PTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r5, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x841}, 0x28) 13:42:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:17 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r2, 0x8070ae9f, &(0x7f0000000a40)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:17 executing program 1: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x0, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xa9e}, 0x28) 13:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553f", 0x3) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x8a5}, 0x28) 13:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x7af}, 0x28) 13:42:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xa97}, 0x28) 13:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:17 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:17 executing program 1: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x0, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:17 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x8c5}, 0x28) 13:42:17 executing program 0: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x1d00) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x6fc}, 0x28) 13:42:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:18 executing program 1: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x0, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x42d}, 0x28) 13:42:18 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x3e8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x989}, 0x28) 13:42:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:18 executing program 0: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) r1 = accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000100)={'nat\x00', 0x4, [{}, {}, {}, {}]}, 0x68) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040), &(0x7f00000000c0)=0x8) 13:42:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x6d6}, 0x28) 13:42:18 executing program 1: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x0, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:18 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x0, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:18 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xd92}, 0x28) 13:42:18 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x0, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x4fc}, 0x28) 13:42:19 executing program 0: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x0, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:19 executing program 1: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:19 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x0, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x0, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x1f7}, 0x28) 13:42:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x106e}, 0x28) 13:42:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x0, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)) write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:20 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x0, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:20 executing program 0: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x1300000000000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x3ea}, 0x28) 13:42:20 executing program 1: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000480)) 13:42:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)) write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)) write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x57b}, 0x28) 13:42:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b70000000000000095000400000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488d") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:20 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x1800000000000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b70000000000000095000400000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:20 executing program 0: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x1800000000000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x755}, 0x28) 13:42:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488d") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:20 executing program 1: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000480)) 13:42:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b70000000000000095000400000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x139}, 0x28) 13:42:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488d") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:20 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x11000000000b) getegid() r1 = accept(r0, &(0x7f00000011c0)=ANY=[], &(0x7f0000123000)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040), &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000100)=""/212) 13:42:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xb41}, 0x28) 13:42:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d76") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) [ 1910.937092] sctp: [Deprecated]: syz-executor2 (pid 30572) Use of int in max_burst socket option. [ 1910.937092] Use struct sctp_assoc_value instead 13:42:21 executing program 0: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x3e80000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:21 executing program 1: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000480)) 13:42:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x10) 13:42:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d76") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xeab}, 0x28) 13:42:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x94, &(0x7f00000004c0), &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d76") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xc91}, 0x28) 13:42:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d7660") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:21 executing program 2 (fault-call:14 fault-nth:0): modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x94, &(0x7f00000004c0), &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xdbe}, 0x28) 13:42:21 executing program 0: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000480)) 13:42:21 executing program 1: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x300) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r5, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x94, &(0x7f00000004c0), &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:21 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x11f2}, 0x28) 13:42:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d7660") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) [ 1911.868117] FAULT_INJECTION: forcing a failure. [ 1911.868117] name failslab, interval 1, probability 0, space 0, times 0 13:42:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d7660") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) [ 1911.934344] CPU: 0 PID: 30633 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #59 [ 1911.941692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1911.951065] Call Trace: [ 1911.953687] dump_stack+0x1c4/0x2b4 [ 1911.957357] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1911.962583] ? mark_held_locks+0xc7/0x130 [ 1911.966758] should_fail.cold.4+0xa/0x17 [ 1911.970833] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1911.975427] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1911.980538] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1911.985307] ? trace_hardirqs_off+0x310/0x310 [ 1911.989808] ? zap_class+0x640/0x640 [ 1911.993536] ? graph_lock+0x170/0x170 [ 1911.997359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1912.002132] ? retint_kernel+0x2d/0x2d [ 1912.006049] ? lock_is_held_type+0x18b/0x210 [ 1912.010487] ? ___might_sleep+0x1ed/0x300 [ 1912.014646] ? arch_local_save_flags+0x40/0x40 [ 1912.019233] ? retint_kernel+0x2d/0x2d [ 1912.023130] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1912.028088] __should_failslab+0x124/0x180 [ 1912.032345] should_failslab+0x9/0x14 [ 1912.036161] kmem_cache_alloc+0x2be/0x730 [ 1912.040319] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1912.045095] mmu_topup_memory_caches+0xf7/0x390 [ 1912.049782] kvm_mmu_load+0x21/0xfa0 [ 1912.053514] ? kvm_cpu_has_injectable_intr+0x1a1/0x1f0 [ 1912.058802] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 1912.063662] ? vcpu_enter_guest+0x2311/0x6380 [ 1912.068170] vcpu_enter_guest+0x3dbe/0x6380 [ 1912.072520] ? emulator_read_emulated+0x50/0x50 [ 1912.077203] ? zap_class+0x640/0x640 [ 1912.080928] ? vmx_vcpu_load+0xb06/0x1030 [ 1912.085090] ? vmx_write_tsc_offset+0x680/0x680 [ 1912.089769] ? graph_lock+0x170/0x170 [ 1912.093585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.099136] ? check_preemption_disabled+0x48/0x200 [ 1912.104158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.109706] ? check_preemption_disabled+0x48/0x200 [ 1912.114750] ? check_preemption_disabled+0x48/0x200 [ 1912.119798] ? __lock_is_held+0xb5/0x140 [ 1912.123874] ? lock_acquire+0x1ed/0x520 [ 1912.127860] ? kvm_arch_vcpu_ioctl_run+0x234/0x16e0 [ 1912.132890] ? lock_release+0x970/0x970 [ 1912.136875] ? kvm_gen_update_masterclock+0x350/0x350 [ 1912.142072] ? kvm_arch_dev_ioctl+0x630/0x630 [ 1912.146577] ? preempt_notifier_dec+0x20/0x20 [ 1912.151094] kvm_arch_vcpu_ioctl_run+0x375/0x16e0 [ 1912.155942] ? kvm_arch_vcpu_ioctl_run+0x375/0x16e0 [ 1912.160986] kvm_vcpu_ioctl+0x72b/0x1150 [ 1912.165066] ? kvm_vcpu_block+0x1030/0x1030 [ 1912.169397] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1912.174342] ? find_held_lock+0x36/0x1c0 [ 1912.178467] ? __fget+0x4aa/0x740 [ 1912.181963] ? __fget+0x4b9/0x740 [ 1912.185429] ? __fget+0x4d1/0x740 [ 1912.188927] ? ksys_dup3+0x680/0x680 [ 1912.192649] ? find_held_lock+0x36/0x1c0 [ 1912.196728] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1912.201681] ? kvm_vcpu_block+0x1030/0x1030 [ 1912.206014] do_vfs_ioctl+0x1de/0x1720 [ 1912.209916] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1912.215130] ? ioctl_preallocate+0x300/0x300 [ 1912.219557] ? selinux_file_mprotect+0x620/0x620 [ 1912.224331] ? __sb_end_write+0xd9/0x110 [ 1912.228411] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1912.233956] ? fput+0x130/0x1a0 [ 1912.237248] ? do_syscall_64+0x9a/0x820 [ 1912.241237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.247252] ? security_file_ioctl+0x94/0xc0 [ 1912.251677] ksys_ioctl+0xa9/0xd0 [ 1912.255168] __x64_sys_ioctl+0x73/0xb0 [ 1912.259072] do_syscall_64+0x1b9/0x820 [ 1912.262988] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1912.268371] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1912.273312] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1912.278169] ? trace_hardirqs_on_caller+0x310/0x310 [ 1912.283200] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1912.288236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1912.293101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1912.298298] RIP: 0033:0x457519 [ 1912.301507] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1912.320425] RSP: 002b:00007f53c6312c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1912.328164] RAX: ffffffffffffffda RBX: 00007f53c6312c90 RCX: 0000000000457519 13:42:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x5e, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x982}, 0x28) [ 1912.335452] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1912.342749] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1912.350029] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f53c63136d4 [ 1912.357309] R13: 00000000004bffda R14: 00000000004d00a8 R15: 0000000000000007 13:42:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:22 executing program 2 (fault-call:14 fault-nth:1): modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x5e, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:22 executing program 1 (fault-call:6 fault-nth:0): clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:22 executing program 0: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000480)) 13:42:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x1019}, 0x28) [ 1912.621521] FAULT_INJECTION: forcing a failure. [ 1912.621521] name failslab, interval 1, probability 0, space 0, times 0 13:42:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x5e, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1912.707822] FAULT_INJECTION: forcing a failure. [ 1912.707822] name failslab, interval 1, probability 0, space 0, times 0 [ 1912.721236] CPU: 0 PID: 30677 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #59 [ 1912.728547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1912.737913] Call Trace: [ 1912.740524] dump_stack+0x1c4/0x2b4 [ 1912.744175] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1912.749378] ? mark_held_locks+0x130/0x130 [ 1912.753626] ? print_usage_bug+0xc0/0xc0 [ 1912.757706] should_fail.cold.4+0xa/0x17 [ 1912.761791] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1912.766909] ? debug_smp_processor_id+0x1c/0x20 [ 1912.771596] ? graph_lock+0x170/0x170 [ 1912.775407] ? print_usage_bug+0xc0/0xc0 [ 1912.779485] ? mark_held_locks+0x130/0x130 [ 1912.783734] ? graph_lock+0x170/0x170 [ 1912.787549] ? graph_lock+0x170/0x170 [ 1912.791355] ? print_usage_bug+0xc0/0xc0 [ 1912.795436] ? __lock_is_held+0xb5/0x140 [ 1912.799530] ? ___might_sleep+0x1ed/0x300 [ 1912.803691] ? arch_local_save_flags+0x40/0x40 [ 1912.808286] ? lock_release+0x970/0x970 [ 1912.812270] ? arch_local_save_flags+0x40/0x40 [ 1912.816869] ? arch_local_save_flags+0x40/0x40 [ 1912.821485] __should_failslab+0x124/0x180 [ 1912.825746] should_failslab+0x9/0x14 [ 1912.829562] __kmalloc+0x2d4/0x760 [ 1912.833118] ? down_write_nested+0x8e/0x130 [ 1912.837551] ? ext4_double_down_write_data_sem+0x6c/0x80 [ 1912.843055] ? ext4_find_extent+0x757/0x9b0 [ 1912.847393] ext4_find_extent+0x757/0x9b0 [ 1912.851563] ext4_move_extents+0xcd1/0x3c20 [ 1912.855892] ? mark_held_locks+0x130/0x130 [ 1912.860150] ? __lock_acquire+0x7ec/0x4ec0 [ 1912.864398] ? mark_held_locks+0x130/0x130 [ 1912.868666] ? ext4_double_up_write_data_sem+0x30/0x30 [ 1912.873959] ? __fget+0x4aa/0x740 [ 1912.877426] ? lock_downgrade+0x900/0x900 [ 1912.881585] ? check_preemption_disabled+0x48/0x200 [ 1912.886619] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1912.892421] ? kasan_check_read+0x11/0x20 [ 1912.896579] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1912.901864] ? rcu_bh_qs+0xc0/0xc0 [ 1912.905425] ? __fget+0x4d1/0x740 [ 1912.908896] ? ksys_dup3+0x680/0x680 [ 1912.912631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.918189] ? graph_lock+0x170/0x170 [ 1912.922020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.927572] ? check_preemption_disabled+0x48/0x200 [ 1912.932601] ? check_preemption_disabled+0x48/0x200 [ 1912.937641] ? __lock_is_held+0xb5/0x140 [ 1912.941728] ? rcu_read_lock_sched_held+0x108/0x120 [ 1912.946773] ? preempt_count_add+0x7d/0x160 [ 1912.951104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.956658] ? mnt_clone_write+0x10a/0x160 [ 1912.960908] ? __mnt_want_write_file+0xa2/0xc0 [ 1912.965515] ext4_ioctl+0x3154/0x4210 [ 1912.969337] ? ext4_ioctl_group_add+0x560/0x560 [ 1912.974022] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1912.979833] ? kasan_check_read+0x11/0x20 [ 1912.983996] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1912.989286] ? rcu_bh_qs+0xc0/0xc0 [ 1912.992852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1912.998400] ? avc_has_extended_perms+0xab2/0x15a0 [ 1913.003351] ? avc_ss_reset+0x190/0x190 [ 1913.007344] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 1913.013146] ? kasan_check_read+0x11/0x20 [ 1913.017309] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1913.022601] ? rcu_bh_qs+0xc0/0xc0 [ 1913.026179] ? ___might_sleep+0x1ed/0x300 [ 1913.030342] ? arch_local_save_flags+0x40/0x40 [ 1913.034941] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1913.039889] ? ext4_ioctl_group_add+0x560/0x560 [ 1913.044569] do_vfs_ioctl+0x1de/0x1720 [ 1913.048498] ? ioctl_preallocate+0x300/0x300 [ 1913.052926] ? selinux_file_mprotect+0x620/0x620 [ 1913.057699] ? __sb_end_write+0xd9/0x110 [ 1913.061783] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1913.067332] ? fput+0x130/0x1a0 [ 1913.070624] ? do_syscall_64+0x9a/0x820 [ 1913.074615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.080162] ? security_file_ioctl+0x94/0xc0 [ 1913.084587] ksys_ioctl+0xa9/0xd0 [ 1913.088055] __x64_sys_ioctl+0x73/0xb0 [ 1913.091957] do_syscall_64+0x1b9/0x820 [ 1913.095855] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1913.101238] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1913.106177] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1913.111034] ? trace_hardirqs_on_caller+0x310/0x310 [ 1913.116061] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1913.121093] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1913.126130] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1913.130992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1913.136188] RIP: 0033:0x457519 [ 1913.139389] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1913.158302] RSP: 002b:00007f5910ebcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1913.166032] RAX: ffffffffffffffda RBX: 00007f5910ebcc90 RCX: 0000000000457519 [ 1913.173313] RDX: 0000000020000240 RSI: 00000000c028660f RDI: 0000000000000003 [ 1913.180595] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1913.187878] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5910ebd6d4 [ 1913.195156] R13: 00000000004bf57c R14: 00000000004cf400 R15: 0000000000000005 13:42:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x8d, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23b", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1913.245620] CPU: 0 PID: 30678 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #59 [ 1913.252960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1913.262336] Call Trace: [ 1913.264955] dump_stack+0x1c4/0x2b4 [ 1913.268617] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1913.273841] ? should_fail.cold.4+0x5/0x17 [ 1913.278114] should_fail.cold.4+0xa/0x17 [ 1913.282204] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1913.287327] ? save_stack+0xa9/0xd0 [ 1913.290987] ? graph_lock+0x170/0x170 [ 1913.294809] ? kasan_slab_alloc+0x12/0x20 [ 1913.298977] ? kmem_cache_alloc+0x12e/0x730 [ 1913.303317] ? mmu_topup_memory_caches+0xf7/0x390 [ 1913.308172] ? kvm_mmu_load+0x21/0xfa0 [ 1913.312066] ? vcpu_enter_guest+0x3dbe/0x6380 [ 1913.316569] ? graph_lock+0x170/0x170 [ 1913.320382] ? ksys_ioctl+0xa9/0xd0 [ 1913.324029] ? __x64_sys_ioctl+0x73/0xb0 [ 1913.328109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1913.333505] ? find_held_lock+0x36/0x1c0 [ 1913.337584] ? __lock_is_held+0xb5/0x140 [ 1913.341670] ? ___might_sleep+0x1ed/0x300 [ 1913.345829] ? arch_local_save_flags+0x40/0x40 [ 1913.350436] __should_failslab+0x124/0x180 [ 1913.354705] should_failslab+0x9/0x14 [ 1913.358547] kmem_cache_alloc+0x2be/0x730 [ 1913.362717] ? mmu_topup_memory_caches+0xf7/0x390 [ 1913.367583] mmu_topup_memory_caches+0xf7/0x390 [ 1913.372268] kvm_mmu_load+0x21/0xfa0 [ 1913.375999] ? vcpu_enter_guest+0x2311/0x6380 [ 1913.380516] vcpu_enter_guest+0x3dbe/0x6380 [ 1913.384961] ? emulator_read_emulated+0x50/0x50 [ 1913.389646] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1913.394238] ? retint_kernel+0x2d/0x2d [ 1913.398132] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1913.403073] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.407840] ? trace_hardirqs_off+0x310/0x310 [ 1913.412367] ? mark_held_locks+0xc7/0x130 [ 1913.416529] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.421296] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1913.425890] ? retint_kernel+0x2d/0x2d [ 1913.429787] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1913.434729] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.439509] ? trace_hardirqs_off+0x310/0x310 [ 1913.444016] ? __lock_is_held+0xb5/0x140 [ 1913.448096] ? lock_acquire+0x1ed/0x520 [ 1913.452078] ? kvm_arch_vcpu_ioctl_run+0x234/0x16e0 [ 1913.457104] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.461875] ? lock_release+0x970/0x970 [ 1913.465860] ? retint_kernel+0x2d/0x2d [ 1913.469783] kvm_arch_vcpu_ioctl_run+0x375/0x16e0 [ 1913.474639] ? kvm_arch_vcpu_ioctl_run+0x375/0x16e0 [ 1913.479686] kvm_vcpu_ioctl+0x72b/0x1150 [ 1913.483767] ? kvm_vcpu_block+0x1030/0x1030 [ 1913.488098] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1913.493048] ? find_held_lock+0x36/0x1c0 [ 1913.497126] ? __fget+0x4aa/0x740 [ 1913.500596] ? check_preemption_disabled+0x48/0x200 [ 1913.505631] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.510401] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1913.514994] ? retint_kernel+0x2d/0x2d [ 1913.518891] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1913.523827] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.528590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.533375] ? trace_hardirqs_off+0x310/0x310 [ 1913.537877] ? retint_kernel+0x2d/0x2d [ 1913.541779] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1913.546734] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.551522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.556301] ? retint_kernel+0x2d/0x2d [ 1913.560202] ? kvm_vcpu_block+0x1030/0x1030 [ 1913.564560] ? kvm_vcpu_block+0x1030/0x1030 [ 1913.568909] do_vfs_ioctl+0x1de/0x1720 [ 1913.572808] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.577577] ? trace_hardirqs_off+0x310/0x310 [ 1913.582084] ? ioctl_preallocate+0x300/0x300 [ 1913.586524] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1913.591297] ? retint_kernel+0x2d/0x2d [ 1913.595210] ksys_ioctl+0xa9/0xd0 [ 1913.598682] __x64_sys_ioctl+0x73/0xb0 [ 1913.602585] do_syscall_64+0x1b9/0x820 [ 1913.606491] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1913.611867] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1913.616807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1913.621660] ? trace_hardirqs_on_caller+0x310/0x310 [ 1913.626693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1913.632240] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1913.637275] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1913.642138] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1913.647337] RIP: 0033:0x457519 [ 1913.650539] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1913.669456] RSP: 002b:00007f53c6312c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1913.677190] RAX: ffffffffffffffda RBX: 00007f53c6312c90 RCX: 0000000000457519 [ 1913.684476] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 13:42:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) [ 1913.691761] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1913.699035] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f53c63136d4 [ 1913.706311] R13: 00000000004bffda R14: 00000000004d00a8 R15: 0000000000000007 13:42:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x8d, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23b", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:23 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x7de}, 0x28) 13:42:24 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:24 executing program 2 (fault-call:14 fault-nth:2): modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x13c) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:24 executing program 0: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000480)) 13:42:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x8d, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23b", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:24 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc020660b, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xc81}, 0x28) 13:42:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x14) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xa5, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1914.075828] FAULT_INJECTION: forcing a failure. [ 1914.075828] name failslab, interval 1, probability 0, space 0, times 0 [ 1914.125243] CPU: 0 PID: 30720 Comm: syz-executor2 Not tainted 4.19.0-rc7+ #59 [ 1914.132588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1914.141961] Call Trace: [ 1914.144573] dump_stack+0x1c4/0x2b4 [ 1914.148228] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1914.153448] should_fail.cold.4+0xa/0x17 [ 1914.157533] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1914.162649] ? save_stack+0xa9/0xd0 [ 1914.166286] ? graph_lock+0x170/0x170 [ 1914.170106] ? graph_lock+0x170/0x170 [ 1914.173922] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1914.178702] ? find_held_lock+0x36/0x1c0 [ 1914.182785] ? __lock_is_held+0xb5/0x140 [ 1914.186873] ? ___might_sleep+0x1ed/0x300 [ 1914.191033] ? arch_local_save_flags+0x40/0x40 [ 1914.196381] __should_failslab+0x124/0x180 [ 1914.200635] should_failslab+0x9/0x14 [ 1914.204449] kmem_cache_alloc+0x2be/0x730 [ 1914.208627] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1914.213396] ? mmu_topup_memory_caches+0xf7/0x390 [ 1914.218258] mmu_topup_memory_caches+0xf7/0x390 [ 1914.222948] kvm_mmu_load+0x21/0xfa0 [ 1914.226681] ? vcpu_enter_guest+0x26c3/0x6380 [ 1914.231196] vcpu_enter_guest+0x3dbe/0x6380 [ 1914.235544] ? emulator_read_emulated+0x50/0x50 [ 1914.240227] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1914.244823] ? retint_kernel+0x2d/0x2d [ 1914.248975] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1914.253918] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1914.258689] ? trace_hardirqs_off+0x310/0x310 [ 