 04:44:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) dup2(r0, r0) r1 = syz_open_dev$evdev(&(0x7f00000007c0)='/dev/input/event#\x00', 0x1, 0x4680) mknod(&(0x7f0000000680)='./file0\x00', 0xf1c0, 0x5) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x20400003, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0xfffffffffffffffb, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}}, 0x108) socket$packet(0x11, 0x0, 0x300) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x43cad3c8}, &(0x7f00000000c0)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000880), 0x336) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/loop-control\x00', 0x0, 0x0) sched_getattr(0x0, &(0x7f00000006c0), 0x30, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x1, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) eventfd2(0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f00000002c0)={[0x0, 0xf000], 0x100000000, 0x40, 0x5}) chdir(&(0x7f0000000640)='./file0\x00') syz_open_dev$midi(&(0x7f00000005c0)='/dev/midi#\x00', 0x3, 0x1a003) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="6ffff7ff7f00f6ffff6e75702e6e65742f7379307127"]) syz_mount_image$nfs(&(0x7f0000000400)='nfs\x00', &(0x7f0000000440)='./file0\x00', 0x6, 0x1, &(0x7f0000000500)=[{&(0x7f0000000480)="e055530f6d129a1f26f369d0f40163296baebc4df318e4dc6d023c352b43aa62436b3a65d021a31442db9aa8446d64c6f408942783c28664ae72bf933359d924aa84480698fa4541c7294bbf7b39", 0x4e, 0x4}], 0x10000, &(0x7f0000000580)="656d306d643573756d272b73656c696e75786574683173656c66276367726f7570fe00") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x20) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000540)={0x8000, 0x9}) [ 228.956753] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 228.986107] XFS (loop3): Mounting V4 Filesystem 04:44:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001040101ffb0b3fffdffff2e0a0800000c000300010000007f0000010c00020000878600003c16ff"], 0x2c}}, 0x0) [ 229.007247] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 229.017751] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 229.026563] XFS (loop3): totally zeroed log [ 229.033181] XFS (loop3): Metadata corruption detected at xfs_agi_verify+0x188/0x5a0, xfs_agi block 0x2 04:44:42 executing program 5: creat(&(0x7f0000000700)='./bus\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) [ 229.064168] XFS (loop3): Unmount and run xfs_repair [ 229.079665] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 229.112733] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.131544] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 229.156456] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.188720] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 229.191278] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 04:44:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001040101ffb0b3fffdffff2e0a0800000c000300010000007f0000010c00020000878600003c16ff"], 0x2c}}, 0x0) 04:44:42 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) r1 = eventfd2(0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000200)=r1) dup3(r1, r0, 0x0) 04:44:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001040101ffb0b3fffdffff2e0a0800000c000300010000007f0000010c00020000878600003c16ff"], 0x2c}}, 0x0) [ 229.248436] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.313203] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.321398] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.329764] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.338412] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.346990] XFS (loop3): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 229.368755] XFS (loop3): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 229.379612] XFS (loop3): Failed to read root inode 0x80, error 117 [ 229.434473] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. 04:44:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) [ 229.483456] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 04:44:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x1, &(0x7f00000001c0)) [ 229.541601] netlink: 'syz-executor4': attribute type 3 has an invalid length. 04:44:43 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) write$binfmt_aout(r0, &(0x7f0000000380), 0x20) 04:44:43 executing program 5: unshare(0x8000400) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, &(0x7f00000000c0)) exit(0x0) mknod(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) [ 229.584605] netlink: 'syz-executor1': attribute type 3 has an invalid length. 04:44:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001040101ffb0b3fffdffff2e0a0800000c000300010000007f0000010c00020000878600003c16ff"], 0x2c}}, 0x0) [ 229.703229] XFS (loop3): Mounting V4 Filesystem 04:44:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x115, 0x0) 04:44:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001040101ffb0b3fffdffff2e0a0800000c000300010000007f0000010c00020000878600003c16ff"], 0x2c}}, 0x0) [ 229.723425] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 229.740315] XFS (loop3): totally zeroed log [ 229.759654] XFS (loop3): Metadata corruption detected at xfs_agi_verify+0x188/0x5a0, xfs_agi block 0x2 [ 229.781305] netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. [ 229.789584] XFS (loop3): Unmount and run xfs_repair [ 229.789964] netlink: 'syz-executor4': attribute type 3 has an invalid length. [ 229.796412] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 229.809283] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.817760] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 04:44:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c00000001040101ffb0b3fffdffff2e0a0800000c000300010000007f0000010c00020000878600003c16ff"], 0x2c}}, 0x0) [ 229.826173] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.841361] netlink: 'syz-executor1': attribute type 3 has an invalid length. [ 229.855543] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.873450] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 04:44:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x115, 0x0) 04:44:43 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) write$binfmt_aout(r0, &(0x7f0000000380), 0x20) [ 229.899409] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.910363] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 229.919617] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 04:44:43 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x2000, 0xffffffffffffffff) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=@known='trusted.syz\x00', &(0x7f0000000100)='/vmnet0\x00', 0x11f, 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 229.940959] XFS (loop3): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 229.952809] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 229.974765] XFS (loop3): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 04:44:43 executing program 1: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000640)={0x0, 0x0}) dup2(r0, r1) getsockopt$sock_buf(r1, 0x1, 0x1c, &(0x7f0000000680)=""/4096, &(0x7f0000000000)=0x10) [ 230.008984] netlink: 'syz-executor4': attribute type 3 has an invalid length. [ 230.040619] XFS (loop3): Failed to read root inode 0x80, error 117 04:44:43 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) write$binfmt_aout(r0, &(0x7f0000000380), 0x20) 04:44:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x1, &(0x7f00000001c0)) 04:44:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x115, 0x0) [ 230.300750] XFS (loop3): Mounting V4 Filesystem [ 230.309177] XFS (loop3): totally zeroed log [ 230.315303] XFS (loop3): Metadata corruption detected at xfs_agi_verify+0x188/0x5a0, xfs_agi block 0x2 [ 230.325509] XFS (loop3): Unmount and run xfs_repair [ 230.330622] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 230.337429] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 230.345662] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 230.353965] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 230.362134] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 230.370275] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 230.378468] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 230.386636] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 230.394813] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 230.403002] XFS (loop3): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 230.412379] XFS (loop3): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 230.420890] XFS (loop3): Failed to read root inode 0x80, error 117 04:44:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0x31e, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) 04:44:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCCONS(r1, 0x541d) ioctl$TIOCCONS(r1, 0x541d) 04:44:44 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet_mreqsrc(r0, 0x11a, 0x1, &(0x7f0000000140)={@rand_addr=0x3033300, @multicast2=0xe000000a, @loopback}, 0x28) write$binfmt_aout(r0, &(0x7f0000000380), 0x20) 04:44:44 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) fanotify_mark(0xffffffffffffffff, 0x1000010, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) 04:44:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x115, 0x0) 04:44:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000000000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x1, &(0x7f00000001c0)) 04:44:44 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000740)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) 04:44:44 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_getmulticast={0x14, 0x3a, 0x201}, 0x14}}, 0x0) 04:44:44 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000200)={'veth0\x00', 0x8001}) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 04:44:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x8000000000001, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x5}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={r2, 0xa259}, &(0x7f0000000300)=0x8) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000240)=0x4) 04:44:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setrlimit(0xc00000000000007, &(0x7f00000000c0)) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 230.718742] XFS (loop3): Mounting V4 Filesystem [ 230.753988] XFS (loop3): totally zeroed log 04:44:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0x31e, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 230.793599] XFS (loop3): Metadata corruption detected at xfs_agi_verify+0x188/0x5a0, xfs_agi block 0x2 [ 230.820856] XFS (loop3): Unmount and run xfs_repair 04:44:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, 0xc) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) rt_sigprocmask(0x0, &(0x7f0000000080)={0x9}, &(0x7f0000000100), 0x8) 04:44:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0x31e, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 230.855279] XFS (loop3): First 128 bytes of corrupted metadata buffer: [ 230.875027] 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 230.911309] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 04:44:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'veth1_to_bond\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x34}}) close(r2) close(r1) [ 230.953604] 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 230.982004] 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 04:44:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0x31e, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r1}}) [ 231.018411] 