1914.263214] ? mark_held_locks+0xc7/0x130 [ 1914.267376] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1914.272145] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1914.276738] ? retint_kernel+0x2d/0x2d [ 1914.280644] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1914.285590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1914.290360] ? trace_hardirqs_off+0x310/0x310 [ 1914.294885] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1914.299662] ? retint_kernel+0x2d/0x2d [ 1914.303583] kvm_arch_vcpu_ioctl_run+0x375/0x16e0 [ 1914.308446] ? kvm_arch_vcpu_ioctl_run+0x375/0x16e0 [ 1914.313507] kvm_vcpu_ioctl+0x72b/0x1150 [ 1914.317588] ? kvm_vcpu_block+0x1030/0x1030 [ 1914.321933] ? find_held_lock+0x36/0x1c0 [ 1914.326013] ? __fget+0x4aa/0x740 [ 1914.329488] ? check_preemption_disabled+0x48/0x200 [ 1914.334523] ? kasan_check_read+0x11/0x20 [ 1914.338686] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1914.343975] ? rcu_bh_qs+0xc0/0xc0 [ 1914.347539] ? __fget+0x4d1/0x740 [ 1914.351009] ? ksys_dup3+0x680/0x680 [ 1914.354734] ? find_held_lock+0x36/0x1c0 [ 1914.358822] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1914.363779] ? kvm_vcpu_block+0x1030/0x1030 [ 1914.368113] do_vfs_ioctl+0x1de/0x1720 [ 1914.372012] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 1914.377222] ? ioctl_preallocate+0x300/0x300 [ 1914.381899] ? selinux_file_mprotect+0x620/0x620 [ 1914.386673] ? __sb_end_write+0xd9/0x110 [ 1914.390755] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1914.396307] ? fput+0x130/0x1a0 [ 1914.399600] ? do_syscall_64+0x9a/0x820 [ 1914.403591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1914.409143] ? security_file_ioctl+0x94/0xc0 [ 1914.413570] ksys_ioctl+0xa9/0xd0 [ 1914.417040] __x64_sys_ioctl+0x73/0xb0 [ 1914.420943] do_syscall_64+0x1b9/0x820 [ 1914.424841] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1914.430221] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1914.435161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1914.440020] ? trace_hardirqs_on_caller+0x310/0x310 [ 1914.445071] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1914.450103] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1914.455145] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1914.460010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1914.465207] RIP: 0033:0x457519 [ 1914.468414] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1914.487334] RSP: 002b:00007f53c6312c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1914.495066] RAX: ffffffffffffffda RBX: 00007f53c6312c90 RCX: 0000000000457519 [ 1914.502352] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 1914.509632] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1914.516915] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f53c63136d4 13:42:24 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6609, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1914.524224] R13: 00000000004bffda R14: 00000000004d00a8 R15: 0000000000000007 13:42:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xa5, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x11b4}, 0x28) 13:42:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB, @ANYRESDEC], 0x14) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:24 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:24 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4b49, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xa5, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902", @ANYRESDEC], 0xb2) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:24 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xa68}, 0x28) 13:42:24 executing program 0 (fault-call:16 fault-nth:0): r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb1, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d00", @ANYRESDEC], 0x101) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:25 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6609, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x4f3}, 0x28) 13:42:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb1, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:25 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x40087602, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7", @ANYRESDEC], 0x129) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:25 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4b47, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x220}, 0x28) 13:42:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb1, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:25 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5451, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1915.494690] audit: type=1804 audit(1539351745.627:203): pid=30812 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2965/bus" dev="sda1" ino=16611 res=1 13:42:25 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x13d) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x5e9}, 0x28) 13:42:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb7, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c0", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:25 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6612, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:25 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x81a0ae8c, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x147) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb7, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c0", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:25 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x11cd}, 0x28) 13:42:25 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x660c, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x14c) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb7, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c0", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1916.067060] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:26 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x80087601, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xe64}, 0x28) 13:42:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x14e) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:26 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x40049409, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:26 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x8, 0x30}, &(0x7f0000000340)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000380)={r3, 0x8}, 0x8) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r4, 0x4, 0x6100) fdatasync(r2) ftruncate(r4, 0x8200) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000001c0)={0x1, 0x0, [{0xf000, 0x7a, &(0x7f00000002c0)=""/122}]}) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r6 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r6, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xba, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839e", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1916.103578] audit: type=1804 audit(1539351746.237:204): pid=30892 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2966/bus" dev="sda1" ino=16627 res=1 13:42:26 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0c0583b, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x14f) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xba, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839e", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x209}, 0x28) 13:42:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:26 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40286608, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xba, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839e", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1916.471690] EXT4-fs warning (device sda1): ext4_group_add:1637: No reserved GDT blocks, can't resize [ 1916.488212] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:26 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x4f8}, 0x28) 13:42:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x45}], 0x1, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:26 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x5451, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) [ 1916.541754] audit: type=1804 audit(1539351746.677:205): pid=30931 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2967/bus" dev="sda1" ino=16638 res=1 [ 1916.646948] audit: type=1804 audit(1539351746.777:206): pid=30910 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2967/bus" dev="sda1" ino=16638 res=1 [ 1916.677969] audit: type=1804 audit(1539351746.777:207): pid=30923 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2967/bus" dev="sda1" ino=16638 res=1 [ 1916.766274] audit: type=1804 audit(1539351746.777:208): pid=30931 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2967/bus" dev="sda1" ino=16638 res=1 [ 1916.794131] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbb, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebf", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:27 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5452, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x45}], 0x1, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x34c}, 0x28) [ 1916.877521] audit: type=1804 audit(1539351747.017:209): pid=30955 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2967/bus" dev="sda1" ino=16638 res=1 13:42:27 executing program 0: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x3f) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1}) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000001c0)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:27 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x8090ae81, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:27 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x801c581f, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x45}], 0x1, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbb, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebf", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x1089}, 0x28) 13:42:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x450}, 0x28) 13:42:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbb, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebf", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x495}, 0x28) 13:42:27 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x80086603, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/188, 0xbc}], 0x1, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:27 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x541b, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1917.411312] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1917.497280] audit: type=1804 audit(1539351747.637:210): pid=31018 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2968/bus" dev="sda1" ino=16649 res=1 [ 1917.560917] audit: type=1804 audit(1539351747.637:211): pid=31011 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2968/bus" dev="sda1" ino=16649 res=1 [ 1917.616174] audit: type=1804 audit(1539351747.697:212): pid=31018 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2968/bus" dev="sda1" ino=16649 res=1 13:42:27 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000001c0)) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:27 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x80086601, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/188, 0xbc}], 0x1, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148}, 0x28) 13:42:27 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xd26}, 0x28) 13:42:27 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5460, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1917.688630] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148}, 0x28) 13:42:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/188, 0xbc}], 0x1, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:28 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x2, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x5d0}, 0x28) 13:42:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148}, 0x28) 13:42:28 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x80086601, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1918.197633] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1918.331800] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:28 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) sendto$unix(r0, &(0x7f0000000440)="0f5649cd918a7d0e19fbd90be208c139413795aae3d2ba66f83173c8f65f81d5f022e3ea8aa2fa7d4ad70283aee354d5725828bc96e93fea9103d5479b5aa286910dffd34e325ba3c1814a71d4f2d14657d4e812b5b46ab4461953889e721d52560253b490f8ad8ca25425202bafc474461b340d8dd9ab0e219b6839463628950f70ee1ff51171b4ccbeb044329cf34e4292c7371fc3b8c7408c758b319394f22ee2d0d9d74ce226ff1eceaedb3ac1d4ce571b89030441732049f8f1a3c168b769242bbdb18196f2239e5d7019edc5bd9fd156c2f6e7091eb04b96a4c9e69ab0bad36d96e4f21c3508", 0xe9, 0x40001, &(0x7f0000000340)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) bind(r4, &(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @dev={[], 0x21}, 'ip_vti0\x00'}}, 0x80) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:28 executing program 4 (fault-call:7 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:28 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086610, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:28 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x4004ae8b, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:28 executing program 5 (fault-call:1 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x963}, 0x28) [ 1918.517069] EXT4-fs warning (device sda1): ext4_resize_fs:1917: can't read last block, resize aborted [ 1918.521814] FAULT_INJECTION: forcing a failure. [ 1918.521814] name failslab, interval 1, probability 0, space 0, times 0 [ 1918.550028] CPU: 0 PID: 31097 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #59 [ 1918.557378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:42:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x81a}, 0x28) [ 1918.566767] Call Trace: [ 1918.569380] dump_stack+0x1c4/0x2b4 [ 1918.573033] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1918.578269] should_fail.cold.4+0xa/0x17 [ 1918.582360] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1918.587494] ? graph_lock+0x170/0x170 [ 1918.591311] ? perf_trace_lock+0x14d/0x7a0 [ 1918.595559] ? graph_lock+0x170/0x170 [ 1918.599375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.604932] ? check_preemption_disabled+0x48/0x200 [ 1918.609961] ? find_held_lock+0x36/0x1c0 [ 1918.614030] ? __lock_is_held+0xb5/0x140 [ 1918.618108] ? ___might_sleep+0x1ed/0x300 [ 1918.622253] ? arch_local_save_flags+0x40/0x40 [ 1918.626834] ? print_usage_bug+0xc0/0xc0 [ 1918.630897] __should_failslab+0x124/0x180 [ 1918.635138] should_failslab+0x9/0x14 [ 1918.638939] __kmalloc+0x2d4/0x760 [ 1918.642507] ? sock_kmalloc+0x15a/0x1f0 [ 1918.646492] sock_kmalloc+0x15a/0x1f0 [ 1918.650287] ? __sk_mem_schedule+0xe0/0xe0 [ 1918.654518] ? trace_hardirqs_on+0xbd/0x310 [ 1918.658833] ? lock_release+0x970/0x970 [ 1918.662798] ? lock_sock_nested+0xe2/0x120 [ 1918.667031] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1918.672523] af_alg_alloc_areq+0x83/0x280 [ 1918.676679] ? alg_accept+0x60/0x60 [ 1918.680317] ? __local_bh_enable_ip+0x160/0x260 [ 1918.685019] skcipher_recvmsg+0x350/0x11e0 [ 1918.689261] ? skcipher_bind+0x30/0x30 [ 1918.693147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.698678] ? security_socket_recvmsg+0x9c/0xc0 [ 1918.703426] ? skcipher_bind+0x30/0x30 [ 1918.707306] sock_recvmsg+0xd0/0x110 [ 1918.711014] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1918.716031] ___sys_recvmsg+0x2b6/0x680 [ 1918.720018] ? ___sys_sendmsg+0x930/0x930 [ 1918.724160] ? lock_downgrade+0x900/0x900 [ 1918.728316] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1918.733868] ? proc_fail_nth_write+0x9e/0x210 [ 1918.738390] ? __fget_light+0x2e9/0x430 [ 1918.742371] ? fget_raw+0x20/0x20 [ 1918.745820] ? kasan_check_write+0x14/0x20 [ 1918.750047] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1918.754973] ? wait_for_completion+0x8a0/0x8a0 [ 1918.759556] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1918.765086] ? sockfd_lookup_light+0xc5/0x160 [ 1918.769579] __sys_recvmsg+0x11a/0x280 [ 1918.773481] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1918.778082] ? __sb_end_write+0xd9/0x110 [ 1918.782145] ? fput+0x130/0x1a0 [ 1918.785418] ? do_syscall_64+0x9a/0x820 [ 1918.789391] ? do_syscall_64+0x9a/0x820 [ 1918.793366] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1918.798861] __x64_sys_recvmsg+0x78/0xb0 [ 1918.802925] do_syscall_64+0x1b9/0x820 [ 1918.806812] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1918.812173] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1918.817103] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1918.821981] ? trace_hardirqs_on_caller+0x310/0x310 [ 1918.827006] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1918.832020] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1918.837031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1918.841885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1918.847090] RIP: 0033:0x457519 [ 1918.850306] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1918.869200] RSP: 002b:00007f4684121c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1918.876905] RAX: ffffffffffffffda RBX: 00007f4684121c90 RCX: 0000000000457519 [ 1918.884163] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 1918.891421] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1918.898680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46841226d4 [ 1918.905961] R13: 00000000004c3200 R14: 00000000004d4da0 R15: 0000000000000006 [ 1918.971484] EXT4-fs warning (device sda1): ext4_resize_fs:1917: can't read last block, resize aborted 13:42:29 executing program 4 (fault-call:7 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0xf0ffffffffffff}, 0x28) 13:42:29 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40106614, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1919.188713] FAULT_INJECTION: forcing a failure. [ 1919.188713] name failslab, interval 1, probability 0, space 0, times 0 [ 1919.205054] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1919.237932] CPU: 1 PID: 31133 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #59 [ 1919.245275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1919.254651] Call Trace: [ 1919.257272] dump_stack+0x1c4/0x2b4 [ 1919.260925] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1919.266147] should_fail.cold.4+0xa/0x17 [ 1919.270229] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1919.275348] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1919.280373] ? get_user_pages_fast+0x2a9/0x450 [ 1919.284973] ? graph_lock+0x170/0x170 [ 1919.288784] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1919.294265] ? __kernel_text_address+0xd/0x40 [ 1919.298775] ? unwind_get_return_address+0x61/0xa0 [ 1919.303731] ? graph_lock+0x170/0x170 [ 1919.307615] ? __save_stack_trace+0x8d/0xf0 [ 1919.311958] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1919.316989] ? find_held_lock+0x36/0x1c0 [ 1919.321062] ? __lock_is_held+0xb5/0x140 [ 1919.325146] ? ___might_sleep+0x1ed/0x300 [ 1919.329308] ? arch_local_save_flags+0x40/0x40 [ 1919.333897] ? find_held_lock+0x36/0x1c0 [ 1919.337977] __should_failslab+0x124/0x180 [ 1919.342220] should_failslab+0x9/0x14 [ 1919.346034] __kmalloc+0x2d4/0x760 [ 1919.349589] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1919.354614] ? iov_iter_advance+0x2ec/0x1460 [ 1919.359096] ? sg_init_table+0x28/0x60 [ 1919.362994] ? sock_kmalloc+0x15a/0x1f0 [ 1919.366984] sock_kmalloc+0x15a/0x1f0 [ 1919.370820] ? __sk_mem_schedule+0xe0/0xe0 [ 1919.375067] ? rcu_read_lock_sched_held+0x108/0x120 [ 1919.380575] af_alg_get_rsgl+0x1d7/0x920 [ 1919.384662] ? af_alg_make_sg+0x550/0x550 [ 1919.388819] ? lock_sock_nested+0xe2/0x120 [ 1919.393070] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1919.398539] ? af_alg_alloc_areq+0x1ec/0x280 [ 1919.402958] ? alg_accept+0x60/0x60 [ 1919.406601] ? __local_bh_enable_ip+0x160/0x260 [ 1919.411291] skcipher_recvmsg+0x39e/0x11e0 [ 1919.415554] ? skcipher_bind+0x30/0x30 [ 1919.419456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.425037] ? security_socket_recvmsg+0x9c/0xc0 [ 1919.429803] ? skcipher_bind+0x30/0x30 [ 1919.433705] sock_recvmsg+0xd0/0x110 [ 1919.437429] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1919.442452] ___sys_recvmsg+0x2b6/0x680 [ 1919.446452] ? ___sys_sendmsg+0x930/0x930 [ 1919.450620] ? lock_downgrade+0x900/0x900 [ 1919.454780] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1919.460322] ? proc_fail_nth_write+0x9e/0x210 [ 1919.464836] ? __fget_light+0x2e9/0x430 [ 1919.468822] ? fget_raw+0x20/0x20 [ 1919.472290] ? kasan_check_write+0x14/0x20 [ 1919.476536] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1919.481486] ? wait_for_completion+0x8a0/0x8a0 [ 1919.486107] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1919.491652] ? sockfd_lookup_light+0xc5/0x160 [ 1919.496175] __sys_recvmsg+0x11a/0x280 [ 1919.500072] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1919.504663] ? __sb_end_write+0xd9/0x110 [ 1919.508738] ? fput+0x130/0x1a0 [ 1919.512024] ? do_syscall_64+0x9a/0x820 [ 1919.516005] ? do_syscall_64+0x9a/0x820 [ 1919.519998] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1919.525467] __x64_sys_recvmsg+0x78/0xb0 [ 1919.529554] do_syscall_64+0x1b9/0x820 [ 1919.533450] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1919.538830] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1919.543765] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1919.548619] ? trace_hardirqs_on_caller+0x310/0x310 [ 1919.553645] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1919.558672] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1919.563700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1919.568558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1919.573751] RIP: 0033:0x457519 [ 1919.576953] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1919.595864] RSP: 002b:00007f4684121c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1919.603584] RAX: ffffffffffffffda RBX: 00007f4684121c90 RCX: 0000000000457519 [ 1919.610856] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 1919.618133] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1919.625408] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46841226d4 [ 1919.632698] R13: 00000000004c3200 R14: 00000000004d4da0 R15: 0000000000000006 [ 1919.821519] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:30 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x4048ae9b, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:30 executing program 4 (fault-call:7 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0xf0ffff}, 0x28) 13:42:30 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000001c0), &(0x7f0000000240)=0x4) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:30 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4020940d, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1919.939193] FAULT_INJECTION: forcing a failure. [ 1919.939193] name failslab, interval 1, probability 0, space 0, times 0 [ 1919.994381] CPU: 1 PID: 31158 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #59 [ 1920.001727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1920.011096] Call Trace: [ 1920.013714] dump_stack+0x1c4/0x2b4 [ 1920.017372] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1920.022600] should_fail.cold.4+0xa/0x17 [ 1920.026697] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1920.031830] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1920.036869] ? get_user_pages_fast+0x2a9/0x450 [ 1920.041483] ? graph_lock+0x170/0x170 [ 1920.045295] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1920.050066] ? kasan_kmalloc+0xc7/0xe0 [ 1920.053971] ? sock_kmalloc+0x15a/0x1f0 [ 1920.057963] ? af_alg_get_rsgl+0x1d7/0x920 [ 1920.062216] ? graph_lock+0x170/0x170 [ 1920.066035] ? __sys_recvmsg+0x11a/0x280 [ 1920.070120] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1920.075158] ? find_held_lock+0x36/0x1c0 [ 1920.079240] ? __lock_is_held+0xb5/0x140 [ 1920.083340] ? ___might_sleep+0x1ed/0x300 [ 1920.087518] ? arch_local_save_flags+0x40/0x40 [ 1920.092138] __should_failslab+0x124/0x180 [ 1920.096392] should_failslab+0x9/0x14 [ 1920.100206] __kmalloc+0x2d4/0x760 [ 1920.103759] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1920.108782] ? iov_iter_advance+0x2ec/0x1460 [ 1920.113204] ? sg_init_table+0x28/0x60 [ 1920.117096] ? sock_kmalloc+0x15a/0x1f0 [ 1920.121083] sock_kmalloc+0x15a/0x1f0 [ 1920.124914] ? __sk_mem_schedule+0xe0/0xe0 [ 1920.129160] ? rcu_read_lock_sched_held+0x108/0x120 [ 1920.134189] af_alg_get_rsgl+0x1d7/0x920 [ 1920.138278] ? af_alg_make_sg+0x550/0x550 [ 1920.142432] ? lock_sock_nested+0xe2/0x120 [ 1920.146676] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1920.152141] ? af_alg_alloc_areq+0x1ec/0x280 [ 1920.156555] ? alg_accept+0x60/0x60 [ 1920.160193] ? __local_bh_enable_ip+0x160/0x260 [ 1920.164880] skcipher_recvmsg+0x39e/0x11e0 [ 1920.169142] ? skcipher_bind+0x30/0x30 [ 1920.173045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.178591] ? security_socket_recvmsg+0x9c/0xc0 [ 1920.183358] ? skcipher_bind+0x30/0x30 [ 1920.187261] sock_recvmsg+0xd0/0x110 [ 1920.190986] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1920.196012] ___sys_recvmsg+0x2b6/0x680 [ 1920.200005] ? ___sys_sendmsg+0x930/0x930 [ 1920.204163] ? lock_downgrade+0x900/0x900 [ 1920.208325] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1920.213865] ? proc_fail_nth_write+0x9e/0x210 [ 1920.218375] ? __fget_light+0x2e9/0x430 [ 1920.222358] ? fget_raw+0x20/0x20 [ 1920.225825] ? kasan_check_write+0x14/0x20 [ 1920.230072] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1920.235019] ? wait_for_completion+0x8a0/0x8a0 [ 1920.239626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1920.245168] ? sockfd_lookup_light+0xc5/0x160 [ 1920.249930] __sys_recvmsg+0x11a/0x280 [ 1920.253832] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1920.258422] ? __sb_end_write+0xd9/0x110 [ 1920.262501] ? fput+0x130/0x1a0 [ 1920.265803] ? do_syscall_64+0x9a/0x820 [ 1920.269786] ? do_syscall_64+0x9a/0x820 [ 1920.273777] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1920.279252] __x64_sys_recvmsg+0x78/0xb0 [ 1920.283327] do_syscall_64+0x1b9/0x820 [ 1920.287220] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1920.292594] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1920.297529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1920.302381] ? trace_hardirqs_on_caller+0x310/0x310 [ 1920.307409] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1920.312434] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1920.317480] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1920.322342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1920.327545] RIP: 0033:0x457519 13:42:30 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086604, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1920.330745] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1920.349660] RSP: 002b:00007f4684121c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1920.357378] RAX: ffffffffffffffda RBX: 00007f4684121c90 RCX: 0000000000457519 [ 1920.364654] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 1920.371927] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1920.379701] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46841226d4 [ 1920.386993] R13: 00000000004c3200 R14: 00000000004d4da0 R15: 0000000000000006 13:42:30 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:30 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6611, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:30 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x4030582a, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0x200000000000000}, 0x28) 13:42:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:30 executing program 4 (fault-call:7 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1920.731662] kauditd_printk_skb: 12 callbacks suppressed [ 1920.731678] audit: type=1804 audit(1539351750.867:225): pid=31197 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2971/bus" dev="sda1" ino=16652 res=1 13:42:30 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0189436, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1920.845357] audit: type=1804 audit(1539351750.977:226): pid=31181 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2971/bus" dev="sda1" ino=16652 res=1 [ 1920.902387] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1920.903640] FAULT_INJECTION: forcing a failure. [ 1920.903640] name failslab, interval 1, probability 0, space 0, times 0 [ 1920.930572] audit: type=1804 audit(1539351750.977:227): pid=31191 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2971/bus" dev="sda1" ino=16652 res=1 [ 1920.958716] CPU: 0 PID: 31222 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #59 [ 1920.966020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1920.966028] Call Trace: [ 1920.966053] dump_stack+0x1c4/0x2b4 [ 1920.966075] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1920.986837] should_fail.cold.4+0xa/0x17 [ 1920.990924] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1920.996047] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1921.001084] ? get_user_pages_fast+0x2a9/0x450 [ 1921.005685] ? graph_lock+0x170/0x170 [ 1921.009500] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1921.009515] ? kasan_kmalloc+0xc7/0xe0 [ 1921.009535] ? sock_kmalloc+0x15a/0x1f0 [ 1921.009552] ? af_alg_get_rsgl+0x1d7/0x920 [ 1921.009568] ? graph_lock+0x170/0x170 [ 1921.009588] ? __sys_recvmsg+0x11a/0x280 [ 1921.034320] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1921.039355] ? find_held_lock+0x36/0x1c0 [ 1921.043431] ? __lock_is_held+0xb5/0x140 [ 1921.047522] ? ___might_sleep+0x1ed/0x300 [ 1921.051683] ? arch_local_save_flags+0x40/0x40 [ 1921.056288] __should_failslab+0x124/0x180 [ 1921.060538] should_failslab+0x9/0x14 [ 1921.064345] __kmalloc+0x2d4/0x760 [ 1921.067895] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1921.072935] ? iov_iter_advance+0x2ec/0x1460 [ 1921.077355] ? sg_init_table+0x28/0x60 [ 1921.081249] ? sock_kmalloc+0x15a/0x1f0 [ 1921.085240] sock_kmalloc+0x15a/0x1f0 [ 1921.089056] ? __sk_mem_schedule+0xe0/0xe0 [ 1921.093305] ? rcu_read_lock_sched_held+0x108/0x120 [ 1921.098336] af_alg_get_rsgl+0x1d7/0x920 [ 1921.102423] ? af_alg_make_sg+0x550/0x550 [ 1921.106583] ? lock_sock_nested+0xe2/0x120 [ 1921.110828] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1921.116292] ? af_alg_alloc_areq+0x1ec/0x280 [ 1921.120708] ? alg_accept+0x60/0x60 [ 1921.124349] ? __local_bh_enable_ip+0x160/0x260 [ 1921.129034] skcipher_recvmsg+0x39e/0x11e0 [ 1921.133295] ? skcipher_bind+0x30/0x30 [ 1921.137197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.142748] ? security_socket_recvmsg+0x9c/0xc0 [ 1921.147515] ? skcipher_bind+0x30/0x30 [ 1921.151415] sock_recvmsg+0xd0/0x110 [ 1921.155134] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1921.160159] ___sys_recvmsg+0x2b6/0x680 [ 1921.164154] ? ___sys_sendmsg+0x930/0x930 [ 1921.168315] ? lock_downgrade+0x900/0x900 [ 1921.172485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1921.178029] ? proc_fail_nth_write+0x9e/0x210 [ 1921.182538] ? __fget_light+0x2e9/0x430 [ 1921.186523] ? fget_raw+0x20/0x20 [ 1921.189993] ? kasan_check_write+0x14/0x20 [ 1921.194235] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1921.199180] ? wait_for_completion+0x8a0/0x8a0 [ 1921.203788] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1921.209334] ? sockfd_lookup_light+0xc5/0x160 [ 1921.213844] __sys_recvmsg+0x11a/0x280 [ 1921.217751] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1921.222341] ? __sb_end_write+0xd9/0x110 [ 1921.226414] ? fput+0x130/0x1a0 [ 1921.229706] ? do_syscall_64+0x9a/0x820 [ 1921.233690] ? do_syscall_64+0x9a/0x820 [ 1921.237686] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1921.243157] __x64_sys_recvmsg+0x78/0xb0 [ 1921.247230] do_syscall_64+0x1b9/0x820 [ 1921.251129] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1921.256523] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1921.261459] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1921.266321] ? trace_hardirqs_on_caller+0x310/0x310 [ 1921.271348] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1921.276376] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1921.281405] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1921.286262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1921.291479] RIP: 0033:0x457519 [ 1921.294698] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1921.313613] RSP: 002b:00007f4684121c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1921.321336] RAX: ffffffffffffffda RBX: 00007f4684121c90 RCX: 0000000000457519 [ 1921.328611] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 1921.335890] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1921.343164] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46841226d4 [ 1921.350438] R13: 00000000004c3200 R14: 00000000004d4da0 R15: 0000000000000006 [ 1921.488596] audit: type=1804 audit(1539351750.977:228): pid=31197 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2971/bus" dev="sda1" ino=16652 res=1 13:42:31 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ioctl$sock_bt(r0, 0x5411, &(0x7f00000002c0)="e6a1c1606cc826520fe27b6fa2313f4a104dbc49ea6d9050ab27bc3862b26041a48bab380cbf1b99b5f1f49a1978228d147a8c59d5f5b148ae9bf4ba2e34e2f5aa15d48e97") ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:31 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0185879, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:31 executing program 4 (fault-call:7 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:31 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x4090ae82, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) [ 1921.543169] audit: type=1804 audit(1539351750.977:229): pid=31202 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2971/bus" dev="sda1" ino=16652 res=1 13:42:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0xa0008000}, 0x28) [ 1921.613485] FAULT_INJECTION: forcing a failure. [ 1921.613485] name failslab, interval 1, probability 0, space 0, times 0 [ 1921.624875] CPU: 0 PID: 31246 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #59 [ 1921.632168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1921.641535] Call Trace: [ 1921.644157] dump_stack+0x1c4/0x2b4 [ 1921.647821] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1921.653059] should_fail.cold.4+0xa/0x17 [ 1921.657141] ? fault_create_debugfs_attr+0x1f0/0x1f0 13:42:31 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0045878, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1921.662347] ? check_preemption_disabled+0x48/0x200 [ 1921.667380] ? check_preemption_disabled+0x48/0x200 [ 1921.672455] ? graph_lock+0x170/0x170 [ 1921.676298] ? graph_lock+0x170/0x170 [ 1921.680131] ? find_held_lock+0x36/0x1c0 [ 1921.684211] ? __lock_is_held+0xb5/0x140 [ 1921.688333] ? ___might_sleep+0x1ed/0x300 [ 1921.692502] ? arch_local_save_flags+0x40/0x40 [ 1921.697104] ? rcu_read_lock_sched_held+0x108/0x120 [ 1921.702144] __should_failslab+0x124/0x180 [ 1921.706401] should_failslab+0x9/0x14 [ 1921.710228] __kmalloc+0x2d4/0x760 [ 1921.713797] ? af_alg_make_sg+0x550/0x550 [ 1921.717963] ? sock_kmalloc+0x15a/0x1f0 [ 1921.721964] sock_kmalloc+0x15a/0x1f0 [ 1921.725788] ? __sk_mem_schedule+0xe0/0xe0 [ 1921.730044] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1921.735075] ? af_alg_count_tsgl+0x1bc/0x250 [ 1921.739511] skcipher_recvmsg+0x4fd/0x11e0 [ 1921.743780] ? skcipher_bind+0x30/0x30 [ 1921.747681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.753229] ? security_socket_recvmsg+0x9c/0xc0 [ 1921.757993] ? skcipher_bind+0x30/0x30 [ 1921.761892] sock_recvmsg+0xd0/0x110 [ 1921.765612] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1921.770638] ___sys_recvmsg+0x2b6/0x680 [ 1921.774637] ? ___sys_sendmsg+0x930/0x930 [ 1921.778796] ? lock_downgrade+0x900/0x900 [ 1921.782955] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1921.788506] ? proc_fail_nth_write+0x9e/0x210 [ 1921.793016] ? __fget_light+0x2e9/0x430 [ 1921.797001] ? fget_raw+0x20/0x20 [ 1921.800466] ? kasan_check_write+0x14/0x20 [ 1921.804718] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1921.809663] ? wait_for_completion+0x8a0/0x8a0 [ 1921.814264] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1921.819813] ? sockfd_lookup_light+0xc5/0x160 [ 1921.824321] __sys_recvmsg+0x11a/0x280 [ 1921.828218] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1921.832807] ? __sb_end_write+0xd9/0x110 [ 1921.836913] ? fput+0x130/0x1a0 [ 1921.840201] ? do_syscall_64+0x9a/0x820 [ 1921.844196] ? do_syscall_64+0x9a/0x820 [ 1921.848190] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1921.853659] __x64_sys_recvmsg+0x78/0xb0 [ 1921.857737] do_syscall_64+0x1b9/0x820 [ 1921.861642] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1921.867039] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1921.871992] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1921.876847] ? trace_hardirqs_on_caller+0x310/0x310 [ 1921.881869] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1921.886892] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1921.891926] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1921.896793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1921.901988] RIP: 0033:0x457519 [ 1921.905187] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1921.924096] RSP: 002b:00007f4684121c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1921.931816] RAX: ffffffffffffffda RBX: 00007f4684121c90 RCX: 0000000000457519 [ 1921.939114] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 1921.946387] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1921.953658] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46841226d4 [ 1921.960933] R13: 00000000004c3200 R14: 00000000004d4da0 R15: 0000000000000006 13:42:32 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40049409, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0x8000a0}, 0x28) 13:42:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:32 executing program 4 (fault-call:7 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) [ 1922.159792] audit: type=1804 audit(1539351752.297:230): pid=31269 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2972/bus" dev="sda1" ino=16652 res=1 [ 1922.203889] FAULT_INJECTION: forcing a failure. [ 1922.203889] name failslab, interval 1, probability 0, space 0, times 0 [ 1922.223760] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1922.259216] CPU: 0 PID: 31277 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #59 [ 1922.266580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1922.275952] Call Trace: [ 1922.278564] dump_stack+0x1c4/0x2b4 [ 1922.282222] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1922.287452] should_fail.cold.4+0xa/0x17 [ 1922.291545] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1922.296663] ? graph_lock+0x170/0x170 [ 1922.300499] ? print_usage_bug+0xc0/0xc0 [ 1922.304584] ? graph_lock+0x170/0x170 [ 1922.308402] ? graph_lock+0x170/0x170 [ 1922.312220] ? graph_lock+0x170/0x170 [ 1922.316039] ? find_held_lock+0x36/0x1c0 [ 1922.320122] ? find_held_lock+0x36/0x1c0 [ 1922.324203] ? __lock_is_held+0xb5/0x140 [ 1922.324238] ? ___might_sleep+0x1ed/0x300 [ 1922.324258] ? arch_local_save_flags+0x40/0x40 [ 1922.324272] ? kasan_check_write+0x14/0x20 [ 1922.324293] ? do_raw_spin_lock+0xc1/0x200 [ 1922.332516] __should_failslab+0x124/0x180 [ 1922.332536] should_failslab+0x9/0x14 [ 1922.332554] __kmalloc+0x2d4/0x760 [ 1922.332573] ? __local_bh_enable_ip+0x160/0x260 [ 1922.332595] ? sock_kmalloc+0x15a/0x1f0 [ 1922.365818] sock_kmalloc+0x15a/0x1f0 [ 1922.369641] ? __sk_mem_schedule+0xe0/0xe0 [ 1922.373886] ? __init_waitqueue_head+0x150/0x150 [ 1922.378864] af_alg_alloc_areq+0x83/0x280 [ 1922.383021] ? alg_accept+0x60/0x60 [ 1922.386655] ? kasan_check_write+0x14/0x20 [ 1922.390898] ? sock_kfree_s+0x47/0x60 [ 1922.394712] skcipher_recvmsg+0x350/0x11e0 [ 1922.398974] ? skcipher_bind+0x30/0x30 [ 1922.402910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.408460] ? security_socket_recvmsg+0x9c/0xc0 [ 1922.413234] ? skcipher_bind+0x30/0x30 [ 1922.417130] sock_recvmsg+0xd0/0x110 [ 1922.420853] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1922.425879] ___sys_recvmsg+0x2b6/0x680 [ 1922.429871] ? ___sys_sendmsg+0x930/0x930 [ 1922.434035] ? lock_downgrade+0x900/0x900 [ 1922.438192] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1922.443739] ? proc_fail_nth_write+0x9e/0x210 [ 1922.448251] ? __fget_light+0x2e9/0x430 [ 1922.452248] ? fget_raw+0x20/0x20 [ 1922.455716] ? kasan_check_write+0x14/0x20 [ 1922.459968] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1922.464909] ? wait_for_completion+0x8a0/0x8a0 [ 1922.469516] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1922.475060] ? sockfd_lookup_light+0xc5/0x160 [ 1922.479569] __sys_recvmsg+0x11a/0x280 [ 1922.483464] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1922.488061] ? __sb_end_write+0xd9/0x110 [ 1922.492130] ? fput+0x130/0x1a0 [ 1922.495418] ? do_syscall_64+0x9a/0x820 [ 1922.499401] ? do_syscall_64+0x9a/0x820 [ 1922.503393] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1922.508862] __x64_sys_recvmsg+0x78/0xb0 [ 1922.512937] do_syscall_64+0x1b9/0x820 [ 1922.516833] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1922.522206] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1922.527142] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1922.532018] ? trace_hardirqs_on_caller+0x310/0x310 [ 1922.537048] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1922.542095] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1922.547126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1922.551987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1922.557179] RIP: 0033:0x457519 [ 1922.560391] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1922.579300] RSP: 002b:00007f4684121c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1922.587043] RAX: ffffffffffffffda RBX: 00007f4684121c90 RCX: 0000000000457519 [ 1922.594321] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 1922.601593] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1922.608905] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46841226d4 [ 1922.616178] R13: 00000000004c3200 R14: 00000000004d4da0 R15: 0000000000000006 [ 1922.671115] audit: type=1804 audit(1539351752.787:231): pid=31254 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2972/bus" dev="sda1" ino=16652 res=1 [ 1922.722789] audit: type=1804 audit(1539351752.787:232): pid=31261 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2972/bus" dev="sda1" ino=16652 res=1 [ 1922.760330] audit: type=1804 audit(1539351752.797:233): pid=31261 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2972/bus" dev="sda1" ino=16652 res=1 [ 1922.797073] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:32 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40087602, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0xffffffffa0008000}, 0x28) 13:42:32 executing program 4 (fault-call:7 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:32 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x4020940d, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:33 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000300)="0ff8ed6e5b43afdc849a81453bfd717647761ab5689399ef27e64b69eb3ee73d158ab68776b4a59d47336b62aa9a73bfa66907c4e2c038489b59a6a78a5adbd44ca6b3538b1d2252f60fbf402a6f0d9394250c65f97abdd1d5c8ac5f3d246bb43c6d02ea23876ad30683fa2b4e0f3d06d2f8498b80147d4709c560034cebfe26c3832d643dcde1cd8003361b09d2aa2715be39c7d26e8e6621694f") write$P9_RRENAME(r1, &(0x7f0000000240)={0x7, 0x15, 0x1}, 0x7) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000002c0), 0x4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) [ 1922.809432] audit: type=1800 audit(1539351752.947:234): pid=31261 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor0" name="bus" dev="sda1" ino=16652 res=0 [ 1922.875308] FAULT_INJECTION: forcing a failure. [ 1922.875308] name failslab, interval 1, probability 0, space 0, times 0 [ 1922.902616] CPU: 0 PID: 31302 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #59 [ 1922.909967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1922.919347] Call Trace: [ 1922.919379] dump_stack+0x1c4/0x2b4 [ 1922.919410] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1922.919454] should_fail.cold.4+0xa/0x17 [ 1922.919498] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1922.940032] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1922.945154] ? get_user_pages_fast+0x2a9/0x450 [ 1922.949773] ? graph_lock+0x170/0x170 [ 1922.953593] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1922.958364] ? __kernel_text_address+0xd/0x40 [ 1922.962881] ? unwind_get_return_address+0x61/0xa0 [ 1922.967824] ? graph_lock+0x170/0x170 [ 1922.971638] ? __save_stack_trace+0x8d/0xf0 [ 1922.975975] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1922.981014] ? find_held_lock+0x36/0x1c0 [ 1922.985092] ? __lock_is_held+0xb5/0x140 [ 1922.989177] ? ___might_sleep+0x1ed/0x300 [ 1922.993342] ? arch_local_save_flags+0x40/0x40 [ 1922.997936] ? find_held_lock+0x36/0x1c0 [ 1923.002024] __should_failslab+0x124/0x180 [ 1923.006278] should_failslab+0x9/0x14 [ 1923.010093] __kmalloc+0x2d4/0x760 [ 1923.013650] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1923.018679] ? iov_iter_advance+0x2ec/0x1460 13:42:33 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x68, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1923.023108] ? sg_init_table+0x28/0x60 [ 1923.027008] ? sock_kmalloc+0x15a/0x1f0 [ 1923.031008] sock_kmalloc+0x15a/0x1f0 [ 1923.034829] ? __sk_mem_schedule+0xe0/0xe0 [ 1923.039079] ? rcu_read_lock_sched_held+0x108/0x120 [ 1923.044120] af_alg_get_rsgl+0x1d7/0x920 [ 1923.048217] ? af_alg_make_sg+0x550/0x550 [ 1923.052388] ? af_alg_alloc_areq+0x1ec/0x280 [ 1923.056818] ? alg_accept+0x60/0x60 [ 1923.060466] ? kasan_check_write+0x14/0x20 [ 1923.064729] ? sock_kfree_s+0x47/0x60 [ 1923.068563] skcipher_recvmsg+0x39e/0x11e0 [ 1923.072825] ? skcipher_bind+0x30/0x30 [ 1923.076724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1923.082276] ? security_socket_recvmsg+0x9c/0xc0 [ 1923.087041] ? skcipher_bind+0x30/0x30 [ 1923.090941] sock_recvmsg+0xd0/0x110 [ 1923.094664] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1923.099688] ___sys_recvmsg+0x2b6/0x680 [ 1923.103681] ? ___sys_sendmsg+0x930/0x930 [ 1923.107842] ? lock_downgrade+0x900/0x900 [ 1923.112003] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1923.117546] ? proc_fail_nth_write+0x9e/0x210 [ 1923.122055] ? __fget_light+0x2e9/0x430 [ 1923.126037] ? fget_raw+0x20/0x20 [ 1923.129507] ? kasan_check_write+0x14/0x20 [ 1923.133756] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1923.138701] ? wait_for_completion+0x8a0/0x8a0 [ 1923.143302] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1923.148845] ? sockfd_lookup_light+0xc5/0x160 [ 1923.153349] __sys_recvmsg+0x11a/0x280 [ 1923.157246] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1923.161837] ? __sb_end_write+0xd9/0x110 [ 1923.165906] ? fput+0x130/0x1a0 [ 1923.169197] ? do_syscall_64+0x9a/0x820 [ 1923.173181] ? do_syscall_64+0x9a/0x820 [ 1923.177176] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1923.182643] __x64_sys_recvmsg+0x78/0xb0 [ 1923.186714] do_syscall_64+0x1b9/0x820 [ 1923.190613] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1923.195987] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1923.200929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1923.205788] ? trace_hardirqs_on_caller+0x310/0x310 [ 1923.210817] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1923.215848] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1923.220878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1923.225748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1923.230943] RIP: 0033:0x457519 [ 1923.234142] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1923.253293] RSP: 002b:00007f4684121c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1923.261016] RAX: ffffffffffffffda RBX: 00007f4684121c90 RCX: 0000000000457519 [ 1923.268291] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 13:42:33 executing program 4 (fault-call:7 fault-nth:7): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) [ 1923.275564] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1923.282835] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46841226d4 [ 1923.290106] R13: 00000000004c3200 R14: 00000000004d4da0 R15: 0000000000000006 13:42:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0xfffffffffffff000}, 0x28) 13:42:33 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x41a0ae8d, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) [ 1923.463378] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:33 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305828, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1923.545689] FAULT_INJECTION: forcing a failure. [ 1923.545689] name failslab, interval 1, probability 0, space 0, times 0 [ 1923.588780] CPU: 0 PID: 31338 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #59 [ 1923.596120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1923.605492] Call Trace: [ 1923.605525] dump_stack+0x1c4/0x2b4 [ 1923.605556] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1923.605597] should_fail.cold.4+0xa/0x17 [ 1923.621040] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1923.621060] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1923.621079] ? get_user_pages_fast+0x2a9/0x450 [ 1923.621108] ? graph_lock+0x170/0x170 [ 1923.639632] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1923.644404] ? kasan_kmalloc+0xc7/0xe0 [ 1923.648311] ? sock_kmalloc+0x15a/0x1f0 [ 1923.652296] ? af_alg_get_rsgl+0x1d7/0x920 [ 1923.656542] ? graph_lock+0x170/0x170 [ 1923.660360] ? __sys_recvmsg+0x11a/0x280 [ 1923.664446] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1923.669502] ? find_held_lock+0x36/0x1c0 [ 1923.673585] ? __lock_is_held+0xb5/0x140 [ 1923.677719] ? ___might_sleep+0x1ed/0x300 [ 1923.681889] ? arch_local_save_flags+0x40/0x40 [ 1923.686513] __should_failslab+0x124/0x180 [ 1923.690773] should_failslab+0x9/0x14 [ 1923.694589] __kmalloc+0x2d4/0x760 [ 1923.698144] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1923.703177] ? iov_iter_advance+0x2ec/0x1460 [ 1923.707605] ? sg_init_table+0x28/0x60 [ 1923.711507] ? sock_kmalloc+0x15a/0x1f0 [ 1923.715523] sock_kmalloc+0x15a/0x1f0 [ 1923.719340] ? __sk_mem_schedule+0xe0/0xe0 [ 1923.723606] ? rcu_read_lock_sched_held+0x108/0x120 [ 1923.728638] af_alg_get_rsgl+0x1d7/0x920 [ 1923.732725] ? af_alg_make_sg+0x550/0x550 [ 1923.736894] ? af_alg_alloc_areq+0x1ec/0x280 [ 1923.741308] ? alg_accept+0x60/0x60 [ 1923.744942] ? kasan_check_write+0x14/0x20 [ 1923.749184] ? sock_kfree_s+0x47/0x60 [ 1923.752997] skcipher_recvmsg+0x39e/0x11e0 [ 1923.757255] ? skcipher_bind+0x30/0x30 [ 1923.761161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1923.766726] ? security_socket_recvmsg+0x9c/0xc0 [ 1923.771500] ? skcipher_bind+0x30/0x30 [ 1923.775412] sock_recvmsg+0xd0/0x110 [ 