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 231.051863] 00000050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 231.075403] 00000060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 04:44:44 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000200)={'veth0\x00', 0x8001}) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) [ 231.116344] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 231.150445] XFS (loop3): metadata I/O error in "xfs_trans_read_buf_map" at daddr 0x2 len 1 error 117 [ 231.186177] XFS (loop3): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -117, agno 0 [ 231.206978] XFS (loop3): Failed to read root inode 0x80, error 117 04:44:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010407031dfffd946fa2830020200a0009000100041d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 04:44:44 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x10000, 0x4240) 04:44:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, 0xc) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) rt_sigprocmask(0x0, &(0x7f0000000080)={0x9}, &(0x7f0000000100), 0x8) 04:44:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, 0xc) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) rt_sigprocmask(0x0, &(0x7f0000000080)={0x9}, &(0x7f0000000100), 0x8) [ 231.415546] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 231.477216] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. 04:44:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x8000000000001, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x5}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={r2, 0xa259}, &(0x7f0000000300)=0x8) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000240)=0x4) 04:44:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, 0xc) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) rt_sigprocmask(0x0, &(0x7f0000000080)={0x9}, &(0x7f0000000100), 0x8) 04:44:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000001c0)) 04:44:45 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000200)={'veth0\x00', 0x8001}) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 04:44:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, 0xc) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) rt_sigprocmask(0x0, &(0x7f0000000080)={0x9}, &(0x7f0000000100), 0x8) 04:44:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, 0xc) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) rt_sigprocmask(0x0, &(0x7f0000000080)={0x9}, &(0x7f0000000100), 0x8) [ 232.166713] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 232.184422] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (1 blocks) [ 232.293721] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 232.349552] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (1 blocks) 04:44:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, 0xc) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) rt_sigprocmask(0x0, &(0x7f0000000080)={0x9}, &(0x7f0000000100), 0x8) 04:44:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000001c0)) 04:44:46 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000200)={'veth0\x00', 0x8001}) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001a00)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000440)='bpf\x00', 0x5890, &(0x7f0000000600)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) 04:44:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, 0xc) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) rt_sigprocmask(0x0, &(0x7f0000000080)={0x9}, &(0x7f0000000100), 0x8) 04:44:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, 0xc) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) rt_sigprocmask(0x0, &(0x7f0000000080)={0x9}, &(0x7f0000000100), 0x8) [ 232.664495] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 232.686689] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (1 blocks) 04:44:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000001c0)) [ 232.931076] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 232.990829] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (1 blocks) 04:44:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x8000000000001, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x5}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={r2, 0xa259}, &(0x7f0000000300)=0x8) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000240)=0x4) 04:44:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x0, 0x2b}, 0x0, @in=@rand_addr, 0x0, 0x4}}, 0xe8) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, 0xc) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) rt_sigprocmask(0x0, &(0x7f0000000080)={0x9}, &(0x7f0000000100), 0x8) 04:44:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo/4\x00') flock(r1, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)=0x0) getpgid(r3) accept$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x27d) preadv(r2, &(0x7f00000017c0), 0x1d0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 04:44:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x89f0, &(0x7f0000000040)={'gre0\x00', @random='\x00`p\x00'}) 04:44:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x1014001, &(0x7f00000001c0)) 04:44:47 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000240)=@md5={0x1, "abcda708b18569ea41d2b090c90de0bc"}, 0x11, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) [ 233.779741] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 233.799099] audit: type=1804 audit(1541565887.339:31): pid=7900 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir520283708/syzkaller.smZvCP/25/bus" dev="sda1" ino=16613 res=1 04:44:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @dev}}, 0x0, 0x6373ef3e, 