1923.779138] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1923.784167] ___sys_recvmsg+0x2b6/0x680 [ 1923.788159] ? ___sys_sendmsg+0x930/0x930 [ 1923.792322] ? lock_downgrade+0x900/0x900 [ 1923.796489] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1923.802034] ? proc_fail_nth_write+0x9e/0x210 [ 1923.806544] ? __fget_light+0x2e9/0x430 [ 1923.810531] ? fget_raw+0x20/0x20 [ 1923.813998] ? kasan_check_write+0x14/0x20 [ 1923.818240] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1923.823204] ? wait_for_completion+0x8a0/0x8a0 [ 1923.827809] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1923.833353] ? sockfd_lookup_light+0xc5/0x160 [ 1923.837859] __sys_recvmsg+0x11a/0x280 [ 1923.841763] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1923.846351] ? __sb_end_write+0xd9/0x110 [ 1923.850422] ? fput+0x130/0x1a0 [ 1923.853715] ? do_syscall_64+0x9a/0x820 [ 1923.857701] ? do_syscall_64+0x9a/0x820 [ 1923.861692] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1923.867161] __x64_sys_recvmsg+0x78/0xb0 [ 1923.871237] do_syscall_64+0x1b9/0x820 [ 1923.875131] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1923.880510] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1923.885449] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1923.890311] ? trace_hardirqs_on_caller+0x310/0x310 [ 1923.895336] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1923.900363] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1923.905396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1923.910256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1923.915465] RIP: 0033:0x457519 [ 1923.918676] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1923.937604] RSP: 002b:00007f4684121c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1923.945327] RAX: ffffffffffffffda RBX: 00007f4684121c90 RCX: 0000000000457519 [ 1923.952608] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 1923.959881] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1923.967155] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46841226d4 [ 1923.974433] R13: 00000000004c3200 R14: 00000000004d4da0 R15: 0000000000000006 13:42:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1924.004141] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0x1000000}, 0x28) 13:42:34 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0045878, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:34 executing program 4 (fault-call:7 fault-nth:8): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) [ 1924.212889] FAULT_INJECTION: forcing a failure. [ 1924.212889] name failslab, interval 1, probability 0, space 0, times 0 [ 1924.280206] CPU: 0 PID: 31372 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #59 [ 1924.287543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1924.296911] Call Trace: [ 1924.299524] dump_stack+0x1c4/0x2b4 [ 1924.303183] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1924.308416] should_fail.cold.4+0xa/0x17 [ 1924.312510] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1924.317628] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1924.322657] ? get_user_pages_fast+0x2a9/0x450 [ 1924.327257] ? graph_lock+0x170/0x170 [ 1924.331072] ? __get_user_pages_fast+0x3f0/0x3f0 [ 1924.335841] ? kasan_kmalloc+0xc7/0xe0 [ 1924.339758] ? sock_kmalloc+0x15a/0x1f0 [ 1924.343759] ? af_alg_get_rsgl+0x1d7/0x920 [ 1924.348008] ? graph_lock+0x170/0x170 [ 1924.351816] ? __sys_recvmsg+0x11a/0x280 [ 1924.351838] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1924.360921] ? find_held_lock+0x36/0x1c0 [ 1924.365005] ? __lock_is_held+0xb5/0x140 [ 1924.369096] ? ___might_sleep+0x1ed/0x300 [ 1924.373271] ? arch_local_save_flags+0x40/0x40 [ 1924.377946] __should_failslab+0x124/0x180 [ 1924.382186] should_failslab+0x9/0x14 [ 1924.386004] __kmalloc+0x2d4/0x760 [ 1924.389562] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1924.394590] ? iov_iter_advance+0x2ec/0x1460 [ 1924.399022] ? sg_init_table+0x28/0x60 [ 1924.402934] ? sock_kmalloc+0x15a/0x1f0 [ 1924.406931] sock_kmalloc+0x15a/0x1f0 [ 1924.410761] ? __sk_mem_schedule+0xe0/0xe0 [ 1924.415024] ? rcu_read_lock_sched_held+0x108/0x120 [ 1924.420072] af_alg_get_rsgl+0x1d7/0x920 [ 1924.424162] ? af_alg_make_sg+0x550/0x550 [ 1924.428332] ? af_alg_alloc_areq+0x1ec/0x280 [ 1924.432753] ? alg_accept+0x60/0x60 [ 1924.436389] ? kasan_check_write+0x14/0x20 [ 1924.440655] ? sock_kfree_s+0x47/0x60 [ 1924.444480] skcipher_recvmsg+0x39e/0x11e0 [ 1924.448749] ? skcipher_bind+0x30/0x30 [ 1924.452649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1924.458215] ? security_socket_recvmsg+0x9c/0xc0 [ 1924.462985] ? skcipher_bind+0x30/0x30 [ 1924.466884] sock_recvmsg+0xd0/0x110 [ 1924.470605] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1924.475630] ___sys_recvmsg+0x2b6/0x680 [ 1924.479627] ? ___sys_sendmsg+0x930/0x930 [ 1924.483787] ? lock_downgrade+0x900/0x900 [ 1924.487950] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1924.493499] ? proc_fail_nth_write+0x9e/0x210 [ 1924.498009] ? __fget_light+0x2e9/0x430 [ 1924.502008] ? fget_raw+0x20/0x20 [ 1924.505485] ? kasan_check_write+0x14/0x20 [ 1924.509736] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1924.514693] ? wait_for_completion+0x8a0/0x8a0 [ 1924.519317] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1924.524866] ? sockfd_lookup_light+0xc5/0x160 [ 1924.529375] __sys_recvmsg+0x11a/0x280 [ 1924.533275] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1924.537869] ? __sb_end_write+0xd9/0x110 [ 1924.541940] ? fput+0x130/0x1a0 [ 1924.545248] ? do_syscall_64+0x9a/0x820 [ 1924.549231] ? do_syscall_64+0x9a/0x820 [ 1924.553226] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1924.558696] __x64_sys_recvmsg+0x78/0xb0 [ 1924.562774] do_syscall_64+0x1b9/0x820 [ 1924.566688] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1924.572063] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1924.577004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1924.581859] ? trace_hardirqs_on_caller+0x310/0x310 [ 1924.586886] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1924.591910] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1924.596942] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1924.601804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1924.606999] RIP: 0033:0x457519 [ 1924.610211] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:42:34 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xc018ae85, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:34 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086602, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:34 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000001c0)=0x7, 0x4) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) [ 1924.629129] RSP: 002b:00007f4684121c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1924.636860] RAX: ffffffffffffffda RBX: 00007f4684121c90 RCX: 0000000000457519 [ 1924.644136] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 1924.651412] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1924.658684] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46841226d4 [ 1924.665956] R13: 00000000004c3200 R14: 00000000004d4da0 R15: 0000000000000006 13:42:34 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x401c5820, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0x2000000}, 0x28) 13:42:35 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x800c6613, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:35 executing program 4 (fault-call:7 fault-nth:9): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) [ 1925.001923] FAULT_INJECTION: forcing a failure. [ 1925.001923] name failslab, interval 1, probability 0, space 0, times 0 [ 1925.056669] CPU: 1 PID: 31411 Comm: syz-executor4 Not tainted 4.19.0-rc7+ #59 [ 1925.064006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1925.073374] Call Trace: [ 1925.075995] dump_stack+0x1c4/0x2b4 [ 1925.079660] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1925.084899] should_fail.cold.4+0xa/0x17 [ 1925.088993] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1925.094117] ? check_preemption_disabled+0x48/0x200 [ 1925.099149] ? check_preemption_disabled+0x48/0x200 [ 1925.104190] ? graph_lock+0x170/0x170 [ 1925.108008] ? graph_lock+0x170/0x170 [ 1925.111837] ? find_held_lock+0x36/0x1c0 [ 1925.115915] ? __lock_is_held+0xb5/0x140 [ 1925.120001] ? ___might_sleep+0x1ed/0x300 [ 1925.124159] ? arch_local_save_flags+0x40/0x40 [ 1925.128752] ? rcu_read_lock_sched_held+0x108/0x120 [ 1925.133817] __should_failslab+0x124/0x180 [ 1925.138064] should_failslab+0x9/0x14 [ 1925.141874] __kmalloc+0x2d4/0x760 [ 1925.145430] ? af_alg_make_sg+0x550/0x550 [ 1925.149586] ? sock_kmalloc+0x15a/0x1f0 [ 1925.153579] sock_kmalloc+0x15a/0x1f0 [ 1925.157394] ? __sk_mem_schedule+0xe0/0xe0 [ 1925.161641] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1925.167185] ? af_alg_count_tsgl+0x1bc/0x250 [ 1925.171600] ? sock_kfree_s+0x47/0x60 [ 1925.175416] skcipher_recvmsg+0x4fd/0x11e0 [ 1925.179677] ? skcipher_bind+0x30/0x30 [ 1925.183576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1925.189128] ? security_socket_recvmsg+0x9c/0xc0 [ 1925.193891] ? skcipher_bind+0x30/0x30 [ 1925.197787] sock_recvmsg+0xd0/0x110 [ 1925.201509] ? __sock_recv_ts_and_drops+0x420/0x420 [ 1925.206535] ___sys_recvmsg+0x2b6/0x680 [ 1925.210528] ? ___sys_sendmsg+0x930/0x930 [ 1925.214690] ? lock_downgrade+0x900/0x900 [ 1925.218852] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1925.224398] ? proc_fail_nth_write+0x9e/0x210 [ 1925.228911] ? __fget_light+0x2e9/0x430 [ 1925.232892] ? fget_raw+0x20/0x20 [ 1925.236361] ? kasan_check_write+0x14/0x20 [ 1925.240605] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 1925.245551] ? wait_for_completion+0x8a0/0x8a0 [ 1925.250154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1925.255698] ? sockfd_lookup_light+0xc5/0x160 [ 1925.260205] __sys_recvmsg+0x11a/0x280 [ 1925.264114] ? __ia32_sys_sendmmsg+0x100/0x100 [ 1925.268703] ? __sb_end_write+0xd9/0x110 [ 1925.272781] ? fput+0x130/0x1a0 [ 1925.276071] ? do_syscall_64+0x9a/0x820 [ 1925.280052] ? do_syscall_64+0x9a/0x820 [ 1925.284051] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1925.289524] __x64_sys_recvmsg+0x78/0xb0 [ 1925.293597] do_syscall_64+0x1b9/0x820 [ 1925.297498] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1925.302875] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1925.307813] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1925.312668] ? trace_hardirqs_on_caller+0x310/0x310 [ 1925.317700] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1925.322728] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1925.327761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1925.332624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1925.337818] RIP: 0033:0x457519 13:42:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:35 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5421, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1925.341020] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1925.359931] RSP: 002b:00007f4684121c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1925.367652] RAX: ffffffffffffffda RBX: 00007f4684121c90 RCX: 0000000000457519 [ 1925.374927] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000004 [ 1925.382201] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1925.389500] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f46841226d4 [ 1925.396775] R13: 00000000004c3200 R14: 00000000004d4da0 R15: 0000000000000006 13:42:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:35 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x5460, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:35 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x400c6615, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1925.505363] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1925.758606] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:36 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0x2}, 0x28) 13:42:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:36 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5450, &(0x7f0000000240)={0x0, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:36 executing program 4 (fault-call:7 fault-nth:10): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) [ 1925.815128] kauditd_printk_skb: 9 callbacks suppressed [ 1925.815146] audit: type=1804 audit(1539351755.947:244): pid=31451 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2974/bus" dev="sda1" ino=16654 res=1 13:42:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:36 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x5450, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:36 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x5000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xf000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:36 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x8000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1926.170110] audit: type=1804 audit(1539351756.307:245): pid=31488 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2975/bus" dev="sda1" ino=16646 res=1 [ 1926.179276] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1926.442506] audit: type=1804 audit(1539351756.577:246): pid=31478 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2975/bus" dev="sda1" ino=16646 res=1 [ 1926.471529] audit: type=1804 audit(1539351756.617:247): pid=31484 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2975/bus" dev="sda1" ino=16646 res=1 [ 1926.498582] audit: type=1804 audit(1539351756.617:248): pid=31484 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2975/bus" dev="sda1" ino=16646 res=1 [ 1926.610334] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:36 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x5, 0x2, 0x639aff94, 0x4, 0x0}, &(0x7f0000000900)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000940)={r3, 0x6, 0x401}, 0x8) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r4, 0x4, 0x6100) fdatasync(r2) ftruncate(r4, 0x8200) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000002c0)="682c3e7fda381802d42a0eeed7b2d60dd0cf62d02d7152d77002da6a5065cc0738640c4ea3c2d07b7e6ea8fba0c4c1356c0720c30589dbe6d9d8fd5db8603d8fbde7206c1fdf995d792efabf3e8de13f444243556491ee4ec85f8e8510e865c970b8bb472ae8d472eebd115f12edd9fefda3abc13377", 0x76}, {&(0x7f0000000440)="fd13d4baf5cfff1634d0df2d590d0e73663a9f0d7040f5f5e652554215aed6ffcd9ffa3f2728173b47c953941db8eeac7d0bd347eefd42d0413f106dd848f61a744700e1c73bafb2b0abd12fc89fb783a1aa5c18148941cc35938fd8b58921e767a077740daf6ff39b3f0573583e9f578db27d75ff08754a89cf94fa731fb9ffafed1f0a13bd2d63840efedf93", 0x8d}, {&(0x7f0000000340)="aa91008e4ccfd6c48fefbb4b02a47434456ff48f981342d6f72171b2a8e0f408b04ceab70cafb775c8b4b7755ffb322ddeb04d864bfdcef588a0d6b4fa24f55efc6612d845ba12856e30cf0813", 0x4d}, {&(0x7f0000000500)="5c24a5d4121c780c6a8ce1edd409bfb569b895d04330a7f2d5d1db1c281c6b1865aef3cd72e787f604124b5e2ebfc86ba31b196ec421a820af057e1de711babfc0cfd5ae065daf5038952fd9dc97f411fc3f1642b641de80cee1b97a7b6921d9eb6449e8d2a585b885e7dd58a143aaa1b5e806a64aceff9172e8f46d886f4742dd7d7ea9bec7dccce958e686e774ca4c5774", 0x92}, {&(0x7f00000001c0)}, {&(0x7f00000005c0)="6e5811da3b059ddd7cf966bae201f399d1f4a29a7d6e4a080fedf3f1025c48ad77025608a4f4ebdd39a9b7c4127933149170bd3b4e38c07e07ef970a4dd1db15458688921cf7501b1e7009e2fc6beb03f20254a32d41a146f6982614103e6696cb91385b0eaee6c6", 0x68}, {&(0x7f0000000240)="c6babb223ec3ed0a08", 0x9}, {&(0x7f0000000640)="f2a04afb58ab20ec476e3ab95240ac7ac28fd309fa9c4b680bfe23749deda49adac1604eb78fa8548e16c818d53a1499a06901d47aab54de90411c245eb6448be9ba800d638f46a1f1938df9c0c82b6054a0824fffa77fb1973b150ba14fee57dfeb4b7737c1d1a22864471a544be3", 0x6f}, {&(0x7f0000000740)="89a3fb754ae4336252164d7a97e3ad7d7d8aefe9b4bcc21e3f9afb35bd7398ec51b45b34b1555c31c2ed2e9329b21be94f4155b824d234d9e2627be27488bf4f0fceba2db10ff85948311fa85c778c8895c2cc4d534569a7214872c57020271f7e64a5babcc576544af9e0d0bc4fdece9ce508ea72b675d286fdc8c2e641503416a339d13da1eba5c970cc429ffb9157932d5696917fb12e7f390cad954bb46295d9936cedf7e369e0ed613334b42a0f7a8b15aa", 0xb4}, {&(0x7f00000006c0)="c0b599d49920d1798b0fe79ab55d9edc2fec7c12f92f7395077bd91934bed94dc0112438f87fd7e70d5f54208008520c", 0x30}], 0xa, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r6 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r6, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:36 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x300, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x5, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0x8000a0ffffffff}, 0x28) 13:42:36 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x80087601, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) [ 1926.733090] audit: type=1804 audit(1539351756.867:249): pid=31491 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2975/bus" dev="sda1" ino=16646 res=1 13:42:37 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x5, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x100000000000000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x500000000000000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0xf000}, 0x28) [ 1927.290332] audit: type=1804 audit(1539351757.427:250): pid=31567 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2976/bus" dev="sda1" ino=16666 res=1 [ 1927.329334] audit: type=1804 audit(1539351757.427:251): pid=31546 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2976/bus" dev="sda1" ino=16666 res=1 [ 1927.355870] audit: type=1804 audit(1539351757.427:252): pid=31546 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2976/bus" dev="sda1" ino=16666 res=1 [ 1927.382943] audit: type=1804 audit(1539351757.427:253): pid=31546 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2976/bus" dev="sda1" ino=16666 res=1 13:42:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:37 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x5452, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x8000a0ffffffff, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:37 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x400000000000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0xf0}, 0x28) 13:42:37 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) inotify_init1(0x0) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x5, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8)=0xfffffffffffffffd, 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xa0008000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xae000000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:37 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0x100000000000000}, 0x28) 13:42:38 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xc0045878, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:38 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0xffffffff00000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x2000000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xae, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000, 0xfffff000}, 0x28) 13:42:38 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x100) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000440)={0x100000001, 0xaa, 0xff}) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000002c0)="bb7a444a709d1631eede975a6faaddb51fd85996c81ddd96a89373d8dd6f5384df5daeb4b7759848a3bbfbaeadb15d3e2643ea1e10248ab6bcd7ef8a9882510ee1a2f37e70f327013be94eaa6d39498c8c56ef94eee9f76af9e49d65419e350b85e78f35c9c74a512b636e60a5d4f79b3052729d1bd294f6273550ed3f6e5c89dded5a27a8c950afbeaf142b56f6bc94b85d9889821c198a0fecdc12e56accf103efbfcc3f600ce23557a51245621f1a7b7138ba05cafddca69315334d326a5d80f8669533d1099f") ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000240)) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r0}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f00000001c0)={0x1, 0x1, {0x4, 0xf, 0x7, 0x19, 0x3, 0x921, 0x3, 0x48, 0x1}}) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x2, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:38 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x4000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xfffffffffffff000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:38 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x4b49, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0xf000) 13:42:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xf0ffffffffffff, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:39 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0xfeffffff, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1000000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x48) 13:42:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:39 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xc0189436, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:39 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x4000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:39 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0), 0x2a2, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f00000001c0)=0x105000) 13:42:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xf0ffff, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x500, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:39 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x10, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x20000028) 13:42:39 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x8138ae83, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xffffffffa0008000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x2) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x2, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000140)={0x8000, 0x0, 0x81, 0x10001}) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000280)=0x5) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) memfd_create(&(0x7f00000002c0)='/dev/adsp#\x00', 0x4) [ 1929.901235] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xae00000000000000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1930.268922] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:40 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) getgroups(0x1, &(0x7f00000001c0)=[0x0]) setfsgid(r5) fcntl$getownex(r2, 0x10, &(0x7f00000002c0)={0x0, 0x0}) sched_rr_get_interval(r6, &(0x7f0000000300)) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r7 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000240)) 13:42:40 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xc020660b, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x20000, 0x0) r3 = getpgrp(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000400)={{0x1, 0x7, 0x8467, 0x81, 'syz0\x00', 0x1f}, 0x4, 0x20000010, 0x0, r3, 0x0, 0x5680493c, 'syz0\x00', &(0x7f0000000140), 0x0, [], [0x7, 0x9, 0x8, 0x7fffffff]}) 13:42:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x200000000000000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:40 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x8, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xfffff000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe00000000850000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r2, &(0x7f0000000100)={0x2, 0x4e21, @multicast2}, 0x10) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x5000000, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:41 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x300000000000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1930.978971] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1931.149696] kauditd_printk_skb: 14 callbacks suppressed [ 1931.149713] audit: type=1804 audit(1539351761.287:268): pid=31854 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2980/bus" dev="sda1" ino=16660 res=1 [ 1931.182000] audit: type=1804 audit(1539351761.287:269): pid=31831 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2980/bus" dev="sda1" ino=16660 res=1 [ 1931.205972] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1931.208351] audit: type=1804 audit(1539351761.287:270): pid=31848 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2980/bus" dev="sda1" ino=16660 res=1 [ 1931.241154] audit: type=1804 audit(1539351761.297:271): pid=31848 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2980/bus" dev="sda1" ino=16660 res=1 [ 1931.267497] audit: type=1804 audit(1539351761.337:272): pid=31857 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2980/bus" dev="sda1" ino=16660 res=1 13:42:41 executing program 0: r0 = creat(&(0x7f0000000240)='./file1\x00', 0xffffffffffffffff) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:41 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x3, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x8000a0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000100)) r1 = memfd_create(&(0x7f0000000240)='team0\x00', 0x4) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x7fff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000280)={@mcast1, 0x5b, r2}) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000200)) 13:42:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:41 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x4138ae84, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xf0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0xae00, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:41 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x3f00000000000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1931.938994] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1932.165640] audit: type=1804 audit(1539351762.297:273): pid=31912 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2981/bus" dev="sda1" ino=16657 res=1 [ 1932.194055] audit: type=1804 audit(1539351762.337:274): pid=31901 