0x0, "fbae79a0049be4c1032f0add47c43d0b73b3a38a35b8105ce44247686d78b19dc639421105de7581a9b81dea81c7a18709fbb5d9acf56fe638e246692aadd932b2059591b75a644e58d8c263550dcda4"}, 0xd8) [ 233.839891] EXT4-fs (loop5): bad geometry: block count 512 exceeds size of device (1 blocks) 04:44:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8003, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xfffffffffffff1d8}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000400)=""/95) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000300, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x8, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="000000001b5ebebb447030aeb22945e167342939f549033780d617de4264fecab44536c1c80b5b56006fbd2eb634aee28626881d8aff06b55a90850b1f73a54bdd5cf990ab6891e587022b3198f2cd6baa9116967b1b2118abc80430c05e30838d492c39b165b27eedbbf142874d9a1f35bbab5103fbb081b11eedd6e0ef28b42e5b637751"], &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYBLOB="c67bf167e58ab9f156330b0fe4cb40973091db8817ede93f126297d0c290a3628d0d9064978b206a9f8531318427d3a51f000000c24d1e448acf0ae6e99a3493ea9c3cf0d0636acfc2910500002212342c0d3bd9cce10e4ac8e589e514b8ade04569645e6cb4f6efb1ba85626461e639b9bd7d9757a943cfefc80aa3fc957b4d6bee74edafebca67d76117c53ba8999717373de39f0d2734c2e2f6a04a884067b1ab02ac86b1b29334f905c846f3e63600b522b9a5eff32970382b2e403cf4efb27b15be557116e6df46401d1a7cfddcc26b26fc74f5505b3aa46938365c8a046917ebe0526f0451a8cf9a531e08169a89624e1c7a2750cdd70f0b130d7ba694a87fc938dd28b3ea5c2b9caa8c3651"], &(0x7f00000002c0)=0x1) socket$vsock_stream(0x28, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef]}}) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) [ 233.906944] kasan: CONFIG_KASAN_INLINE enabled [ 233.911743] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 233.947787] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 233.954060] CPU: 1 PID: 5633 Comm: udevd Not tainted 4.20.0-rc1-next-20181107+ #107 [ 233.961852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.971230] RIP: 0010:locks_remove_flock+0x216/0x350 [ 233.976341] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 233.978975] kasan: CONFIG_KASAN_INLINE enabled [ 233.995241] RSP: 0018:ffff8801ba007880 EFLAGS: 00010202 [ 233.995254] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 233.995264] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 233.995272] RBP: ffff8801ba007a60 R08: ffff8801ba78c680 R09: ffffed003b5e5b67 [ 233.995279] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801b8806a40 [ 233.995286] R13: ffff8801ba0078f8 R14: 1ffff10037400f13 R15: dffffc0000000000 [ 233.995297] FS: 00007f59c7a6d7a0(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 233.995304] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 233.995311] CR2: 0000000000625208 CR3: 00000001d8a45000 CR4: 00000000001406e0 [ 233.995321] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 233.995327] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 233.995331] Call Trace: [ 233.995355] ? flock_lock_inode+0x11c0/0x11c0 [ 234.000065] audit: type=1804 audit(1541565887.369:32): pid=7900 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir520283708/syzkaller.smZvCP/25/bus" dev="sda1" ino=16613 res=1 [ 234.005272] ? mark_held_locks+0x130/0x130 [ 234.005292] ? find_held_lock+0x36/0x1c0 [ 234.005310] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 234.005324] ? locks_remove_posix+0x486/0x850 [ 234.005339] ? vfs_lock_file+0xe0/0xe0 [ 234.016862] kasan: CONFIG_KASAN_INLINE enabled [ 234.019941] ? lock_downgrade+0x900/0x900 [ 234.019960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.019978] locks_remove_file+0x148/0x5c0 [ 234.045953] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 234.049980] ? fcntl_setlk+0xfc0/0xfc0 [ 234.049997] ? fsnotify_first_mark+0x350/0x350 [ 234.050012] ? __fsnotify_parent+0xcc/0x420 [ 234.062790] kobject: 'þ€' (0000000058994fc9): kobject_add_internal: parent: 'net', set: 'devices' [ 234.063673] ? perf_trace_sched_process_exec+0x860/0x860 [ 234.063697] ? fsnotify+0xf20/0xf20 [ 234.063714] ? __might_sleep+0x95/0x190 [ 234.063731] __fput+0x2f0/0xa70 [ 234.063753] ? get_max_files+0x20/0x20 [ 234.093448] kobject: 'þ€' (0000000058994fc9): kobject_uevent_env [ 234.108635] ? trace_hardirqs_on+0xbd/0x310 [ 234.108652] ? kasan_check_read+0x11/0x20 [ 234.108667] ? task_work_run+0x1af/0x2a0 [ 234.108689] ? trace_hardirqs_off_caller+0x300/0x300 [ 234.108702] ? filp_close+0x1cd/0x250 [ 234.108720] ____fput+0x15/0x20 [ 234.108733] task_work_run+0x1e8/0x2a0 [ 234.108749] ? task_work_cancel+0x240/0x240 [ 234.108769] ? copy_fd_bitmaps+0x210/0x210 [ 234.108783] ? do_syscall_64+0x9a/0x820 [ 234.108800] exit_to_usermode_loop+0x318/0x380 [ 234.108815] ? __bpf_trace_sys_exit+0x30/0x30 [ 234.108836] ? do_epoll_wait+0x154/0x200 [ 234.116586] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 234.117115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.151776] audit: type=1804 audit(1541565887.379:33): pid=7907 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir520283708/syzkaller.smZvCP/25/bus" dev="sda1" ino=16613 res=1 [ 234.156920] do_syscall_64+0x6be/0x820 [ 234.156937] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 234.156953] ? syscall_return_slowpath+0x5e0/0x5e0 [ 234.156966] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.156980] ? trace_hardirqs_on_caller+0x310/0x310 [ 234.156996] ? prepare_exit_to_usermode+0x291/0x3b0 [ 234.324236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.329075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.334255] RIP: 0033:0x7f59c71752b0 [ 234.337961] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 234.356846] RSP: 002b:00007fff7fe82af8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 234.364551] RAX: 0000000000000000 RBX: 0000000000000039 RCX: 00007f59c71752b0 [ 234.371808] RDX: 