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2981/bus" dev="sda1" ino=16657 res=1 [ 1932.220732] audit: type=1804 audit(1539351762.337:275): pid=31901 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2981/bus" dev="sda1" ino=16657 res=1 [ 1932.247540] audit: type=1804 audit(1539351762.357:276): pid=31921 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2981/bus" dev="sda1" ino=16657 res=1 [ 1932.268954] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x2000057c, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:42 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x800000000000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:42 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x5421, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0a79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b705000002ebff006a0a00fe000000008500000032000000b7000000000000009500040000000000bb6da5041e39d0eb62428754adf0e034793e200829617943dc088f05d3e5d68ea51a923531"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:42 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) bind$unix(r2, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = getpgid(0xffffffffffffffff) r6 = getpgid(r5) write$FUSE_WRITE(r0, &(0x7f00000002c0)={0x18, 0x0, 0x1, {0x100000001}}, 0x18) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000380)) migrate_pages(r6, 0x8, &(0x7f00000001c0)=0x7, &(0x7f0000000240)=0xb7) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r7 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x3, 0x8) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xfffffffffffffefa, 0x94, &(0x7f0000000100)="ef0dc220a6286fd8a2af5ce7ac31", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe80, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:42 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x40000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa3000000000000fb03000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7fff, 0x3, 0x25fb, 0x3, 0x9, 0x2, 0x3, 0x7a56ddf5, 0x2c5, 0x40, 0x22d, 0x1, 0x100000001, 0x38, 0x1, 0x7, 0x1, 0x2}, [{0x70000000, 0x6, 0x7dfc, 0x29, 0x9, 0x2, 0xfffffffffffffbff}, {0x0, 0x20, 0x100000000, 0x768, 0x3, 0x1, 0x6, 0x1}], "133b3a8c40944acc863bccb755dfdcb3ca976736085884bbfb2c0a783472807e0bd7cb846dff4c9b54d4ba928206bc84247173c4275dfef099d9cb4f974f4d4c850ef643f274c854d8d9b5091f227b96f1f12fbda97121e18c5827e69d4fc3136ef24056c15df862cc08a805f98b0d98d64ac625a81da8130ed9fba0aefa49fdc7537f7f1ce7c48aa96146a352b79f116937ef40f8099108d63a438eda8b59b2d33513ce2c2acfadd7962f23f526862066d590a9117214832003e7e0bacaa76c625dd0d8e59c317cb7e936e610886cef07720dfd11af2f51a4406509cf4e4cfaa51512ec", [[], [], [], [], [], [], [], [], [], []]}, 0xb94) ioctl(r1, 0x8c, &(0x7f0000000280)="150000010000000000") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x200004bc, 0x94, &(0x7f00000004c0)="ef020000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:42 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x40086602, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:42 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x3f00, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x6fd00}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x7, 0x40) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000280)={0x4, &(0x7f0000000140)=[{}, {}, {}, {}]}) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0x8f000}, 0x28) [ 1932.900225] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1933.083715] audit: type=1804 audit(1539351763.217:277): pid=31985 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2982/bus" dev="sda1" ino=16655 res=1 [ 1933.211638] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:43 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000000)) setsockopt$inet6_buf(r3, 0x29, 0x80000000000033, &(0x7f0000000080), 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$P9_RLCREATE(r2, &(0x7f0000000300)={0x18, 0xf, 0x1, {{0x20, 0x3}, 0xd2}}, 0x18) fdatasync(r2) ftruncate(r5, 0x8200) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r7 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, &(0x7f0000d83ff8), 0x8000fffffffe) write$apparmor_current(r7, &(0x7f00000001c0)=@profile={'changeprofile ', "c9776c616e312c262500"}, 0x18) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L+', 0xa5f9}, 0x28, 0x2) 13:42:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x4fd00}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef680000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:43 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x3000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:43 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x541b, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000200000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0xfd00}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02fffff00000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:43 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x500000000000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x3fd00}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200ae000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0xfffffffffffffe27) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) [ 1934.190403] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:44 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000500)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) r5 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x8, 0x141040) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000007c0)='trusted.overlay.opaque\x00', &(0x7f0000000800)='y\x00', 0x2, 0x3) write$P9_RWALK(r3, &(0x7f0000000380)={0x30, 0x6f, 0x2, {0x3, [{0x4, 0x0, 0x2}, {0x80, 0x1, 0x2}, {0x0, 0x4, 0x2}]}}, 0x30) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r6 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) bind$inet6(r0, &(0x7f00000004c0)={0xa, 0x4e21, 0x9, @mcast2, 0x5}, 0x1c) sendfile(r0, r6, &(0x7f0000d83ff8), 0x8000fffffffe) creat(&(0x7f0000000540)='./file0\x00', 0x100) listen(r5, 0x1) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYRESOCT=0x0, @ANYRESHEX=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES32=0x0], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRES16=r2], @ANYPTR=&(0x7f0000000300)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=r3, @ANYRESDEC=r3, @ANYRESHEX=r1, @ANYRESOCT=r4], @ANYRESHEX=r6, @ANYPTR64]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:44 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x8004ae98, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x5fd00}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040f00000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r2 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x20, 0x400040) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000140)='veth1\x00') 13:42:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02f000000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:44 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x100000000000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1934.240251] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x2fd00}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020500000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:44 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x10000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x40000645}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020200000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:44 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x4000000000000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:44 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2}) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x100, 0x0) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:44 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xc0045878, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000001000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x7fd00}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x8c280, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000300)) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000280)={0x43, 0x6, 0x0, {0x5, 0x6, 0x1a, 0x0, 'bdevselinuxvmnet1vmnet0*,\x00'}}, 0x43) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000540)="9fec12b7efabc69ba64a00fb21a51ca8d9672004decadc74a953761ea3c8cd506f3c3235f01f95cfc2c114a20a097e3a06a056cfce118824b2018cb9bbb3ba97a519fd") prctl$setname(0xf, &(0x7f0000000100)='bdevselinuxvmnet1vmnet0*,\x00') writev(r1, &(0x7f0000000500)=[{&(0x7f0000000400)="d03e8d3f795d9d50ec767f7106db087363793ffadba45e35e99f5993ba1eac6494b0ee8bca3af3566b16d7ac067eeae1acd42705f0bd15e38d2271e948c38082c157fcb2cd1413a9f402c3a7d406db1674786bd68fd16a4033c19231b5f9518da28c8da89bf073cf585a951f1823d29c8e80fdd9d0265554487a51bb4d6f4f6ade752a1adb3cac0bba11b52e429bfd3a9c7ec97c95caadabcf1c3de72bea123c4a719218b98c5e79013087fec2606791172f73b4cac8885457a176d29b2c4fc39643", 0xd0}, {&(0x7f0000000300)}], 0x166) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02086bcef28bcbbf45bcb48b56", &(0x7f0000000040)=""/148, 0xf000}, 0x28) openat(r1, &(0x7f00000005c0)='./file0\x00', 0x80000, 0x80) 13:42:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x7ffff000}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000005000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:45 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0xfeffffff00000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xfffffffffffffe21, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x8) 13:42:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020005000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x1fd00}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:45 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x4004ae99, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) [ 1935.161899] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1935.354595] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02fffffffffffff000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffee2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe00000000850000003200000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @dev, @broadcast}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={@loopback, @ipv4={[], [], @rand_addr=0xa054}, @dev={0xfe, 0x80, [], 0x1d}, 0x8, 0x101, 0x0, 0x100, 0x9, 0x4000000, r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0x2000043c}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:45 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x500, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:45 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000440)={[], 0x5, 0x2, 0x7fffffff, 0x0, 0x8, 0x2001, 0x2000, [], 0xffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000240)={r0, r0}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f00000002c0)={[{0x1, 0x7, 0x7f, 0x7, 0x7d, 0xff, 0x4, 0x401, 0x2, 0xc5, 0x2, 0x9, 0x67a}, {0x7, 0x4085, 0x5, 0x7ff, 0x6, 0x2, 0x5, 0xd5b, 0x9, 0x9, 0x6000000000000000, 0x2, 0x4}, {0x400, 0x10001, 0x5, 0x100, 0x20, 0x3ef5, 0x0, 0x6, 0x6, 0x0, 0x7f, 0x2, 0x4}], 0xff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$P9_RUNLINKAT(r1, &(0x7f00000001c0)={0x7, 0x4d, 0x1}, 0x7) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:45 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0x4b47, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02008000a000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:45 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x4, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff0000f500b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500e4a070d40000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0x5fffecbb}], 0x2, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02000000ae00000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:45 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1, 0x100000000) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x10, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:45 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x1000000000000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02a000800000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:46 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x3f00000000000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) [ 1935.972230] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:46 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffc, 0x20) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) [ 1936.282680] kauditd_printk_skb: 18 callbacks suppressed [ 1936.282697] audit: type=1804 audit(1539351766.417:296): pid=32242 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2986/bus" dev="sda1" ino=16677 res=1 13:42:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000100000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x8, &(0x7f0000000440)=""/27, 0x1b}, 0x0) 13:42:46 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x4000000000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b700000000000007ff0a00fe00000000850000003200000000000000000000030e95ba5ffbe5fdc675076bcddf1677a7b5008ec66c270d5691c1403e319d59223bbbfe0c45cf6debe11aab9112134696d5decdda8221679f07d69dc98705844879"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x10080, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x80000, 0x0) accept4$packet(r3, 0x0, &(0x7f0000000140), 0x80000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:46 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x8000000000000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02ae00000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:46 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b700000000000000950004000000000099f129abd1945b6d8fee6895"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000000)=0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x3, 0x4, 0x8000, 0x9, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x101, 0x2, 0x4, 0x14, 0xb01, 0x3, 0x8000, 0x0, r2}, &(0x7f00000002c0)=0x20) 13:42:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x8000000000000000}, 0x0) 13:42:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200000000000000ae000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:46 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x3f000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x8dffffff00000000}, 0x0) [ 1936.718126] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1937.014918] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:47 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x1c00000000000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02ffffffffa0008000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x8000a0ffffffff}, 0x0) 13:42:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xffffffea) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYPTR64, @ANYPTR, @ANYRESOCT=r2, @ANYBLOB="f5fc727c1d1373e6edc82973760f7bea0fa113b6b57962702c904ebb1a1f"]], @ANYRES32], 0x151) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f00000000c0)={0x0, 0x100}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000), &(0x7f0000000280)=0x8) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) socket$unix(0x1, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x200000000000000f, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:47 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f00000001c0)) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:47 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0xfffffffe, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000500000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0xa0008000}, 0x0) 13:42:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200f0000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200f0ffff00000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:47 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x1000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x50010000}, 0x0) 13:42:47 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0xffffe70300000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) [ 1937.605538] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02008000a0ffffffff000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1937.679561] audit: type=1804 audit(1539351767.817:297): pid=32370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2988/bus" dev="sda1" ino=16660 res=1 13:42:47 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x40000000, r1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1937.825365] audit: type=1804 audit(1539351767.897:298): pid=32351 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2988/bus" dev="sda1" ino=16660 res=1 [ 1937.898923] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1937.939039] audit: type=1804 audit(1539351767.897:299): pid=32364 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2988/bus" dev="sda1" ino=16660 res=1 [ 1938.012991] audit: type=1804 audit(1539351767.897:300): pid=32364 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2988/bus" dev="sda1" ino=16660 res=1 13:42:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x1, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f0000000140)) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/user\x00', 0x2, 0x0) 13:42:48 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x5001}, 0x0) 13:42:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200f0ffffffffffff000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:48 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x100000000000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:48 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x5000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) [ 1938.191619] audit: type=1804 audit(1539351768.237:301): pid=32370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2988/bus" dev="sda1" ino=16660 res=1 13:42:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000002000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x150}, 0x0) 13:42:48 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0xffffffff00000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020005000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0xf0ffffff}, 0x0) [ 1938.598321] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:48 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x10000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:48 executing program 3: r0 = socket$inet6(0xa, 0xb, 0x800) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f5934488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xe, 0x94, &(0x7f0000000140)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) [ 1938.724677] audit: type=1804 audit(1539351768.857:302): pid=32444 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2989/bus" dev="sda1" ino=16709 res=1 [ 1938.798074] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1938.842763] audit: type=1804 audit(1539351768.887:303): pid=32425 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2989/bus" dev="sda1" ino=16709 res=1 [ 1938.870171] audit: type=1804 audit(1539351768.907:304): pid=32439 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2989/bus" dev="sda1" ino=16709 res=1 [ 1938.897189] audit: type=1804 audit(1539351768.907:305): pid=32444 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2989/bus" dev="sda1" ino=16709 res=1 13:42:49 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x8000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:49 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x8000001c4) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, &(0x7f00000002c0)=0x34, 0x101) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2c8200, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000003680)="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") socket$inet6(0xa, 0xf, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:49 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x1300) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200ffffffffa00080000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x700000000000000}, 0x0) 13:42:49 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x10}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x4000000) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x420041, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000300)=0x5, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0x50, &(0x7f0000000100)}, 0x10) 13:42:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200008000a0000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0xfffffff0}, 0x0) 13:42:49 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x800000000000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200008000a0ffffffff0000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1939.233912] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:49 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x1e) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) [ 1939.392354] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:49 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x5}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x40000}, 0x0) 13:42:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020002000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000300)={@local, @empty, 0x0}, &(0x7f0000000400)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0xd, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x47}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @alu={0x7, 0x9, 0xf, 0x4, 0xf, 0xfffffffffffffff8, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x0, 0x2, 0x7, 0x0, 0x8, 0x1}]}, &(0x7f0000000280)='GPL\x00', 0x3, 0x0, &(0x7f00000002c0), 0x41f00, 0x1, [], r2, 0xc}, 0x48) 13:42:49 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000740)="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", 0x1000) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r4) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000240)={0x3, 0xb5, &(0x7f00000002c0)="e15b590c55eaf574ac3659b76116cdfefd30d14b612b0382288a3b565313527fe848590212428d3d1c4e2a73bc883566f39caa7922bcaa6a67145e0c72de2fef5bc155010016390eb44cfa08b110851198af4fd0ba72b21d1d605daae7586d190d7dc226be428ae956aeb510c157bc707949422b50aa9d9eafbd2ba791e921372d6a33eeb8516743848c8c8864a9e91533fcbf133cbddd3d2ecc393aeb2bc26d74946dfba14fbc3e6c663aa7e4f3c8f4809867073b"}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYPTR64]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:49 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0xfeffffff00000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000005000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:49 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x16) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0xeffdffff00000000}, 0x0) 13:42:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200a0008000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:50 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x5000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:50 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x3f00}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0xf0ffffff00000000}, 0x0) 13:42:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000002000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x100, 0x21) io_setup(0xffffffff80000000, &(0x7f0000000200)=0x0) io_cancel(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x1, r1, &(0x7f0000000240)="bb57d55f1f8cd92ad972b8b67ca22e22263b76eabb62af9d2356865f2e584142614200e7ed9d801c5aaf8eb7627d19ae547fff55ea3d94fd66b23c1f0ba05503977845a3027b6f879224b9dee7f1f40d5b19d5", 0x53, 0x6be, 0x0, 0x3, r1}, &(0x7f0000000300)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000140)={0x8}) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) [ 1940.071138] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200fffff000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1940.455523] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:50 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x4) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000001c0), 0x4) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000002c0)=[0x5, 0x8]) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x40000000000}, 0x0) 13:42:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x200, 0x3, [0x101, 0xad, 0x2]}, &(0x7f0000000180)=0xe) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000280)={r2, 0x53, 0x9, [0x5, 0x80000000, 0x5, 0x6, 0x400, 0x0, 0x5, 0xdc, 0x3f]}, 0x1a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x340, 0x3f, &(0x7f0000000140)="ef02c220a6286fd8a0af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x27e) 13:42:50 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0xffff8000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:50 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0xfffffffe}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000f0ffffffffffff0000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:50 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x6a9, 0x40) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000003c0)='./file0\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x98, 0x98, &(0x7f0000000280)="c9b195c2402b066b02f8591acda73cacedd2bd3c6b288e88a401bb02237187a6039e9657c5afbb20e5ae14b370210e7b074e1ea641fd1ed9d0d3fb48de6cf4fb5540b18230964eb21a1266321bff680658376c94119a2dff35f5906e601673ed96ae4d16ed5c99f05326b1dd709b56621312763b44addac2308fec25ba9b63ab834d980c004b86c55409828221dda4de9c61b197faed96cb", &(0x7f0000000400)=""/152, 0x3}, 0x28) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060002005f000000000000000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r3 = socket$inet(0x2, 0x2, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000380)) bind$inet(r3, &(0x7f0000eed000)={0x2, 0x1001}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) r4 = shmget$private(0x0, 0x4000, 0x1840, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000010000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x8000a0}, 0x0) 13:42:50 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x4}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000ae0000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x1}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) [ 1940.975514] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1941.337460] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:51 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000240), 0x4) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f00000001c0)={0xfffffffffffffffa, 0xfff}) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000002c0)=0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000300)=0x0) kcmp(r5, r6, 0x3, r3, r3) r7 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r7, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:51 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x4000000000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x0, 0x1000000000000000) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x209, 0x5, 0x2, 0x400, 0xfff}) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:51 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x1b00000000000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x7000000}, 0x0) 13:42:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000020000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1941.496461] kauditd_printk_skb: 15 callbacks suppressed [ 1941.496488] audit: type=1804 audit(1539351771.627:321): pid=32642 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2992/bus" dev="sda1" ino=16706 res=1 13:42:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200fffffffffffff0000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0xffffff8d}, 0x0) 13:42:51 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x300000000000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200000000ae000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:51 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x3f00000000000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x8dffffff}, 0x0) [ 1941.976847] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1942.131162] audit: type=1804 audit(1539351772.267:322): pid=32720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2993/bus" dev="sda1" ino=16712 res=1 [ 1942.158493] audit: type=1804 audit(1539351772.267:323): pid=32692 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2993/bus" dev="sda1" ino=16712 res=1 [ 1942.185983] audit: type=1804 audit(1539351772.267:324): pid=32707 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2993/bus" dev="sda1" ino=16712 res=1 [ 1942.212414] audit: type=1804 audit(1539351772.267:325): pid=32707 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2993/bus" dev="sda1" ino=16712 res=1 [ 1942.259457] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:52 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) creat(&(0x7f00000001c0)='./bus\x00', 0x20) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000f00000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:52 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x900000000000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0xfffffdef}, 0x0) 13:42:52 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x4000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:52 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0xd9a4, 0x20000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r0, &(0x7f0000000300)="3f3b4065aabec7dab86f", &(0x7f0000000400)=""/214}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0x1fffffffffffffb5, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007af1effff8fffffd79a2f0ff00000000b7040400010000000404000008000000b7050000020000006a0a00fe000000000000009500040014000000a41f26c3948d9b"], &(0x7f0000000340)='byzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x100}, 0xfffffffffffffff9) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r3 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1000, 0x80401) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000140), &(0x7f0000000280)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) [ 1942.497774] audit: type=1804 audit(1539351772.637:326): pid=32739 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2993/bus" dev="sda1" ino=16712 res=1 13:42:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0xffffffffa0008000}, 0x0) 13:42:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200f0000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:52 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x40000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) ioctl(r0, 0x6, &(0x7f0000000400)="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") 13:42:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x5001000000000000}, 0x0) 13:42:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef0200ae000000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1943.025856] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1943.116926] audit: type=1804 audit(1539351773.257:327): pid=324 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2994/bus" dev="sda1" ino=16661 res=1 [ 1943.143636] audit: type=1804 audit(1539351773.257:328): pid=32766 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2994/bus" dev="sda1" ino=16661 res=1 [ 1943.170181] audit: type=1804 audit(1539351773.257:329): pid=315 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2994/bus" dev="sda1" ino=16661 res=1 [ 1943.197103] audit: type=1804 audit(1539351773.257:330): pid=324 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2994/bus" dev="sda1" ino=16661 res=1 [ 1943.270162] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:53 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x7000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:53 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x8}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0xeffdffff}, 0x0) 13:42:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000050000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:53 executing program 0: personality(0xd000004) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)={0x108, r6, 0x510, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @local}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x65}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x34}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x34}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xda0f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x108}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) 13:42:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404050008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xfffffffffffffffe}, 0x48) r1 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xd, 0x400000000000000) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000200)={0x1, 0x0, [{}]}) r2 = socket$inet6(0xa, 0x1000000000002, 0x24b) ioctl(r2, 0x8912, &(0x7f0000000240)="b646c30a69628ca542e96a542e153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000f0ffff000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:53 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x300}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe44c7508e0681007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d643ceb0000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b700000000000000950004"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x700}, 0x0) 13:42:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000001000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0xb32e133d35841b, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r4 = add_key(&(0x7f0000000300)='logon\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, r3, 0x3, 0x2, r4) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000140)=0xfffffffffffffe01) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:53 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x1100) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x7}, 0x0) 13:42:53 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x40000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000050000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1943.873843] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1944.181457] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:54 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x500000000000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000ae0000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000480)={@remote, 0x0}, &(0x7f0000000600)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000280)=0xc) fcntl$getownex(r2, 0x10, &(0x7f00000002c0)={0x0, 0x0}) kcmp(r5, r6, 0x7, r3, r1) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000640)=r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:54 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x3e8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:54 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000001c0)={'team0\x00', @remote}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x96}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r6, 0x66a}, 0x8) ioctl(r2, 0x0, &(0x7f0000000440)="91809b3bd80e2d6cac3d2cb0c1629a94a7278be5755635dc36cb605d305fcabe7c0c13e8d1b4c46feec3ad727d79f861137d7ba5dcc9c749b7d44a169aeaa7a89120541e0109bcf4c479dbc9035a4e667baff6f91570577ed437b318b412ecf8f417b975c7d3ff1a8cd4f4e2218b79d656e6d45c04fc63a7512fc39c347440ecd462676f0db2") 13:42:54 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x400000000000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000020000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) prctl$intptr(0x21, 0x1) 13:42:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="5033eb9bdb9768ba75fcf0b59ce96e25e91380b86d02648ff9b16057f6e0db4dee8923c6e8ab59d94d87d23bd939d29ac24dc64f3ae398b6e750a15454675e8b0f907927a5dc21bf0f0a64639bc716e297f8f14e4b81358ace905dcd7452af0a9a0685dce5852e0d84357e86fa88c5503b7036b901598c2ef4a430ba139e6f3e92694d31bf6033f17fe252c416081e5afdf7ead6f0de5d91044f75964902cffad7d06215ba886932d3e1d5301e89ff2e61f9943a321996c70972b2f8970f5106236a4c12e644f32392c891f7e50920402b4d62f7f56faa199692b24b39ffd8b8b98353a3f34da23c56850e4d000000000000000000000000000000e324ac36984d3241d33818fe7b5c689d889f750666154c81a1a7e7d531c6ec1383434b28dda2cd4a6a4330ea2b2acd536754854925ecca9638f11d9a80c83e3807", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:54 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x4000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000008000a0ffffffff00002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:54 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x3}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000008000a00000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:54 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x20000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:54 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x1000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) [ 1944.814884] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1945.042448] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:55 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000001c0)={0x7f, @remote, 0x4e21, 0x2, 'dh\x00', 0x10, 0x6, 0x3f}, 0x2c) io_setup(0x20, &(0x7f0000000240)=0x0) io_submit(r6, 0x7, &(0x7f00000018c0)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x3, r4, &(0x7f00000002c0)="0738baa34823753113d70d1d4f3a8594188c8711ac684c860e", 0x19, 0x2, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x9, 0x20, r1, &(0x7f0000000340)="fc5d4ed1582a3bed70a60be28fe69bbf6dcb04", 0x13, 0x2, 0x0, 0x1, r0}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x3f, r0, &(0x7f0000000440)="cbfacc1648232e4280f114a9a5367fc6912d3d4a15dc93264ffd1f5ac1b42ee5ea593738a5f9896985f1dec0b0867114518c582a3ac8c55baa87a33b1535bc5f452f7ef9ee61c473146bad76e21210decef659ca189c74ef08ad476f349c24376567bc27fed335e40da267926f08b5847f4d994414b7dd922b071d4965", 0x7d, 0x6, 0x0, 0x2, r3}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xf, 0x2, r4, &(0x7f0000000500)="e8cff86b95e31662e25e869e3db60e0269e3b56982b6fe32a8f1c14113dc7491df70ff4bae7c7a107192237ddb8c4dfad5fb1a84418e12231c65cb486004849c88484a74c3e9587cb28f5bcbaaf69acd53edb44f539b1176acbcdcbb1d079aaf3174a556ff90fab08013efc47640992bfb89006983bd7f9d52a8c8be691b8e1e8055e3632f88f3c7d2f13c67789ca533fc908d148c164a24f6b5b20d723a39b54dae7333e491cb85b93eb7436a38744eecf3ea80d3fa30d6268a0fb5e3741e28a23b5ceedae22845c045c7926d047904c5436b4f3deb7853b51b158caaabe0a2821f44fd98a50bc76f9bfa8b3996286ac49a95406be9fc601894dba6", 0xfc, 0x3, 0x0, 0x3, r3}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x8, 0x13000000000000, r1, &(0x7f0000000740)="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", 0x1000, 0x7, 0x0, 0x1, r5}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x9, 0x2, r4, &(0x7f0000001740)="45096b36629c6c7aaced875b196ae0b6059bd8f4acf10dfed72481aa556079ec0e10504140e5259facd05e6837da09d083b39e4e1f3ab972be756db8e5b568de33fec0c2d41621e7eec5066621e1898df72dd42722d98ab70046ba0f260b185202845f11c2cb146bdfbf12e431b760c0bc6c5c38c718ff03afd131341ba457b9d7160f4bf888d94217bd580fda26f22e36e962adb809a9577d1456aa98b3d7036f4308c9ed3cdce1ad9d2e79986d53c603e4d9381ccea295fe091581a8a639f9bc7a0332d21928cc617191bec983de7c9da9180b219f562adcbc3c3811a5d0cdedd6ea3efe549da69ed252465eaae57e92d0", 0xf2, 0x1000, 0x0, 0x3, r2}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x1, r3, &(0x7f0000001840)="dace4788b743c11287b635fc201505289acdc5a09150c9d0e4c93d9b58698ae7a5046d6525d2598d31d61894f17b143b8a13edd8768123c0fe7dd4c5b69dd5b1f2cdaffb19b6bd76aa49c6ea1cdcd0ceb11585b9a22a9affcf93a35c", 0x5c, 0x3, 0x0, 0x3, r5}]) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:55 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x1000000000000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d640500298c634e65040400010000000404000008000000b705000002000000000000fe0000000085000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x4) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) creat(&(0x7f0000000140)='./file0\x00', 0x50) 13:42:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000010000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:55 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x3f000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000500000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:55 executing program 3: getsockname(0xffffffffffffffff, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYRES32], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0}, 0x5a) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0x94, &(0x7f0000000200)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) getsockopt$bt_sco_SCO_CONNINFO(r3, 0x11, 0x2, &(0x7f0000000180)=""/24, &(0x7f0000000240)=0x18) 13:42:55 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x3f000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000f00000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) [ 1945.712895] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1945.841421] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:56 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) fcntl$setlease(r0, 0x400, 0x1) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000001c0)=0x8c0d, 0x4) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x100e, &(0x7f0000000240)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) ioctl$SG_SET_DEBUG(r3, 0x227e, &(0x7f0000000240)=0x1) 13:42:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b70500001305000000000000000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0xffffffff) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:56 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0xfeffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000050000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:56 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0xf00) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0ff4237f8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe00000000850009871f000032002300b7000000000000009500040000000000b7a464e082c27b879c"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000440)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) r3 = dup(r0) fadvise64(r1, 0x3f, 0x1, 0x5) sendmsg$unix(r3, &(0x7f0000000300)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000280)="6b8ad534e3964542f89d69d985076d2dfee7ebd02babfa561c0ee4e53fb2ae2063d886050b3ab88b50dbb125bf82ef71d531855b0cdf8606ea709f535e78", 0x3e}], 0x1, 0x0, 0x0, 0x40000}, 0x48080) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000480)={'bridge0\x00', {0x2, 0x4e23, @remote}}) 13:42:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000ae0000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:56 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x3000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:56 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0xd00) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)={[{0x2b, 'rdma'}, {0x2b, 'io'}, {0x2b, 'rdma'}, {0x2f, 'memory'}, {0x2d, 'io'}, {0x2b, 'pids'}]}, 0x22) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000200002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:56 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x500}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:56 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f00000001c0)={0x18c8000, 0x3, 0x1}) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000240)='./file0\x00', 0x40, 0xfffffffffffffffe) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x2b2}, 0x48) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x10000, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000280)=""/130) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) [ 1946.571199] kauditd_printk_skb: 21 callbacks suppressed [ 1946.571215] audit: type=1800 audit(1539351776.707:352): pid=585 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor0" name="bus" dev="sda1" ino=16697 res=0 13:42:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000ae0000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:56 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x7) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x20000000000001aa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0xfffffffffffe, 0x2) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000100)={'ipvs\x00'}, 0xfffffffffffffffd) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:56 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x4000000000000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02000000f0ffffffffffff00002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:57 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x0, 0x3}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000280)={{0x86, 0x7fffffff}, 'port1\x00', 0x22, 0x82c, 0x26000000000, 0x6065, 0x800, 0x800, 0x7fff, 0x0, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000740)={'team0\x00', r3}) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) 13:42:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000500002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) [ 1947.175562] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1947.236171] audit: type=1804 audit(1539351777.367:353): pid=671 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2999/file0" dev="sda1" ino=16718 res=1 [ 1947.264046] audit: type=1804 audit(1539351777.377:354): pid=639 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/2999/file0" dev="sda1" ino=16718 res=1 [ 1947.371851] 9pnet_virtio: no channels available for device 127.0.0.1 13:42:57 executing program 0: memfd_create(&(0x7f00000001c0)='127.0.0.1\x00', 0x1) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x5c641, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) lseek(r2, 0x0, 0x6) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x40, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000140)=r0) 13:42:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02000000000000000000ae00002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1947.444410] audit: type=1800 audit(1539351777.577:355): pid=673 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor0" name="file0" dev="sda1" ino=16718 res=0 13:42:57 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0xb00000000000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"b2ad94c2310e3620aa16aea25af4e7d66439165ac30f633dc60443c6a969cb9f85ac601cf37e05b18d6aff7f01f83e25a8cbb1e3b455f60232a7dc959418dbf5f62755b8af1a5f1deafacd94f382f0ebec168e2fd6c92a7754377fb651cd1acfcb8997c7e251598c231f5361dec89b3eb508cff0e33ca756f0c6392af1d67fa7351f5ec6a81559dfb0daf567fc965377a7ee81f35f694e3ee691cc037450451ba29fa59f87b85de1ab251d2b240e641a16cb7f9be436438a2d0ecf5420200693574b3833797d45d009d4cfa9a429dff969e4f32c7ffa23a4c774828a298fd207ba546f1fbda2aa43d20572cc0e761f445aaf2d275ef6686e2fe9aa6531576d86ac46910b67637d223a2e2098bfc2049c172857c3aba4ba2ee02c0e56af6c6605776d55412a4d985fc293222f2b931178d09f4f0ee789eda37ddee644ca1d39d517a631701534682a9509e0e80cdb9d974d02ca16dfe20e1dfcab3523c797271dbae85a712ee5e6ecdc8eb2d53ac87fcf405942d5e11d9b1fb4ce73a43fc82187bcbc3c08b8494ddee8f3df06261d1c76c107a3a137b998eb7cee034a8f5237001434acceae3e29b1cea4ed423dc41a0b1572e4b5394fea8509fa48e40c8ea16340ae63bd2d998902606587f5b0da18640282fc31f5afd58d589f5815387743eed536ed0a9a9119612abc3f874c2180e87b0222aaceba79f2d0c2c42ca471f357936d5531242e620b7f2c97dfb6ada3e7a4c80640d14f799db609712ef82576504681f88194a9e8f46dd9868c2ab5094be416d42886a628b669b9d5a7f24b7d0fc04e537f06082848f01a64460b2f0bc5ca4591ab54c136429bd74af51ae88a4f44e2c4fb241603b934ab4e9017af6d8b57d1421e809222adf11f545c3e0668047ca1753554e6ce288ab44e759d7deec9536ea0f05dae4c7f85c489741e0112139d16bf53bb97d683e54a82f7cc803e2316a3638398d8b57ee94d5b3e0f5893e694ad3ac60792db0ea55c5b26aca7cd576c0f9e46f9d5f07ac89a9079cc30814e846149a5474f8f86674d0654ac8ceeebdd57294d74e8d0fff3f6bfb3d8923c238821a1aa632c9c2417edeee83a098c09221208396867b88f1a4f80b7ffbc41fb33dcfb7fbd1720837186b21557d81fe0343aad787bb74eaf68ef63af1cfdbcc39f543691cb30eafbbbdc86e31d118fd8bfee75b1766e7658319b7f959d78b6b70c5c50f80fd1e37070bb6f0ab81e84a1779ca56fa0df45e3e54201fefc7db4e4f8ac136c6b19f1e540134f80ef507f38a3ccaf5dbf42894c0671f81992d653066f85deb524c6d8e28966ad954fbc986015682d9f35cab5d32f1b6d498ff39df90b711491697ec4910c9c2396078f27d43fd7831be3a2b28fdd19019befcd2f8a14a818579046b3d86da8a0b696e9a642562702805ee03a0b746b9896a7e38c02"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:57 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x0, 0x1000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000fffffffffffff00000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:57 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x0, 0x3f00}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b700000000000000950004000000000074f83a5ceacde1d13a95580fdf83fdf502053acc281f0876f114ab721a851627963ee4a8ea94027789d4d2bc5db448512c5ffec7505e83cac0b81000ec317bb1fb57e811064ad43d3c76956a06f37850fc1afd38320513b0279e0a13c41902d7db7e75f2743e39993a22f0583803b08a772c106958ee8f45469f04160564c0dba5b558aef28e80fc2ffc16a6634c37a3edb93cca813546520a224a0d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x105100, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0xfffffffffffff6fc, @local, 0x81}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) socket$inet6(0xa, 0xa, 0x87) 13:42:57 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x0, 0x3000000}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000050000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1947.726675] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1947.859445] audit: type=1804 audit(1539351777.997:356): pid=708 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/3000/bus" dev="sda1" ino=16703 res=1 [ 1947.973737] audit: type=1804 audit(1539351777.997:357): pid=684 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/3000/bus" dev="sda1" ino=16703 res=1 [ 1948.000741] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1948.022651] audit: type=1804 audit(1539351777.997:358): pid=702 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/3000/bus" dev="sda1" ino=16703 res=1 13:42:58 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x0, 0x5}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:58 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x2000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:58 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0xff7f) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, &(0x7f0000000040)) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)='T', 0x1}], 0x1, 0x0) fcntl$setstatus(r3, 0x4, 0x6100) fdatasync(r2) ftruncate(r3, 0x8200) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) splice(r0, &(0x7f00000001c0), r3, &(0x7f0000000240), 0x8, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r5 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, &(0x7f0000d83ff8), 0x8000fffffffe) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000003c0)={'syz'}, &(0x7f0000000400)='user\x00', 0xfffffffffffffffd) 13:42:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02000000f000000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) [ 1948.050124] audit: type=1804 audit(1539351777.997:359): pid=702 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/3000/bus" dev="sda1" ino=16703 res=1 [ 1948.077732] audit: type=1804 audit(1539351778.157:360): pid=684 