00007fff7fe85d50 RSI: 0000000000000002 RDI: 0000000000000008 [ 234.379065] RBP: 00007fff7fe84400 R08: 00007fff7ff670b0 R09: 00007fff7ff67080 [ 234.386321] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff7fe82bd0 [ 234.393577] R13: 0000000000000001 R14: 00007fff7fe82b64 R15: 000000000178f250 [ 234.400837] Modules linked in: [ 234.404032] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 234.410274] CPU: 0 PID: 3872 Comm: udevd Tainted: G D 4.20.0-rc1-next-20181107+ #107 [ 234.419450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.428799] RIP: 0010:locks_remove_flock+0x216/0x350 [ 234.433891] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 234.452776] RSP: 0018:ffff8801bf757880 EFLAGS: 00010202 [ 234.458125] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 234.465384] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 234.472641] RBP: ffff8801bf757a60 R08: ffff8801bce741c0 R09: ffffed003815083f [ 234.479907] R10: ffffed003815083f R11: ffff8801c0a841fb R12: ffff8801bb7b8000 [ 234.487160] R13: ffff8801bf7578f8 R14: 1ffff10037eeaf13 R15: dffffc0000000000 [ 234.494429] FS: 00007f59c7a6d7a0(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 234.502641] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 234.508511] CR2: 0000001b2dc22000 CR3: 00000001bc809000 CR4: 00000000001406f0 [ 234.515767] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 234.523025] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 234.530275] Call Trace: [ 234.532853] ? flock_lock_inode+0x11c0/0x11c0 [ 234.537339] ? mark_held_locks+0x130/0x130 [ 234.541570] ? __handle_mm_fault+0xa57/0x5be0 [ 234.546066] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 234.551685] ? locks_remove_posix+0x486/0x850 [ 234.556166] ? vfs_lock_file+0xe0/0xe0 [ 234.560038] ? lock_downgrade+0x900/0x900 [ 234.564171] ? kasan_check_read+0x11/0x20 [ 234.568303] ? ep_remove+0x533/0xa30 [ 234.572007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.577530] locks_remove_file+0x148/0x5c0 [ 234.581753] ? fcntl_setlk+0xfc0/0xfc0 [ 234.585631] ? fsnotify_first_mark+0x350/0x350 [ 234.590205] ? __fsnotify_parent+0xcc/0x420 [ 234.594514] ? perf_trace_sched_process_exec+0x860/0x860 [ 234.599961] ? fsnotify+0xf20/0xf20 [ 234.603575] ? check_preemption_disabled+0x48/0x280 [ 234.608579] ? __might_sleep+0x95/0x190 [ 234.612544] __fput+0x2f0/0xa70 [ 234.615812] ? get_max_files+0x20/0x20 [ 234.619693] ? trace_hardirqs_on+0xbd/0x310 [ 234.624003] ? kasan_check_read+0x11/0x20 [ 234.628136] ? task_work_run+0x1af/0x2a0 [ 234.632185] ? trace_hardirqs_off_caller+0x300/0x300 [ 234.637275] ? filp_close+0x1cd/0x250 [ 234.641077] ____fput+0x15/0x20 [ 234.644347] task_work_run+0x1e8/0x2a0 [ 234.648221] ? task_work_cancel+0x240/0x240 [ 234.652538] ? copy_fd_bitmaps+0x210/0x210 [ 234.656762] exit_to_usermode_loop+0x318/0x380 [ 234.661330] ? __bpf_trace_sys_exit+0x30/0x30 [ 234.665825] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.671355] do_syscall_64+0x6be/0x820 [ 234.675230] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 234.680592] ? syscall_return_slowpath+0x5e0/0x5e0 [ 234.685511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.690342] ? trace_hardirqs_on_caller+0x310/0x310 [ 234.695349] ? prepare_exit_to_usermode+0x291/0x3b0 [ 234.700353] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.705190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.710367] RIP: 0033:0x7f59c71752b0 [ 234.714070] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 234.732968] RSP: 002b:00007fff7fe82af8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 234.740672] RAX: 0000000000000000 RBX: 000000000178f250 RCX: 00007f59c71752b0 [ 234.747926] RDX: 00007fff7fe85d50 RSI: 0000000000000002 RDI: 0000000000000007 [ 234.755181] RBP: 0000000000625500 R08: 00007fff7ff670b0 R09: 00007fff7ff67080 [ 234.762434] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff7fe82bd0 [ 234.769701] R13: 0000000000000001 R14: 00007fff7fe82b64 R15: 000000000178f250 [ 234.776970] Modules linked in: [ 234.780163] general protection fault: 0000 [#3] PREEMPT SMP KASAN [ 234.786419] CPU: 1 PID: 7142 Comm: udevd Tainted: G D 4.20.0-rc1-next-20181107+ #107 [ 234.795605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.804973] RIP: 0010:locks_remove_flock+0x216/0x350 [ 234.810084] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 234.822423] ---[ end trace 933b924f2d047adb ]--- [ 234.828985] RSP: 0018:ffff88018bfaf880 EFLAGS: 00010202 [ 234.828998] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 234.829007] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 234.829016] RBP: ffff88018bfafa60 R08: ffff8801c015e080 R09: ffffed003815083f [ 234.829024] R10: ffffed003815083f R11: ffff8801c0a841fb R12: ffff8801c0b1c800 [ 234.829033] R13: ffff88018bfaf8f8 R14: 1ffff100317f5f13 R15: dffffc0000000000 [ 234.829047] FS: 00007f59c7a6d7a0(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 234.855932] kasan: CONFIG_KASAN_INLINE enabled [ 234.860938] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 234.860948] CR2: 00000000004d79d8 CR3: 00000001b6e3a000 CR4: 00000000001406e0 [ 234.860960] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 234.860966] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 234.860974] Call Trace: [ 234.869754] kasan: CONFIG_KASAN_INLINE enabled [ 234.875509] ? flock_lock_inode+0x11c0/0x11c0 [ 234.875527] ? mark_held_locks+0x130/0x130 [ 234.875548] ? __handle_mm_fault+0xa57/0x5be0 [ 234.875565] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 234.875583] ? locks_remove_posix+0x486/0x850 [ 234.883936] RIP: 0010:locks_remove_flock+0x216/0x350 [ 234.888359] ? vfs_lock_file+0xe0/0xe0 [ 234.888374] ? lock_downgrade+0x900/0x900 [ 234.888387] ? kasan_check_read+0x11/0x20 [ 