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir102852922/syzkaller.Q1qBwS/3000/bus" dev="sda1" ino=16703 res=1 13:42:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef02000000ae00000000000000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:58 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x2) write$P9_RVERSION(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB="00be44f47888f1b58f6d71eed729bf11bc925c5ed38fe738e15dc7f21ec3cb15174d7d16260270c79c575c32e86cad7678a8ad4af9390a549b06f523dd1e52502f9bfd6d"], 0x44) fallocate(r1, 0x0, 0x0, 0x7fff) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000240)={0x0, r1, 0x0, 0xfffffffe}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000e80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005840)={0x0, @dev, @dev}, &(0x7f0000005880)=0xc) 13:42:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) fcntl$setown(r0, 0x8, r2) 13:42:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000ffffffffa000800000002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:58 executing program 2: modify_ldt$read(0x0, &(0x7f0000000400)=""/74, 0x4a) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x20000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)={0x17, 0x0, 0x7}) ioctl$KVM_RUN(r3, 0xae80, 0x1300000000000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000640)={"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"}) r6 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r6, 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) ioctl$NBD_SET_SIZE(r6, 0xab02, 0x20) socket$inet(0x2, 0xf, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x4}}, 0x4, 0x0, 0x0, 0x20, 0x40}, &(0x7f0000000600)=0x98) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000480)) 13:42:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000008000000b7050000020000006a0a00fe000000008500000032000000b7000000000000009500040000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xbc, 0x94, &(0x7f00000004c0)="ef020000000000000000000100002725c544388846229ef9cafce8f78e34a1e11e62d36a020d4a894ef4feac7b1d5269f6cfddff76467e0309c4c4b929129ec8206578789eb911599ad878eb9a2b552d7fc7e0b85a4d93122a748b5a61f5ffee3bc4e4d788309a0e5e1fb44411c7477c67f046829ec7b82600eebfaa8d73b4d6b46372933bc2d78ac41837d23bf5245c989b21df24211680f90a30892eea3d9b8540a556ba6f13103485916c36fbc1d270624c7b2f83c013839ebfbd", &(0x7f0000000400)=""/148, 0x68}, 0x28) 13:42:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x150) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000280)=@in6, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/69, 0x20000345}, {&(0x7f0000000380)=""/188, 0xbc}], 0x2, &(0x7f0000000440)=""/27, 0x1b, 0x0}, 0x0) 13:42:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bf77a30000000000000703000000fe81007a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d64050000000000650404000040b7050000020000006a0a00fe000000008500000032000000b700000000000000950004000000000000000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x42440, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000140)={0x9, 0x2, 0x5, 0x2, 0x10001, 0x1}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0x94, &(0x7f0000000180)="ef02c220a6286fd8a2af5cae3144", &(0x7f0000000040)=""/148, 0xf000}, 0x28) [ 1948.786028] 9pnet_virtio: no channels available for device 127.0.0.1 [ 2095.386583] INFO: task jbd2/sda1-8:3078 blocked for more than 140 seconds. [ 2095.393830] Not tainted 4.19.0-rc7+ #59 [ 2095.399519] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2095.407749] jbd2/sda1-8 D17624 3078 2 0x80000000 [ 2095.413408] Call Trace: [ 2095.416019] __schedule+0x86c/0x1ed0 [ 2095.419988] ? __sched_text_start+0x8/0x8 [ 2095.424158] ? mark_held_locks+0xc7/0x130 [ 2095.428482] ? graph_lock+0x170/0x170 [ 2095.432304] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2095.437595] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2095.442720] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2095.447535] ? trace_hardirqs_on+0xbd/0x310 [ 2095.451881] ? prepare_to_wait+0x1b3/0x3f0 [ 2095.456128] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2095.461834] ? find_held_lock+0x36/0x1c0 [ 2095.465936] schedule+0xfe/0x460 [ 2095.469508] ? lock_downgrade+0x900/0x900 [ 2095.473680] ? __schedule+0x1ed0/0x1ed0 [ 2095.477840] ? kasan_check_read+0x11/0x20 [ 2095.482007] ? do_raw_spin_unlock+0xa7/0x2f0 [ 2095.486613] ? do_raw_write_trylock+0x1c0/0x1c0 [ 2095.491311] ? kasan_check_write+0x14/0x20 [ 2095.495564] ? do_raw_spin_lock+0xc1/0x200 [ 2095.500140] jbd2_journal_commit_transaction+0xd42/0x89f8 [ 2095.505698] ? graph_lock+0x170/0x170 [ 2095.509687] ? print_usage_bug+0xc0/0xc0 [ 2095.513798] ? journal_submit_commit_record+0xb60/0xb60 [ 2095.519401] ? __lock_acquire+0x7ec/0x4ec0 [ 2095.523654] ? mark_held_locks+0x130/0x130 [ 2095.529248] ? __update_load_avg_blocked_se+0x730/0x730 [ 2095.534635] ? __update_load_avg_se+0xb90/0xb90 [ 2095.539537] ? __lock_is_held+0xb5/0x140 [ 2095.543633] ? update_load_avg+0x387/0x2470 [ 2095.548216] ? update_load_avg+0x387/0x2470 [ 2095.552571] ? attach_entity_load_avg+0x860/0x860 [ 2095.557666] ? debug_smp_processor_id+0x1c/0x20 [ 2095.562370] ? perf_trace_lock+0x14d/0x7a0 [ 2095.566819] ? finish_wait+0x430/0x430 [ 2095.570731] ? zap_class+0x640/0x640 [ 2095.574464] ? lock_downgrade+0x900/0x900 [ 2095.578861] ? graph_lock+0x170/0x170 [ 2095.582694] ? cpuacct_charge+0x265/0x440 [ 2095.587056] ? find_held_lock+0x36/0x1c0 [ 2095.591146] ? print_usage_bug+0xc0/0xc0 [ 2095.595216] ? lock_downgrade+0x900/0x900 [ 2095.599610] ? check_preemption_disabled+0x48/0x200 [ 2095.604662] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2095.610695] ? kasan_check_read+0x11/0x20 [ 2095.614874] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2095.620385] ? rcu_bh_qs+0xc0/0xc0 [ 2095.623963] ? __lock_acquire+0x7ec/0x4ec0 [ 2095.628436] ? print_usage_bug+0xc0/0xc0 [ 2095.632531] ? graph_lock+0x170/0x170 [ 2095.636551] ? __account_cfs_rq_runtime+0x790/0x790 [ 2095.641600] ? mark_held_locks+0x130/0x130 [ 2095.645860] ? __lock_acquire+0x7ec/0x4ec0 [ 2095.650391] ? check_preemption_disabled+0x48/0x200 [ 2095.655446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2095.662321] ? print_usage_bug+0xc0/0xc0 [ 2095.666562] ? debug_smp_processor_id+0x1c/0x20 [ 2095.671251] ? perf_trace_lock+0x14d/0x7a0 [ 2095.675530] ? mark_held_locks+0x130/0x130 [ 2095.680014] ? __lock_acquire+0x7ec/0x4ec0 [ 2095.684271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2095.690023] ? check_preemption_disabled+0x48/0x200 [ 2095.695064] ? debug_smp_processor_id+0x1c/0x20 [ 2095.699937] ? perf_trace_lock+0x14d/0x7a0 [ 2095.704200] ? zap_class+0x640/0x640 [ 2095.708130] ? finish_task_switch+0x1f5/0x900 [ 2095.712651] ? graph_lock+0x170/0x170 [ 2095.716659] ? check_preemption_disabled+0x48/0x200 [ 2095.721712] ? debug_smp_processor_id+0x1c/0x20 [ 2095.726614] ? perf_trace_lock+0x14d/0x7a0 [ 2095.730871] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2095.736514] ? find_held_lock+0x36/0x1c0 [ 2095.740596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2095.746141] ? check_preemption_disabled+0x48/0x200 [ 2095.751423] ? debug_smp_processor_id+0x1c/0x20 [ 2095.756130] ? perf_trace_lock+0x14d/0x7a0 [ 2095.760556] ? lock_downgrade+0x900/0x900 [ 2095.764719] ? preempt_notifier_register+0x200/0x200 [ 2095.770083] ? zap_class+0x640/0x640 [ 2095.773811] ? trace_hardirqs_off+0xb8/0x310 [ 2095.778406] ? do_raw_spin_unlock+0xa7/0x2f0 [ 2095.782842] ? graph_lock+0x170/0x170 [ 2095.787924] ? graph_lock+0x170/0x170 [ 2095.791751] ? check_preemption_disabled+0x48/0x200 [ 2095.796950] ? check_preemption_disabled+0x48/0x200 [ 2095.802007] ? find_held_lock+0x36/0x1c0 [ 2095.806088] ? try_to_del_timer_sync+0xec/0x140 [ 2095.810988] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2095.816114] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2095.821444] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2095.826055] ? trace_hardirqs_on+0xbd/0x310 [ 2095.830577] ? kasan_check_read+0x11/0x20 [ 2095.834754] ? try_to_del_timer_sync+0xec/0x140 [ 2095.839665] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2095.845140] ? stub_timer+0x10/0x10 [ 2095.848969] ? del_timer_sync+0xf8/0x270 [ 2095.853066] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 2095.858394] ? try_to_del_timer_sync+0xec/0x140 [ 2095.863088] ? del_timer+0x150/0x150 [ 2095.866998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2095.872560] kjournald2+0x26d/0xb30 [ 2095.876208] ? __bpf_trace_jbd2_end_commit+0x30/0x30 [ 2095.881547] ? __kthread_parkme+0xce/0x1a0 [ 2095.885802] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2095.891073] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2095.896208] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2095.900961] ? trace_hardirqs_on+0xbd/0x310 [ 2095.905303] ? finish_wait+0x430/0x430 [ 2095.909379] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2095.914858] ? kasan_check_write+0x14/0x20 [ 2095.920397] ? do_raw_spin_lock+0xc1/0x200 [ 2095.924657] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 2095.929941] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2095.935499] ? __kthread_parkme+0xfb/0x1a0 [ 2095.939905] kthread+0x35a/0x420 [ 2095.943293] ? __bpf_trace_jbd2_end_commit+0x30/0x30 [ 2095.948725] ? kthread_bind+0x40/0x40 [ 2095.952548] ret_from_fork+0x3a/0x50 [ 2095.956459] INFO: task rs:main Q:Reg:5361 blocked for more than 140 seconds. [ 2095.963655] Not tainted 4.19.0-rc7+ #59 [ 2095.968351] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2095.976470] rs:main Q:Reg D21512 5361 1 0x00000000 [ 2095.982136] Call Trace: [ 2095.984742] __schedule+0x86c/0x1ed0 [ 2095.988660] ? perf_trace_lock+0x14d/0x7a0 [ 2095.992921] ? __sched_text_start+0x8/0x8 [ 2095.997247] ? mark_held_locks+0xc7/0x130 [ 2096.001414] ? graph_lock+0x170/0x170 [ 2096.005227] ? graph_lock+0x170/0x170 [ 2096.009212] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2096.013813] ? trace_hardirqs_on+0xbd/0x310 [ 2096.018311] ? prepare_to_wait+0x1b3/0x3f0 [ 2096.022571] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2096.028291] ? find_held_lock+0x36/0x1c0 [ 2096.032399] schedule+0xfe/0x460 [ 2096.035847] ? wait_transaction_locked+0x206/0x310 [ 2096.041038] ? __schedule+0x1ed0/0x1ed0 [ 2096.045034] ? lock_release+0x970/0x970 [ 2096.050289] ? __lock_acquire+0x7ec/0x4ec0 [ 2096.054563] wait_transaction_locked+0x24d/0x310 [ 2096.059524] ? ext4_init_security+0x40/0x40 [ 2096.063866] ? finish_wait+0x430/0x430 [ 2096.067921] add_transaction_credits+0x538/0xe50 [ 2096.072718] ? find_held_lock+0x36/0x1c0 [ 2096.076961] ? sub_reserved_credits+0x50/0x50 [ 2096.081487] ? lock_downgrade+0x900/0x900 [ 2096.085645] ? check_preemption_disabled+0x48/0x200 [ 2096.090852] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2096.096795] ? kasan_check_read+0x11/0x20 [ 2096.100963] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2096.106251] ? rcu_bh_qs+0xc0/0xc0 [ 2096.110009] ? rcu_bh_qs+0xc0/0xc0 [ 2096.113568] ? unwind_dump+0x190/0x190 [ 2096.117657] ? is_bpf_text_address+0xd3/0x170 [ 2096.122184] ? lock_acquire+0x1ed/0x520 [ 2096.126186] ? start_this_handle+0x2a8/0x1250 [ 2096.130943] ? __save_stack_trace+0x8d/0xf0 [ 2096.135308] ? lock_release+0x970/0x970 [ 2096.139485] ? save_stack+0xa9/0xd0 [ 2096.143130] ? kasan_check_write+0x14/0x20 [ 2096.147545] start_this_handle+0x41f/0x1250 [ 2096.151882] ? __vfs_write+0x6b8/0x9f0 [ 2096.155796] ? jbd2_journal_free_reserved+0x110/0x110 [ 2096.161210] ? graph_lock+0x170/0x170 [ 2096.165033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2096.170777] ? check_preemption_disabled+0x48/0x200 [ 2096.175816] ? check_preemption_disabled+0x48/0x200 [ 2096.182168] ? __lock_is_held+0xb5/0x140 [ 2096.186265] ? rcu_read_lock_sched_held+0x108/0x120 [ 2096.191481] ? kmem_cache_alloc+0x33a/0x730 [ 2096.195837] jbd2__journal_start+0x3c9/0xa90 [ 2096.200427] ? arch_local_save_flags+0x40/0x40 [ 2096.205039] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 2096.210925] ? __might_sleep+0x95/0x190 [ 2096.214923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2096.220819] __ext4_journal_start_sb+0x1a5/0x5f0 [ 2096.225596] ? ext4_dirty_inode+0x62/0xc0 [ 2096.229928] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 2096.235661] ? __lock_is_held+0xb5/0x140 [ 2096.239927] ? ext4_setattr+0x28f0/0x28f0 [ 2096.244090] ext4_dirty_inode+0x62/0xc0 [ 2096.248291] __mark_inode_dirty+0x7c3/0x1510 [ 2096.252724] ? __inode_attach_wb+0x13f0/0x13f0 [ 2096.257490] ? find_held_lock+0x36/0x1c0 [ 2096.261579] ? mark_held_locks+0xc7/0x130 [ 2096.265745] ? ktime_get_coarse_real_ts64+0x288/0x3b0 [ 2096.271151] ? ktime_get_coarse_real_ts64+0x288/0x3b0 [ 2096.276513] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2096.281115] ? trace_hardirqs_on+0xbd/0x310 [ 2096.285447] ? current_time+0x72/0x1b0 [ 2096.289560] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2096.295042] ? futex_wait+0x5ec/0xa50 [ 2096.299021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2096.304577] ? check_preemption_disabled+0x48/0x200 [ 2096.310892] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2096.315926] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 2096.321299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2096.326984] ? timespec64_trunc+0xea/0x180 [ 2096.331236] ? inode_init_owner+0x340/0x340 [ 2096.335571] ? zap_class+0x640/0x640 [ 2096.339496] generic_update_time+0x26a/0x450 [ 2096.343922] ? file_remove_privs+0x540/0x540 [ 2096.348989] ? lock_acquire+0x1ed/0x520 [ 2096.352983] ? preempt_count_add+0x7d/0x160 [ 2096.357490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2096.363043] ? mnt_clone_write+0x10a/0x160 [ 2096.367448] ? file_remove_privs+0x540/0x540 [ 2096.371882] file_update_time+0x390/0x640 [ 2096.376041] ? current_time+0x1b0/0x1b0 [ 2096.380198] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2096.385230] ? generic_write_checks+0x382/0x5d0 [ 2096.390064] ? wait_on_page_locked_killable+0x520/0x520 [ 2096.395444] ? ext4_file_write_iter+0x2a1/0x1420 [ 2096.400403] __generic_file_write_iter+0x1dc/0x630 [ 2096.406003] ext4_file_write_iter+0x390/0x1420 [ 2096.410762] ? ext4_file_mmap+0x410/0x410 [ 2096.415347] ? ksys_dup3+0x680/0x680 [ 2096.419200] ? graph_lock+0x170/0x170 [ 2096.423345] ? __lock_is_held+0xb5/0x140 [ 2096.427709] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2096.433546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2096.440396] ? iov_iter_init+0xc2/0x1e0 [ 2096.444394] __vfs_write+0x6b8/0x9f0 [ 2096.448285] ? kernel_read+0x120/0x120 [ 2096.452194] ? __lock_is_held+0xb5/0x140 [ 2096.456287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2096.462005] ? __sb_start_write+0x1b2/0x370 [ 2096.466511] vfs_write+0x1fc/0x560 [ 2096.470079] ksys_write+0x101/0x260 [ 2096.473724] ? __ia32_sys_read+0xb0/0xb0 [ 2096.477976] ? trace_hardirqs_on+0x310/0x310 [ 2096.482407] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2096.488054] __x64_sys_write+0x73/0xb0 [ 2096.491963] do_syscall_64+0x1b9/0x820 [ 2096.495862] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2096.501416] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2096.507024] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2096.511888] ? trace_hardirqs_on_caller+0x310/0x310 [ 2096.517093] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2096.522138] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2096.527155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2096.532359] RIP: 0033:0x7f7036f5b19d [ 2096.536082] Code: d1 20 00 00 75 10 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 be fa ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 07 fb ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2096.555234] RSP: 002b:00007f70354fc000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2096.563127] RAX: ffffffffffffffda RBX: 000000000000006a RCX: 00007f7036f5b19d [ 2096.571673] RDX: 000000000000006a RSI: 0000000001cc4a90 RDI: 0000000000000005 [ 2096.579096] RBP: 0000000001cc4a90 R08: 0000000001cc4a90 R09: 0000000000000000 [ 2096.586515] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 2096.593796] R13: 00007f70354fc480 R14: 0000000000000001 R15: 0000000001cc4890 [ 2096.601308] INFO: task syz-executor3:5586 blocked for more than 140 seconds. [ 2096.608675] Not tainted 4.19.0-rc7+ #59 [ 2096.613177] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2096.621352] syz-executor3 D18936 5586 1 0x00000004 [ 2096.627143] Call Trace: [ 2096.629753] __schedule+0x86c/0x1ed0 [ 2096.633482] ? perf_trace_lock+0x14d/0x7a0 [ 2096.637925] ? __sched_text_start+0x8/0x8 [ 2096.642093] ? mark_held_locks+0xc7/0x130 [ 2096.646252] ? graph_lock+0x170/0x170 [ 2096.650248] ? graph_lock+0x170/0x170 [ 2096.654067] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2096.658811] ? trace_hardirqs_on+0xbd/0x310 [ 2096.663148] ? prepare_to_wait+0x1b3/0x3f0 [ 2096.667547] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2096.673026] ? find_held_lock+0x36/0x1c0 [ 2096.677267] schedule+0xfe/0x460 [ 2096.680654] ? wait_transaction_locked+0x206/0x310 [ 2096.685613] ? __schedule+0x1ed0/0x1ed0 [ 2096.689848] ? lock_release+0x970/0x970 [ 2096.693863] wait_transaction_locked+0x24d/0x310 [ 2096.699898] ? ext4_init_security+0x40/0x40 [ 2096.704249] ? finish_wait+0x430/0x430 [ 2096.708333] add_transaction_credits+0x538/0xe50 [ 2096.713106] ? find_held_lock+0x36/0x1c0 [ 2096.717352] ? sub_reserved_credits+0x50/0x50 [ 2096.721867] ? lock_downgrade+0x900/0x900 [ 2096.726029] ? check_preemption_disabled+0x48/0x200 [ 2096.731333] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2096.738990] ? kasan_check_read+0x11/0x20 [ 2096.743160] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2096.748623] ? rcu_bh_qs+0xc0/0xc0 [ 2096.752181] ? rcu_bh_qs+0xc0/0xc0 [ 2096.755731] ? unwind_dump+0x190/0x190 [ 2096.759881] ? is_bpf_text_address+0xd3/0x170 [ 2096.764409] ? lock_acquire+0x1ed/0x520 [ 2096.768556] ? start_this_handle+0x2a8/0x1250 [ 2096.773074] ? __save_stack_trace+0x8d/0xf0 [ 2096.777591] ? lock_release+0x970/0x970 [ 2096.781593] ? save_stack+0xa9/0xd0 [ 2096.785235] ? kasan_check_write+0x14/0x20 [ 2096.789747] start_this_handle+0x41f/0x1250 [ 2096.794089] ? do_syscall_64+0x1b9/0x820 [ 2096.798328] ? jbd2_journal_free_reserved+0x110/0x110 [ 2096.803541] ? graph_lock+0x170/0x170 [ 2096.807520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2096.813079] ? check_preemption_disabled+0x48/0x200 [ 2096.818361] ? check_preemption_disabled+0x48/0x200 [ 2096.823411] ? __lock_is_held+0xb5/0x140 [ 2096.828847] ? rcu_read_lock_sched_held+0x108/0x120 [ 2096.833887] ? kmem_cache_alloc+0x33a/0x730 [ 2096.838415] jbd2__journal_start+0x3c9/0xa90 [ 2096.842855] ? arch_local_save_flags+0x40/0x40 [ 2096.847612] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 2096.853350] ? __might_sleep+0x95/0x190 [ 2096.857525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2096.863089] __ext4_journal_start_sb+0x1a5/0x5f0 [ 2096.868074] ? ext4_dirty_inode+0x62/0xc0 [ 2096.872243] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 2096.878137] ? __lock_is_held+0xb5/0x140 [ 2096.882224] ? ext4_setattr+0x28f0/0x28f0 [ 2096.886558] ext4_dirty_inode+0x62/0xc0 [ 2096.890552] __mark_inode_dirty+0x7c3/0x1510 [ 2096.894974] ? __inode_attach_wb+0x13f0/0x13f0 [ 2096.899815] ? find_held_lock+0x36/0x1c0 [ 2096.903912] ? mark_held_locks+0xc7/0x130 [ 2096.908244] ? ktime_get_coarse_real_ts64+0x288/0x3b0 [ 2096.913461] ? ktime_get_coarse_real_ts64+0x288/0x3b0 [ 2096.918843] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2096.923444] ? trace_hardirqs_on+0xbd/0x310 [ 2096.927958] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 2096.933165] ? current_time+0x72/0x1b0 [ 2096.937275] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2096.942747] ? graph_lock+0x170/0x170 [ 2096.946749] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2096.951786] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 2096.958290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2096.963846] ? timespec64_trunc+0xea/0x180 [ 2096.968262] ? inode_init_owner+0x340/0x340 [ 2096.972611] generic_update_time+0x26a/0x450 [ 2096.977224] ? file_remove_privs+0x540/0x540 [ 2096.981657] ? __sb_start_write+0x1b2/0x370 [ 2096.985997] touch_atime+0x29c/0x320 [ 2096.990082] ? file_remove_privs+0x540/0x540 [ 2096.994504] ? file_remove_privs+0x540/0x540 [ 2096.999087] ? atime_needs_update+0x710/0x710 [ 2097.003614] iterate_dir+0x370/0x5d0 [ 2097.007600] __x64_sys_getdents+0x29f/0x510 [ 2097.011955] ? __ia32_sys_old_readdir+0x2c0/0x2c0 [ 2097.017031] ? fillonedir+0x2a0/0x2a0 [ 2097.020877] do_syscall_64+0x1b9/0x820 [ 2097.024783] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2097.030405] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2097.035365] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2097.040498] ? trace_hardirqs_on_caller+0x310/0x310 [ 2097.045545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2097.051331] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2097.056554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2097.061435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2097.066833] RIP: 0033:0x45591b [ 2097.070040] Code: Bad RIP value. [ 2097.073411] RSP: 002b:00007ffe29e6bdd0 EFLAGS: 00000202 ORIG_RAX: 000000000000004e [ 2097.081468] RAX: ffffffffffffffda RBX: 0000000001e2b970 RCX: 000000000045591b [ 2097.090060] RDX: 0000000000008000 RSI: 0000000001e2b970 RDI: 0000000000000003 [ 2097.097547] RBP: 0000000001e2b970 R08: 0000000000000001 R09: 0000000001e2a940 [ 2097.104841] R10: 0000000000000000 R11: 0000000000000202 R12: ffffffffffffffd4 [ 2097.112342] R13: 0000000000000016 R14: 0000000000000000 R15: 0000000000000003 [ 2097.119849] INFO: task syz-executor4:5632 blocked for more than 140 seconds. [ 2097.127252] Not tainted 4.19.0-rc7+ #59 [ 2097.131757] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2097.139977] syz-executor4 D18920 5632 1 0x00000004 [ 2097.145642] Call Trace: [ 2097.148748] __schedule+0x86c/0x1ed0 [ 2097.152491] ? perf_trace_lock+0x14d/0x7a0 [ 2097.156952] ? __sched_text_start+0x8/0x8 [ 2097.161129] ? mark_held_locks+0xc7/0x130 [ 2097.165292] ? graph_lock+0x170/0x170 [ 2097.169340] ? graph_lock+0x170/0x170 [ 2097.173165] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2097.177972] ? trace_hardirqs_on+0xbd/0x310 [ 2097.182312] ? prepare_to_wait+0x1b3/0x3f0 [ 2097.186811] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2097.192302] ? find_held_lock+0x36/0x1c0 [ 2097.196610] schedule+0xfe/0x460 [ 2097.200006] ? wait_transaction_locked+0x206/0x310 [ 2097.204959] ? __schedule+0x1ed0/0x1ed0 [ 2097.209201] ? lock_release+0x970/0x970 [ 2097.213224] wait_transaction_locked+0x24d/0x310 [ 2097.219378] ? ext4_init_security+0x40/0x40 [ 2097.223744] ? finish_wait+0x430/0x430 [ 2097.227916] add_transaction_credits+0x538/0xe50 [ 2097.232707] ? find_held_lock+0x36/0x1c0 [ 2097.237027] ? sub_reserved_credits+0x50/0x50 [ 2097.241550] ? lock_downgrade+0x900/0x900 [ 2097.245715] ? check_preemption_disabled+0x48/0x200 [ 2097.251119] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2097.257070] ? kasan_check_read+0x11/0x20 [ 2097.261242] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2097.266684] ? rcu_bh_qs+0xc0/0xc0 [ 2097.270248] ? rcu_bh_qs+0xc0/0xc0 [ 2097.273793] ? unwind_dump+0x190/0x190 [ 2097.277872] ? is_bpf_text_address+0xd3/0x170 [ 2097.282391] ? lock_acquire+0x1ed/0x520 [ 2097.286593] ? start_this_handle+0x2a8/0x1250 [ 2097.291115] ? __save_stack_trace+0x8d/0xf0 [ 2097.295465] ? lock_release+0x970/0x970 [ 2097.299670] ? save_stack+0xa9/0xd0 [ 2097.303320] ? kasan_check_write+0x14/0x20 [ 2097.307732] start_this_handle+0x41f/0x1250 [ 2097.312074] ? do_syscall_64+0x1b9/0x820 [ 2097.316158] ? jbd2_journal_free_reserved+0x110/0x110 [ 2097.321628] ? graph_lock+0x170/0x170 [ 2097.325465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2097.331182] ? check_preemption_disabled+0x48/0x200 [ 2097.336219] ? check_preemption_disabled+0x48/0x200 [ 2097.341464] ? __lock_is_held+0xb5/0x140 [ 2097.345569] ? rcu_read_lock_sched_held+0x108/0x120 [ 2097.351934] ? kmem_cache_alloc+0x33a/0x730 [ 2097.356491] jbd2__journal_start+0x3c9/0xa90 [ 2097.360920] ? arch_local_save_flags+0x40/0x40 [ 2097.365533] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 2097.371520] ? __might_sleep+0x95/0x190 [ 2097.375519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2097.381756] __ext4_journal_start_sb+0x1a5/0x5f0 [ 2097.386671] ? ext4_dirty_inode+0x62/0xc0 [ 2097.390839] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 2097.396784] ? __lock_is_held+0xb5/0x140 [ 2097.400870] ? ext4_setattr+0x28f0/0x28f0 [ 2097.405030] ext4_dirty_inode+0x62/0xc0 [ 2097.409211] __mark_inode_dirty+0x7c3/0x1510 [ 2097.413652] ? __inode_attach_wb+0x13f0/0x13f0 [ 2097.418410] ? find_held_lock+0x36/0x1c0 [ 2097.422508] ? mark_held_locks+0xc7/0x130 [ 2097.426880] ? ktime_get_coarse_real_ts64+0x288/0x3b0 [ 2097.432105] ? ktime_get_coarse_real_ts64+0x288/0x3b0 [ 2097.437530] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2097.442138] ? trace_hardirqs_on+0xbd/0x310 [ 2097.446665] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 2097.451873] ? current_time+0x72/0x1b0 [ 2097.455774] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2097.461526] ? graph_lock+0x170/0x170 [ 2097.465360] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2097.470595] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 2097.475805] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2097.482699] ? timespec64_trunc+0xea/0x180 [ 2097.487111] ? inode_init_owner+0x340/0x340 [ 2097.491475] generic_update_time+0x26a/0x450 [ 2097.495903] ? file_remove_privs+0x540/0x540 [ 2097.500607] ? __sb_start_write+0x1b2/0x370 [ 