234.888402] ? ep_remove+0x533/0xa30 [ 234.897367] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 234.901959] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.901976] locks_remove_file+0x148/0x5c0 [ 234.901991] ? fcntl_setlk+0xfc0/0xfc0 [ 234.910596] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 234.916515] ? fsnotify_first_mark+0x350/0x350 [ 234.916529] ? __fsnotify_parent+0xcc/0x420 [ 234.916542] ? perf_trace_sched_process_exec+0x860/0x860 [ 234.916555] ? fsnotify+0xf20/0xf20 [ 234.916568] ? check_preemption_disabled+0x48/0x280 [ 234.916586] ? __might_sleep+0x95/0x190 [ 234.920427] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 234.923731] __fput+0x2f0/0xa70 [ 234.923750] ? get_max_files+0x20/0x20 [ 234.923765] ? trace_hardirqs_on+0xbd/0x310 [ 234.923779] ? kasan_check_read+0x11/0x20 [ 234.923794] ? task_work_run+0x1af/0x2a0 [ 234.923814] ? trace_hardirqs_off_caller+0x300/0x300 [ 235.066510] ? filp_close+0x1cd/0x250 [ 235.070412] ____fput+0x15/0x20 [ 235.073681] task_work_run+0x1e8/0x2a0 [ 235.077560] ? task_work_cancel+0x240/0x240 [ 235.081873] ? copy_fd_bitmaps+0x210/0x210 [ 235.086098] exit_to_usermode_loop+0x318/0x380 [ 235.090672] ? __bpf_trace_sys_exit+0x30/0x30 [ 235.095247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.100771] do_syscall_64+0x6be/0x820 [ 235.104658] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 235.110012] ? syscall_return_slowpath+0x5e0/0x5e0 [ 235.114939] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.119769] ? trace_hardirqs_on_caller+0x310/0x310 [ 235.124775] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 235.129782] ? prepare_exit_to_usermode+0x291/0x3b0 [ 235.134791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.139622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.144804] RIP: 0033:0x7f59c71752b0 [ 235.148519] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 235.167404] RSP: 002b:00007fff7fe82af8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 235.175100] RAX: 0000000000000000 RBX: 000000000178f250 RCX: 00007f59c71752b0 [ 235.182365] RDX: 00007fff7fe85d50 RSI: 0000000000000002 RDI: 0000000000000007 [ 235.189619] RBP: 0000000000625500 R08: 00007fff7ff670b0 R09: 00007fff7ff67080 [ 235.196890] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff7fe82bd0 [ 235.204146] R13: 0000000000000001 R14: 00007fff7fe82b64 R15: 000000000178f250 [ 235.211412] Modules linked in: [ 235.214610] general protection fault: 0000 [#4] PREEMPT SMP KASAN [ 235.220885] CPU: 0 PID: 7904 Comm: syz-executor3 Tainted: G D 4.20.0-rc1-next-20181107+ #107 [ 235.230767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.240146] RIP: 0010:locks_remove_flock+0x216/0x350 [ 235.245261] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 235.264183] RSP: 0018:ffff8801bdc77880 EFLAGS: 00010a02 [ 235.269535] RAX: dffffc0000000000 RBX: c23314e986f62600 RCX: ffffc900085a5000 [ 235.276793] RDX: 1846629d30dec4c1 RSI: ffffffff81ed5c71 RDI: c23314e986f62608 [ 235.284051] RBP: ffff8801bdc77a60 R08: ffff8801be78c0c0 R09: 00000000bca5fffb [ 235.291305] R10: 00000000a8936d98 R11: ffff8801be78c0c0 R12: ffff8801b7b8a0c0 [ 235.298575] R13: ffff8801bdc778f8 R14: 1ffff10037b8ef13 R15: dffffc0000000000 [ 235.305834] FS: 00007ff0a7374700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 235.314043] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 235.319907] CR2: 00007fef4bd5bdb8 CR3: 00000001c7ca3000 CR4: 00000000001406f0 [ 235.327164] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 235.334421] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 235.341672] Call Trace: [ 235.344252] ? flock_lock_inode+0x11c0/0x11c0 [ 235.348733] ? save_stack+0xa9/0xd0 [ 235.352346] ? save_stack+0x43/0xd0 [ 235.355962] ? __kasan_slab_free+0x102/0x150 [ 235.360353] ? kasan_slab_free+0xe/0x10 [ 235.364312] ? kfree+0xcf/0x230 [ 235.367589] ? vfs_readv+0x199/0x1c0 [ 235.371289] ? do_preadv+0x1cc/0x280 [ 235.374990] ? __x64_sys_preadv+0x9a/0xf0 [ 235.379125] ? do_syscall_64+0x1b9/0x820 [ 235.383188] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.388540] ? trace_hardirqs_off+0xb8/0x310 [ 235.392942] ? retint_kernel+0x2d/0x2d [ 235.396816] ? trace_hardirqs_on_caller+0xc0/0x310 [ 235.401732] ? trace_hardirqs_on+0x310/0x310 [ 235.406136] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 235.411574] ? trace_hardirqs_off+0xb8/0x310 [ 235.415970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.421497] locks_remove_file+0x148/0x5c0 [ 235.425718] ? fcntl_setlk+0xfc0/0xfc0 [ 235.429589] ? vfs_readv+0x199/0x1c0 [ 235.433294] ? fsnotify_first_mark+0x350/0x350 [ 235.437861] ? __fsnotify_parent+0xcc/0x420 [ 235.442253] ? perf_trace_sched_process_exec+0x860/0x860 [ 235.447689] ? fsnotify+0xf20/0xf20 [ 235.451315] ? trace_hardirqs_on+0xb4/0x310 [ 235.455633] ? __might_sleep+0x95/0x190 [ 235.459606] __fput+0x2f0/0xa70 [ 235.462886] ? get_max_files+0x20/0x20 [ 235.466763] ? trace_hardirqs_on+0xbd/0x310 [ 235.471069] ? kasan_check_read+0x11/0x20 [ 235.475218] ? task_work_run+0x1af/0x2a0 [ 235.479266] ? trace_hardirqs_off_caller+0x300/0x300 [ 235.484359] ____fput+0x15/0x20 [ 235.487634] task_work_run+0x1e8/0x2a0 [ 235.491514] ? task_work_cancel+0x240/0x240 [ 235.495824] ? exit_to_usermode_loop+0xb5/0x380 [ 235.500484] exit_to_usermode_loop+0x318/0x380 [ 235.505055] ? __bpf_trace_sys_exit+0x30/0x30 [ 235.509538] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 235.514541] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.520066] do_syscall_64+0x6be/0x820 [ 235.523940] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 235.529293] ? syscall_return_slowpath+0x5e0/0x5e0 [ 235.534211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.539054] ? trace_hardirqs_on_caller+0x310/0x310 [ 235.544066] ? prepare_exit_to_usermode+0x291/0x3b0 [ 235.549072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 235.553905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.559079] RIP: 0033:0x457569 [ 235.562259] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.581145] RSP: 002b:00007ff0a7373c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 235.588839] RAX: fffffffffffffffe RBX: 0000000000000004 RCX: 0000000000457569 [ 235.596092] RDX: 00000000000001d0 RSI: 00000000200017c0 RDI: 0000000000000008 04:44:49 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f00000005c0)) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x2, &(0x7f0000000100)=[{0x50, 0x0, 0x0, 0xffffffffffffffff}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002240), 0x1ba, &(0x7f00000022c0)}}, {{0x0, 0x0, &(0x7f00000026c0), 0x0, &(0x7f0000002700)}}], 0x75a, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") [ 235.603355] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 235.610627] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff0a73746d4 [ 235.617885] R13: 00000000004c32f9 R14: 00000000004d4f48 R15: 00000000ffffffff [ 235.625150] Modules linked in: [ 235.632677] kobject: 'þ€' (0000000058994fc9): fill_kobj_path: path = '/devices/virtual/net/þ€' [ 235.648107] kobject: 'loop5' (000000008363ba7c): kobject_uevent_env [ 235.659641] general protection fault: 0000 [#5] PREEMPT SMP KASAN [ 235.663544] kobject: 'queues' (000000004875daaf): kobject_add_internal: parent: 'þ€', set: '' [ 235.665901] CPU: 0 PID: 7893 Comm: syz-executor3 Tainted: G D 4.20.0-rc1-next-20181107+ #107 [ 235.665908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.665930] RIP: 0010:locks_remove_flock+0x216/0x350 [ 235.687167] kobject: 'queues' (000000004875daaf): kobject_uevent_env [ 235.694303] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 235.694311] RSP: 0018:ffff8801bd3ff880 EFLAGS: 00010202 [ 235.694321] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 235.694334] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 235.707104] kobject: 'queues' (000000004875daaf): kobject_uevent_env: filter function caused the event to drop! [ 235.724806] RBP: ffff8801bd3ffa60 R08: ffff8801b76ec080 R09: fffffbfff1322588 [ 235.724815] R10: fffffbfff1322588 R11: ffffffff89912c43 R12: ffff8801d1c4e580 [ 235.724823] R13: ffff8801bd3ff8f8 R14: 1ffff10037a7ff13 R15: dffffc0000000000 [ 235.724834] FS: 0000000001765940(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 235.724847] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 235.748739] kobject: 'rx-0' (0000000049118523): kobject_add_internal: parent: 'queues', set: 'queues' [ 235.754917] CR2: 0000000000709934 CR3: 00000001c7ca3000 CR4: 00000000001406f0 [ 235.754928] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 235.754936] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 235.754940] Call Trace: [ 235.754961] ? flock_lock_inode+0x11c0/0x11c0 [ 235.782207] kobject: 'rx-0' (0000000049118523): kobject_uevent_env [ 235.784956] ? mark_held_locks+0x130/0x130 [ 235.784978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.792008] kobject: 'rx-0' (0000000049118523): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 235.800283] ? check_preemption_disabled+0x48/0x280 [ 235.800301] ? trace_hardirqs_on+0xbd/0x310 [ 235.800317] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 235.824125] kobject: 'tx-0' (000000002dcb71bb): kobject_add_internal: parent: 'queues', set: 'queues' [ 235.824669] ? call_rcu+0xb/0x10 [ 235.855780] kobject: 'tx-0' (000000002dcb71bb): kobject_uevent_env [ 235.860153] ? trace_hardirqs_off_caller+0x300/0x300 [ 235.860172] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.888241] kobject: 'tx-0' (000000002dcb71bb): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' [ 235.888763] ? locks_remove_posix+0x486/0x850 [ 235.914150] ? check_preemption_disabled+0x48/0x280 [ 235.914701] kobject: 'brif' (00000000efe18d07): kobject_add_internal: parent: 'þ€', set: '' [ 235.919167] ? vfs_lock_file+0xe0/0xe0 [ 235.919183] ? trace_hardirqs_off_caller+0x300/0x300 [ 235.919201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.942701] locks_remove_file+0x148/0x5c0 [ 235.946941] ? fcntl_setlk+0xfc0/0xfc0 [ 235.950832] ? fsnotify_first_mark+0x350/0x350 [ 235.955425] ? __fsnotify_parent+0xcc/0x420 [ 235.959754] ? perf_trace_sched_process_exec+0x860/0x860 [ 235.964044] kobject: 'brif' (00000000efe18d07): kobject_cleanup, parent 0000000058994fc9 [ 235.965207] ? fsnotify+0xf20/0xf20 [ 235.965221] ? check_preemption_disabled+0x48/0x280 [ 235.965238] ? __might_sleep+0x95/0x190 [ 235.981658] kobject: 'brif' (00000000efe18d07): auto cleanup kobject_del [ 235.982078] __fput+0x2f0/0xa70 [ 235.982096] ? get_max_files+0x20/0x20 [ 235.996300] kobject: 'brif' (00000000efe18d07): calling ktype release [ 236.000018] ? trace_hardirqs_on+0xbd/0x310 [ 236.000031] ? kasan_check_read+0x11/0x20 [ 236.000050] ? task_work_run+0x1af/0x2a0 [ 236.019123] ? trace_hardirqs_off_caller+0x300/0x300 [ 236.024236] ? filp_close+0x1cd/0x250 [ 236.028042] ____fput+0x15/0x20 [ 236.031323] task_work_run+0x1e8/0x2a0 [ 236.033424] kobject: (00000000efe18d07): dynamic_kobj_release [ 236.035210] ? task_work_cancel+0x240/0x240 [ 236.035230] ? copy_fd_bitmaps+0x210/0x210 [ 236.045639] kobject: 'brif': free name [ 236.049651] exit_to_usermode_loop+0x318/0x380 [ 236.049669] ? __bpf_trace_sys_exit+0x30/0x30 [ 236.062853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.068398] do_syscall_64+0x6be/0x820 [ 236.072289] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 236.077659] ? syscall_return_slowpath+0x5e0/0x5e0 [ 236.082595] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.087450] ? trace_hardirqs_on_caller+0x310/0x310 [ 236.092467] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 236.097482] ? prepare_exit_to_usermode+0x291/0x3b0 [ 236.102500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 236.107352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.112540] RIP: 0033:0x411021 [ 236.115744] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 236.134654] RSP: 002b:00007fff70921d30 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 236.142364] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 0000000000411021 [ 236.149634] RDX: 0000000000000000 RSI: 0000000000730fb0 RDI: 0000000000000007 [ 236.156899] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 236.164169] R10: 00007fff70921c60 R11: 0000000000000293 R12: 0000000000000000 [ 236.171441] R13: 0000000000000001 R14: 0000000000000015 R15: 0000000000000003 [ 236.178806] Modules linked in: [ 236.186546] RSP: 0018:ffff8801ba007880 EFLAGS: 00010202 [ 236.193787] kobject: 'rx-0' (0000000049118523): kobject_cleanup, parent 000000004875daaf [ 236.196427] kobject: 'loop5' (000000008363ba7c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 236.212254] kobject: 'rx-0' (0000000049118523): auto cleanup 'remove' event [ 236.212331] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 236.244064] kobject: 'rx-0' (0000000049118523): kobject_uevent_env [ 236.270961] kobject: 'rx-0' (0000000049118523): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/rx-0' [ 236.273883] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb 04:44:49 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x2008200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x186, @tick, 0x0, {0xcbee, 0x6}}) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) r2 = socket(0x10, 0x0, 0x9) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) dup(r3) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) ioctl$LOOP_CLR_FD(r1, 0x4c01) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000b80)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) close(0xffffffffffffffff) fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x20, 0x0, 0x10000) [ 236.312632] kobject: 'rx-0' (0000000049118523): auto cleanup kobject_del [ 236.340813] kobject: 'rx-0' (0000000049118523): calling ktype release [ 236.348401] RBP: ffff8801ba007a60 R08: ffff8801ba78c680 R09: ffffed003b5e5b67 [ 236.375845] kobject: 'rx-0': free name [ 236.383176] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801b8806a40 [ 236.397265] kobject: 'tx-0' (000000002dcb71bb): kobject_cleanup, parent 000000004875daaf [ 236.402798] ---[ end trace 933b924f2d047adc ]--- [ 236.406912] audit: type=1804 audit(1541565889.959:34): pid=7931 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir922456010/syzkaller.fg94wT/26/bus" dev="sda1" ino=16612 res=1 [ 236.410336] RIP: 0010:locks_remove_flock+0x216/0x350 [ 236.439063] Code: 00 0f 85 3a 01 00 00 48 8b 5b 98 48 85 db 74 3a e8 1f 41 92 ff 48 8d 7b 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 17 01 00 00 48 8b 5b 08 48 85 db 74 0d e8 f2 40 [ 236.452179] R13: ffff8801ba0078f8 R14: 1ffff10037400f13 R15: dffffc0000000000 [ 236.458074] RSP: 0018:ffff8801ba007880 EFLAGS: 00010202 [ 236.470707] RAX: dffffc0000000000 RBX: 0000000041b58ab3 RCX: ffffffff81ed555d [ 236.478076] RDX: 000000000836b157 RSI: ffffffff81ed5c71 RDI: 0000000041b58abb [ 236.484233] kobject: 'tx-0' (000000002dcb71bb): auto cleanup 'remove' event [ 236.485436] RBP: ffff8801ba007a60 R08: ffff8801ba78c680 R09: ffffed003b5e5b67 [ 236.499823] R10: ffffed003b5e5b67 R11: ffff8801daf2db3b R12: ffff8801b8806a40 [ 236.518668] R13: ffff8801ba0078f8 R14: 1ffff10037400f13 R15: dffffc0000000000 [ 236.520164] kobject: 'tx-0' (000000002dcb71bb): kobject_uevent_env [ 236.533693] FS: 00007f59c7a6d7a0(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 236.534878] FS: 00007f59c7a6d7a0(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 236.552828] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 236.565313] audit: type=1800 audit(1541565889.979:35): pid=7931 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="bus" dev="sda1" ino=16612 res=0 [ 236.567987] CR2: 00007ffc90bfaccc CR3: 00000001d8a45000 CR4: 00000000001406e0 [ 236.589719] kobject: 'tx-0' (000000002dcb71bb): fill_kobj_path: path = '/devices/virtual/net/þ€/queues/tx-0' [ 236.602339] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 236.608393] CR2: 0000001b2ee2e000 CR3: 00000001bc809000 CR4: 00000000001406f0 [ 236.616263] kobject: 'tx-0' (000000002dcb71bb): auto cleanup kobject_del 04:44:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x8000000000001, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(0xffffffffffffffff, 0x6) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x5}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={r2, 0xa259}, &(0x7f0000000300)=0x8) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000240)=0x4) [ 236.623619] audit: type=1804 audit(1541565890.039:36): pid=7933 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir922456010/syzkaller.fg94wT/26/bus" dev="sda1" ino=16612 res=1 [ 236.645690] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 236.650150] kobject: 'loop2' (00000000bf9f23f4): kobject_uevent_env [ 236.665382] kobject: 'loop2' (00000000bf9f23f4): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 236.677185] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 236.685564] kobject: 'tx-0' (000000002dcb71bb): calling ktype release [ 236.691189] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 236.692519] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 236.711290] kobject: 'tx-0': free name [ 236.715990] kobject: 'queues' (000000004875daaf): kobject_cleanup, parent (null) [ 236.720443] Kernel panic - not syncing: Fatal exception [ 236.731066] Kernel Offset: disabled [ 236.734704] Rebooting in 86400 seconds..