2097.504955] touch_atime+0x29c/0x320 [ 2097.508853] ? file_remove_privs+0x540/0x540 [ 2097.513279] ? file_remove_privs+0x540/0x540 [ 2097.517873] ? atime_needs_update+0x710/0x710 [ 2097.522397] iterate_dir+0x370/0x5d0 [ 2097.526132] __x64_sys_getdents+0x29f/0x510 [ 2097.530741] ? __ia32_sys_old_readdir+0x2c0/0x2c0 [ 2097.535599] ? fillonedir+0x2a0/0x2a0 [ 2097.539634] do_syscall_64+0x1b9/0x820 [ 2097.543543] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2097.549181] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2097.554144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2097.559260] ? trace_hardirqs_on_caller+0x310/0x310 [ 2097.564327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2097.570107] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2097.575152] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2097.580197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2097.585407] RIP: 0033:0x45591b [ 2097.588803] Code: Bad RIP value. [ 2097.592182] RSP: 002b:00007ffd15467460 EFLAGS: 00000206 ORIG_RAX: 000000000000004e [ 2097.600128] RAX: ffffffffffffffda RBX: 0000000001d53970 RCX: 000000000045591b [ 2097.608753] RDX: 0000000000008000 RSI: 0000000001d53970 RDI: 0000000000000003 [ 2097.616055] RBP: 0000000001d53970 R08: 0000000000000001 R09: 0000000001d52940 [ 2097.623557] R10: 0000000000000000 R11: 0000000000000206 R12: ffffffffffffffd4 [ 2097.630991] R13: 0000000000000016 R14: 0000000000000000 R15: 0000000000000004 [ 2097.638489] INFO: task kworker/u4:5:9041 blocked for more than 140 seconds. [ 2097.645602] Not tainted 4.19.0-rc7+ #59 [ 2097.650273] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2097.658432] kworker/u4:5 D13960 9041 2 0x80000000 [ 2097.664111] Workqueue: writeback wb_workfn (flush-8:0) [ 2097.669595] Call Trace: [ 2097.672207] __schedule+0x86c/0x1ed0 [ 2097.675933] ? perf_trace_lock+0x14d/0x7a0 [ 2097.680411] ? __sched_text_start+0x8/0x8 [ 2097.684612] ? mark_held_locks+0xc7/0x130 [ 2097.688990] ? graph_lock+0x170/0x170 [ 2097.692807] ? graph_lock+0x170/0x170 [ 2097.696828] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2097.701431] ? trace_hardirqs_on+0xbd/0x310 [ 2097.705776] ? prepare_to_wait+0x1b3/0x3f0 [ 2097.710259] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2097.715736] ? find_held_lock+0x36/0x1c0 [ 2097.720000] schedule+0xfe/0x460 [ 2097.723390] ? wait_transaction_locked+0x206/0x310 [ 2097.728577] ? __schedule+0x1ed0/0x1ed0 [ 2097.732574] ? lock_release+0x970/0x970 [ 2097.737847] ? lock_downgrade+0x900/0x900 [ 2097.742015] ? check_preemption_disabled+0x48/0x200 [ 2097.747260] wait_transaction_locked+0x24d/0x310 [ 2097.752034] ? ext4_init_security+0x40/0x40 [ 2097.756563] ? finish_wait+0x430/0x430 [ 2097.760483] ? find_get_pages_range+0x9fd/0x12d0 [ 2097.765268] add_transaction_credits+0x538/0xe50 [ 2097.770302] ? __read_once_size_nocheck.constprop.8+0x10/0x10 [ 2097.776207] ? ret_from_fork+0x3a/0x50 [ 2097.780303] ? sub_reserved_credits+0x50/0x50 [ 2097.784821] ? print_usage_bug+0xc0/0xc0 [ 2097.789105] ? unwind_next_frame.part.7+0x1ae/0x9e0 [ 2097.794142] ? unwind_dump+0x190/0x190 [ 2097.798337] ? unwind_dump+0x190/0x190 [ 2097.802250] ? __read_once_size_nocheck.constprop.8+0x10/0x10 [ 2097.808328] ? ret_from_fork+0x3a/0x50 [ 2097.812238] ? __lock_acquire+0x7ec/0x4ec0 [ 2097.816665] ? lock_acquire+0x1ed/0x520 [ 2097.820663] ? start_this_handle+0x2a8/0x1250 [ 2097.825169] ? __save_stack_trace+0x7d/0xf0 [ 2097.829768] ? lock_release+0x970/0x970 [ 2097.833760] ? ret_from_fork+0x3a/0x50 [ 2097.837812] ? save_stack+0xa9/0xd0 [ 2097.841468] ? kasan_check_write+0x14/0x20 [ 2097.845722] start_this_handle+0x41f/0x1250 [ 2097.850265] ? wb_workfn+0x1008/0x1790 [ 2097.854182] ? jbd2_journal_free_reserved+0x110/0x110 [ 2097.859579] ? graph_lock+0x170/0x170 [ 2097.863403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2097.870411] ? check_preemption_disabled+0x48/0x200 [ 2097.875470] ? check_preemption_disabled+0x48/0x200 [ 2097.880694] ? __lock_is_held+0xb5/0x140 [ 2097.884790] ? rcu_read_lock_sched_held+0x108/0x120 [ 2097.889984] ? kmem_cache_alloc+0x33a/0x730 [ 2097.894337] jbd2__journal_start+0x3c9/0xa90 [ 2097.898951] ? arch_local_save_flags+0x40/0x40 [ 2097.903556] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 2097.909469] ? __might_sleep+0x95/0x190 [ 2097.913476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2097.919192] __ext4_journal_start_sb+0x1a5/0x5f0 [ 2097.923971] ? ext4_writepages+0x18ba/0x4110 [ 2097.928565] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 2097.934298] ? __lock_is_held+0xb5/0x140 [ 2097.938583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2097.944142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2097.949854] ? ext4_meta_trans_blocks+0x25f/0x310 [ 2097.954718] ext4_writepages+0x18ba/0x4110 [ 2097.959133] ? __lock_acquire+0x7ec/0x4ec0 [ 2097.963416] ? ext4_mark_inode_dirty+0xb30/0xb30 [ 2097.968380] ? print_usage_bug+0xc0/0xc0 [ 2097.972482] ? __update_load_avg_blocked_se+0x730/0x730 [ 2097.978089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2097.983648] ? check_preemption_disabled+0x48/0x200 [ 2097.988915] ? __lock_acquire+0x7ec/0x4ec0 [ 2097.993165] ? zap_class+0x640/0x640 [ 2097.998199] ? attach_entity_load_avg+0x860/0x860 [ 2098.003065] ? attach_entity_load_avg+0x860/0x860 [ 2098.008112] ? print_usage_bug+0xc0/0xc0 [ 2098.012220] ? __lock_acquire+0x7ec/0x4ec0 [ 2098.016715] ? mark_held_locks+0x130/0x130 [ 2098.020973] ? __account_cfs_rq_runtime+0x790/0x790 [ 2098.026018] ? mark_held_locks+0x130/0x130 [ 2098.030656] ? graph_lock+0x170/0x170 [ 2098.034494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2098.040244] ? check_preemption_disabled+0x48/0x200 [ 2098.045278] ? check_preemption_disabled+0x48/0x200 [ 2098.050568] ? ext4_mark_inode_dirty+0xb30/0xb30 [ 2098.055353] do_writepages+0x9a/0x1a0 [ 2098.059355] ? ext4_mark_inode_dirty+0xb30/0xb30 [ 2098.064128] ? do_writepages+0x9a/0x1a0 [ 2098.068311] __writeback_single_inode+0x20a/0x1620 [ 2098.073276] ? debug_smp_processor_id+0x1c/0x20 [ 2098.078147] ? perf_trace_lock+0x14d/0x7a0 [ 2098.082409] ? __mark_inode_dirty+0x1510/0x1510 [ 2098.087359] ? zap_class+0x640/0x640 [ 2098.091103] ? lock_acquire+0x1ed/0x520 [ 2098.095100] ? find_held_lock+0x36/0x1c0 [ 2098.099403] ? wbc_attach_and_unlock_inode+0x5c0/0xa30 [ 2098.104702] ? lock_downgrade+0x900/0x900 [ 2098.109138] ? find_held_lock+0x13f/0x1c0 [ 2098.113309] ? kasan_check_read+0x11/0x20 [ 2098.117719] ? do_raw_spin_unlock+0xa7/0x2f0 [ 2098.122146] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 2098.128039] ? __lock_is_held+0xb5/0x140 [ 2098.132132] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2098.137850] ? wbc_attach_and_unlock_inode+0x675/0xa30 [ 2098.143156] ? __writeback_single_inode+0x1620/0x1620 [ 2098.148555] ? kasan_check_write+0x14/0x20 [ 2098.152814] ? do_raw_spin_lock+0xc1/0x200 [ 2098.157302] writeback_sb_inodes+0x71f/0x11d0 [ 2098.161839] ? wbc_detach_inode+0x940/0x940 [ 2098.166177] ? check_preemption_disabled+0x48/0x200 [ 2098.171466] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2098.177174] ? queue_io+0x3dd/0x800 [ 2098.180834] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2098.186631] __writeback_inodes_wb+0x1b9/0x340 [ 2098.191251] ? writeback_sb_inodes+0x11d0/0x11d0 [ 2098.196019] ? __lock_is_held+0xb5/0x140 [ 2098.200331] wb_writeback+0xa73/0xfc0 [ 2098.204164] ? writeback_inodes_wb.constprop.49+0x330/0x330 [ 2098.210099] ? widen_string+0xe0/0x2e0 [ 2098.214024] ? perf_trace_lock+0x14d/0x7a0 [ 2098.218480] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2098.223697] ? print_usage_bug+0xc0/0xc0 [ 2098.228014] ? graph_lock+0x170/0x170 [ 2098.231836] ? string+0x225/0x2d0 [ 2098.235300] ? widen_string+0x2e0/0x2e0 [ 2098.239517] ? __read_once_size_nocheck.constprop.8+0x10/0x10 [ 2098.245423] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2098.250884] ? find_next_bit+0x104/0x130 [ 2098.254970] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2098.261366] ? find_next_bit+0x104/0x130 [ 2098.265466] ? cpumask_next+0x41/0x50 [ 2098.269481] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2098.274518] ? get_nr_dirty_inodes+0xd6/0x130 [ 2098.279229] ? __local_bh_enable_ip+0x160/0x260 [ 2098.283929] ? get_nr_dirty_pages+0x17c/0x1f0 [ 2098.288638] ? _raw_spin_unlock_bh+0x30/0x40 [ 2098.293070] ? inode_sleep_on_writeback+0x240/0x240 [ 2098.298350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2098.303910] ? check_preemption_disabled+0x48/0x200 [ 2098.309136] ? wb_workfn+0x521/0x1790 [ 2098.312957] ? wb_workfn+0x521/0x1790 [ 2098.316953] ? __local_bh_enable_ip+0x160/0x260 [ 2098.321646] wb_workfn+0x1008/0x1790 [ 2098.325373] ? __lock_acquire+0x7ec/0x4ec0 [ 2098.330161] ? inode_wait_for_writeback+0x40/0x40 [ 2098.335034] ? mark_held_locks+0x130/0x130 [ 2098.339480] ? debug_smp_processor_id+0x1c/0x20 [ 2098.344165] ? perf_trace_lock+0x14d/0x7a0 [ 2098.348604] ? mark_held_locks+0x130/0x130 [ 2098.352872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2098.358631] ? debug_smp_processor_id+0x1c/0x20 [ 2098.363318] ? perf_trace_lock+0x14d/0x7a0 [ 2098.367784] ? debug_smp_processor_id+0x1c/0x20 [ 2098.372481] ? perf_trace_lock+0x14d/0x7a0 [ 2098.376934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2098.383000] ? zap_class+0x640/0x640 [ 2098.388056] ? zap_class+0x640/0x640 [ 2098.391802] ? graph_lock+0x170/0x170 [ 2098.395619] ? debug_object_deactivate+0x2eb/0x450 [ 2098.400831] ? lock_downgrade+0x900/0x900 [ 2098.405008] ? find_held_lock+0x36/0x1c0 [ 2098.409269] ? graph_lock+0x170/0x170 [ 2098.413092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2098.418815] ? check_preemption_disabled+0x48/0x200 [ 2098.423850] ? check_preemption_disabled+0x48/0x200 [ 2098.429077] ? __lock_is_held+0xb5/0x140 [ 2098.433179] process_one_work+0xc90/0x1b90 [ 2098.437717] ? mark_held_locks+0x130/0x130 [ 2098.441992] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 2098.446887] ? __switch_to_asm+0x40/0x70 [ 2098.450967] ? __switch_to_asm+0x34/0x70 [ 2098.455040] ? __switch_to_asm+0x34/0x70 [ 2098.459342] ? __switch_to_asm+0x40/0x70 [ 2098.463419] ? __switch_to_asm+0x34/0x70 [ 2098.467731] ? __switch_to_asm+0x40/0x70 [ 2098.471814] ? __switch_to_asm+0x34/0x70 [ 2098.475884] ? __switch_to_asm+0x40/0x70 [ 2098.480196] ? __schedule+0x874/0x1ed0 [ 2098.484117] ? check_preemption_disabled+0x48/0x200 [ 2098.489385] ? graph_lock+0x170/0x170 [ 2098.493209] ? lock_downgrade+0x900/0x900 [ 2098.497629] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2098.502240] ? retint_kernel+0x2d/0x2d [ 2098.506148] ? find_held_lock+0x36/0x1c0 [ 2098.511207] ? lock_acquire+0x1ed/0x520 [ 2098.515214] ? worker_thread+0x3e0/0x1390 [ 2098.520716] ? lock_release+0x970/0x970 [ 2098.524712] ? trace_hardirqs_off+0xb8/0x310 [ 2098.529321] ? kasan_check_read+0x11/0x20 [ 2098.533495] ? worker_thread+0x3e0/0x1390 [ 2098.537876] ? trace_hardirqs_on+0x310/0x310 [ 2098.542313] ? kasan_check_write+0x14/0x20 [ 2098.546750] ? do_raw_spin_lock+0xc1/0x200 [ 2098.551015] worker_thread+0x17f/0x1390 [ 2098.555021] ? process_one_work+0x1b90/0x1b90 [ 2098.559748] ? graph_lock+0x170/0x170 [ 2098.563574] ? __sched_text_start+0x8/0x8 [ 2098.567958] ? find_held_lock+0x36/0x1c0 [ 2098.572048] ? __kthread_parkme+0xce/0x1a0 [ 2098.576474] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2098.581598] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2098.588090] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2098.592700] ? trace_hardirqs_on+0xbd/0x310 [ 2098.597239] ? kasan_check_read+0x11/0x20 [ 2098.601404] ? __kthread_parkme+0xce/0x1a0 [ 2098.605655] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2098.611404] ? kasan_check_write+0x14/0x20 [ 2098.615672] ? do_raw_spin_lock+0xc1/0x200 [ 2098.620105] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 2098.625237] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2098.630975] ? __kthread_parkme+0xfb/0x1a0 [ 2098.635260] kthread+0x35a/0x420 [ 2098.638897] ? process_one_work+0x1b90/0x1b90 [ 2098.643422] ? kthread_bind+0x40/0x40 [ 2098.648570] ret_from_fork+0x3a/0x50 [ 2098.652480] INFO: task syz-executor1:767 blocked for more than 140 seconds. [ 2098.659811] Not tainted 4.19.0-rc7+ #59 [ 2098.664312] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2098.672443] syz-executor1 D23400 767 7407 0x00000004 [ 2098.678300] Call Trace: [ 2098.680912] __schedule+0x86c/0x1ed0 [ 2098.684637] ? __switch_to_asm+0x34/0x70 [ 2098.688886] ? __switch_to_asm+0x40/0x70 [ 2098.692960] ? __switch_to_asm+0x34/0x70 [ 2098.697191] ? __sched_text_start+0x8/0x8 [ 2098.701363] ? __schedule+0x874/0x1ed0 [ 2098.705262] ? rwsem_spin_on_owner+0x264/0xa30 [ 2098.710078] ? graph_lock+0x170/0x170 [ 2098.713898] ? print_usage_bug+0xc0/0xc0 [ 2098.718118] ? __sched_text_start+0x8/0x8 [ 2098.722279] ? kasan_check_read+0x11/0x20 [ 2098.726620] ? rcu_bh_qs+0xc0/0xc0 [ 2098.730184] ? find_held_lock+0x36/0x1c0 [ 2098.734268] schedule+0xfe/0x460 [ 2098.737856] ? __schedule+0x1ed0/0x1ed0 [ 2098.741853] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2098.746621] ? trace_hardirqs_on+0xbd/0x310 [ 2098.750959] ? kasan_check_read+0x11/0x20 [ 2098.755117] ? __rwsem_down_write_failed_common+0x8db/0x1670 [ 2098.761152] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2098.766785] ? kasan_check_write+0x14/0x20 [ 2098.771040] ? do_raw_spin_lock+0xc1/0x200 [ 2098.775293] __rwsem_down_write_failed_common+0xbb9/0x1670 [ 2098.782299] ? perf_trace_lock+0x14d/0x7a0 [ 2098.786699] ? rwsem_spin_on_owner+0xa30/0xa30 [ 2098.791306] ? check_preemption_disabled+0x48/0x200 [ 2098.796506] ? debug_smp_processor_id+0x1c/0x20 [ 2098.801196] ? perf_trace_lock+0x14d/0x7a0 [ 2098.805460] ? mark_held_locks+0x130/0x130 [ 2098.809933] ? __lock_acquire+0x7ec/0x4ec0 [ 2098.814198] ? graph_lock+0x170/0x170 [ 2098.818253] ? has_ns_capability_noaudit+0x1c8/0x340 [ 2098.823376] ? lock_downgrade+0x900/0x900 [ 2098.827708] ? find_held_lock+0x36/0x1c0 [ 2098.831852] ? ima_match_policy+0x848/0x1560 [ 2098.837140] ? lock_downgrade+0x900/0x900 [ 2098.841307] ? check_preemption_disabled+0x48/0x200 [ 2098.846599] ? graph_lock+0x170/0x170 [ 2098.850422] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2098.856255] ? kasan_check_read+0x11/0x20 [ 2098.860623] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2098.865918] ? rcu_bh_qs+0xc0/0xc0 [ 2098.869669] ? lock_acquire+0x1ed/0x520 [ 2098.873659] ? process_measurement+0x190f/0x1bf0 [ 2098.878650] ? lock_release+0x970/0x970 [ 2098.882646] ? arch_local_save_flags+0x40/0x40 [ 2098.887401] ? ima_lsm_rule_init+0x1c0/0x1c0 [ 2098.891831] rwsem_down_write_failed+0xe/0x10 [ 2098.896528] ? rwsem_down_write_failed+0xe/0x10 [ 2098.901218] call_rwsem_down_write_failed+0x17/0x30 [ 2098.906267] down_write+0xa5/0x130 [ 2098.911182] ? process_measurement+0x190f/0x1bf0 [ 2098.915965] ? down_read+0x1d0/0x1d0 [ 2098.919863] ? ima_get_action+0x7e/0xa0 [ 2098.923863] process_measurement+0x190f/0x1bf0 [ 2098.928643] ? zap_class+0x640/0x640 [ 2098.932389] ? ima_add_template_entry.cold.4+0x3c/0x3c [ 2098.937853] ? dput.part.26+0x26d/0x790 [ 2098.941845] ? dquot_get_next_dqblk+0x180/0x180 [ 2098.946741] ? shrink_dcache_sb+0x350/0x350 [ 2098.951094] ? find_held_lock+0x36/0x1c0 [ 2098.955173] ? selinux_task_getsecid+0x1f9/0x3a0 [ 2098.960131] ? lock_downgrade+0x900/0x900 [ 2098.964295] ? check_preemption_disabled+0x48/0x200 [ 2098.969502] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2098.975325] ? kasan_check_read+0x11/0x20 [ 2098.979657] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2098.984954] ? rcu_bh_qs+0xc0/0xc0 [ 2098.988716] ? selinux_task_getsecid+0x220/0x3a0 [ 2098.993490] ? selinux_socket_sock_rcv_skb+0x820/0x820 [ 2098.998944] ? ext4_file_read_iter+0x3c0/0x3c0 [ 2099.003557] ima_file_check+0xe5/0x130 [ 2099.007627] ? process_measurement+0x1bf0/0x1bf0 [ 2099.012400] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2099.017825] path_openat+0x134d/0x5160 [ 2099.021732] ? zap_class+0x640/0x640 [ 2099.025485] ? path_lookupat.isra.43+0xc00/0xc00 [ 2099.030474] ? expand_files.part.8+0x571/0x9a0 [ 2099.035096] ? __alloc_fd+0x347/0x6e0 [ 2099.040200] ? lock_downgrade+0x900/0x900 [ 2099.044366] ? getname+0x19/0x20 [ 2099.047911] ? kasan_check_read+0x11/0x20 [ 2099.052076] ? do_raw_spin_unlock+0xa7/0x2f0 [ 2099.056698] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 2099.061297] ? __lock_is_held+0xb5/0x140 [ 2099.065380] ? _raw_spin_unlock+0x2c/0x50 [ 2099.069897] ? __alloc_fd+0x347/0x6e0 [ 2099.073717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2099.079470] do_filp_open+0x255/0x380 [ 2099.083292] ? may_open_dev+0x100/0x100 [ 2099.087493] ? strncpy_from_user+0x3be/0x510 [ 2099.091932] ? digsig_verify+0x1530/0x1530 [ 2099.096185] ? get_unused_fd_flags+0x122/0x1a0 [ 2099.100981] ? getname_flags+0x26e/0x5a0 [ 2099.105062] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2099.110792] do_sys_open+0x568/0x700 [ 2099.114533] ? filp_open+0x80/0x80 [ 2099.118299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2099.123859] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2099.129518] __x64_sys_openat+0x9d/0x100 [ 2099.133602] do_syscall_64+0x1b9/0x820 [ 2099.137656] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2099.143044] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2099.148155] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2099.153024] ? trace_hardirqs_on_caller+0x310/0x310 [ 2099.158290] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2099.163327] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2099.169674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2099.174545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2099.179911] RIP: 0033:0x457519 [ 2099.183116] Code: Bad RIP value. [ 2099.186640] RSP: 002b:00007f5910e9bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2099.194366] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457519 [ 2099.201875] RDX: 000000000000275a RSI: 0000000020000080 RDI: ffffffffffffff9c [ 2099.209310] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2099.216725] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5910e9c6d4 [ 2099.224016] R13: 00000000004c2ac5 R14: 00000000004d40e0 R15: 00000000ffffffff [ 2099.231558] INFO: task syz-executor1:793 blocked for more than 140 seconds. [ 2099.238885] Not tainted 4.19.0-rc7+ #59 [ 2099.243388] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2099.251631] syz-executor1 D23752 793 7407 0x00000004 [ 2099.257467] Call Trace: [ 2099.260098] __schedule+0x86c/0x1ed0 [ 2099.263832] ? perf_trace_lock+0x14d/0x7a0 [ 2099.268311] ? __sched_text_start+0x8/0x8 [ 2099.272487] ? zap_class+0x640/0x640 [ 2099.276214] ? graph_lock+0x170/0x170 [ 2099.280316] ? print_usage_bug+0xc0/0xc0 [ 2099.284399] ? graph_lock+0x170/0x170 [ 2099.288435] ? find_held_lock+0x36/0x1c0 [ 2099.292533] schedule+0xfe/0x460 [ 2099.295916] ? __schedule+0x1ed0/0x1ed0 [ 2099.301247] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2099.305854] ? trace_hardirqs_on+0xbd/0x310 [ 2099.310473] ? kasan_check_read+0x11/0x20 [ 2099.314654] ? __rwsem_down_write_failed_common+0x8db/0x1670 [ 2099.320680] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2099.326164] ? kasan_check_write+0x14/0x20 [ 2099.330647] ? do_raw_spin_lock+0xc1/0x200 [ 2099.334912] __rwsem_down_write_failed_common+0xbb9/0x1670 [ 2099.340758] ? rwsem_spin_on_owner+0xa30/0xa30 [ 2099.345366] ? check_preemption_disabled+0x48/0x200 [ 2099.350660] ? debug_smp_processor_id+0x1c/0x20 [ 2099.355365] ? perf_trace_lock+0x14d/0x7a0 [ 2099.359843] ? mark_held_locks+0x130/0x130 [ 2099.364104] ? __lock_acquire+0x7ec/0x4ec0 [ 2099.368564] ? graph_lock+0x170/0x170 [ 2099.372386] ? __lock_acquire+0x7ec/0x4ec0 [ 2099.376839] ? find_held_lock+0x36/0x1c0 [ 2099.381432] ? ima_match_policy+0x848/0x1560 [ 2099.385871] ? lock_downgrade+0x900/0x900 [ 2099.390385] ? check_preemption_disabled+0x48/0x200 [ 2099.395427] ? graph_lock+0x170/0x170 [ 2099.399470] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2099.405289] ? kasan_check_read+0x11/0x20 [ 2099.409668] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2099.414969] ? rcu_bh_qs+0xc0/0xc0 [ 2099.418828] ? lock_acquire+0x1ed/0x520 [ 2099.422824] ? process_measurement+0xc3e/0x1bf0 [ 2099.428823] ? lock_release+0x970/0x970 [ 2099.432907] ? arch_local_save_flags+0x40/0x40 [ 2099.437686] ? ima_lsm_rule_init+0x1c0/0x1c0 [ 2099.442122] rwsem_down_write_failed+0xe/0x10 [ 2099.446821] ? rwsem_down_write_failed+0xe/0x10 [ 2099.451513] call_rwsem_down_write_failed+0x17/0x30 [ 2099.456787] down_write+0xa5/0x130 [ 2099.460380] ? process_measurement+0xc3e/0x1bf0 [ 2099.465064] ? down_read+0x1d0/0x1d0 [ 2099.469015] ? ima_get_action+0x7e/0xa0 [ 2099.473012] process_measurement+0xc3e/0x1bf0 [ 2099.477691] ? zap_class+0x640/0x640 [ 2099.481434] ? ima_add_template_entry.cold.4+0x3c/0x3c [ 2099.487185] ? dput.part.26+0x26d/0x790 [ 2099.491187] ? dquot_get_next_dqblk+0x180/0x180 [ 2099.495882] ? shrink_dcache_sb+0x350/0x350 [ 2099.500465] ? find_held_lock+0x36/0x1c0 [ 2099.504553] ? selinux_task_getsecid+0x1f9/0x3a0 [ 2099.509531] ? lock_downgrade+0x900/0x900 [ 2099.513703] ? check_preemption_disabled+0x48/0x200 [ 2099.518967] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2099.524787] ? kasan_check_read+0x11/0x20 [ 2099.529148] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2099.534447] ? rcu_bh_qs+0xc0/0xc0 [ 2099.538205] ? selinux_task_getsecid+0x220/0x3a0 [ 2099.542989] ? selinux_socket_sock_rcv_skb+0x820/0x820 [ 2099.548671] ? ext4_file_read_iter+0x3c0/0x3c0 [ 2099.553310] ima_file_check+0xe5/0x130 [ 2099.558620] ? process_measurement+0x1bf0/0x1bf0 [ 2099.563403] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 2099.568827] path_openat+0x134d/0x5160 [ 2099.572740] ? zap_class+0x640/0x640 [ 2099.576675] ? path_lookupat.isra.43+0xc00/0xc00 [ 2099.581467] ? expand_files.part.8+0x571/0x9a0 [ 2099.586083] ? __alloc_fd+0x347/0x6e0 [ 2099.590112] ? lock_downgrade+0x900/0x900 [ 2099.594287] ? getname+0x19/0x20 [ 2099.597913] ? kasan_check_read+0x11/0x20 [ 2099.602086] ? do_raw_spin_unlock+0xa7/0x2f0 [ 2099.606685] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 2099.611286] ? __lock_is_held+0xb5/0x140 [ 2099.615367] ? _raw_spin_unlock+0x2c/0x50 [ 2099.619747] ? __alloc_fd+0x347/0x6e0 [ 2099.623573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2099.629385] do_filp_open+0x255/0x380 [ 2099.633212] ? may_open_dev+0x100/0x100 [ 2099.637388] ? strncpy_from_user+0x3be/0x510 [ 2099.641829] ? digsig_verify+0x1530/0x1530 [ 2099.646082] ? get_unused_fd_flags+0x122/0x1a0 [ 2099.650903] ? getname_flags+0x26e/0x5a0 [ 2099.654982] ? put_timespec64+0x10f/0x1b0 [ 2099.659392] do_sys_open+0x568/0x700 [ 2099.663136] ? filp_open+0x80/0x80 [ 2099.666935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2099.672331] __x64_sys_creat+0x61/0x80 [ 2099.676242] do_syscall_64+0x1b9/0x820 [ 2099.680397] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2099.685788] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2099.692101] ? trace_hardirqs_on_caller+0x310/0x310 [ 2099.697309] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2099.702343] ? recalc_sigpending_tsk+0x180/0x180 [ 2099.707327] ? kasan_check_write+0x14/0x20 [ 2099.711592] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2099.716650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2099.721857] RIP: 0033:0x457519 [ 2099.725062] Code: Bad RIP value. [ 2099.728693] RSP: 002b:00007f5910e7ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 2099.736607] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457519 [ 2099.743897] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00000000200001c0 [ 2099.751400] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 2099.758864] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5910e7b6d4 [ 2099.766154] R13: 00000000004bdae2 R14: 00000000004cc628 R15: 00000000ffffffff [ 2099.773688] INFO: task syz-executor1:794 blocked for more than 140 seconds. [ 2099.781027] Not tainted 4.19.0-rc7+ #59 [ 2099.785533] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2099.793716] syz-executor1 D26088 794 7407 0x00000004 [ 2099.799551] Call Trace: [ 2099.802166] __schedule+0x86c/0x1ed0 [ 2099.805888] ? perf_trace_lock+0x14d/0x7a0 [ 2099.810384] ? __sched_text_start+0x8/0x8 [ 2099.814578] ? graph_lock+0x170/0x170 [ 2099.819791] ? print_usage_bug+0xc0/0xc0 [ 2099.823906] ? find_held_lock+0x36/0x1c0 [ 2099.828237] schedule+0xfe/0x460 [ 2099.831636] ? __schedule+0x1ed0/0x1ed0 [ 2099.835631] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2099.840495] ? trace_hardirqs_on+0xbd/0x310 [ 2099.844844] ? kasan_check_read+0x11/0x20 [ 2099.849276] ? __rwsem_down_write_failed_common+0x8db/0x1670 [ 2099.855136] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2099.860848] ? kasan_check_write+0x14/0x20 [ 2099.865130] ? do_raw_spin_lock+0xc1/0x200 [ 2099.869640] __rwsem_down_write_failed_common+0xbb9/0x1670 [ 2099.875314] ? rwsem_spin_on_owner+0xa30/0xa30 [ 2099.880168] ? mark_held_locks+0x130/0x130 [ 2099.884433] ? perf_trace_lock+0x14d/0x7a0 [ 2099.888980] ? mark_held_locks+0x130/0x130 [ 2099.893254] ? __lock_acquire+0x7ec/0x4ec0 [ 2099.897713] ? graph_lock+0x170/0x170 [ 2099.901545] ? print_usage_bug+0xc0/0xc0 [ 2099.905630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2099.911441] ? check_preemption_disabled+0x48/0x200 [ 2099.916695] ? debug_smp_processor_id+0x1c/0x20 [ 2099.921396] ? perf_trace_lock+0x14d/0x7a0 [ 2099.925646] ? find_held_lock+0x36/0x1c0 [ 2099.930052] ? graph_lock+0x170/0x170 [ 2099.933883] ? __lock_acquire+0x7ec/0x4ec0 [ 2099.938373] ? mark_held_locks+0x130/0x130 [ 2099.942639] ? graph_lock+0x170/0x170 [ 2099.947792] ? debug_smp_processor_id+0x1c/0x20 [ 2099.952523] ? lock_acquire+0x1ed/0x520 [ 2099.956769] ? ext4_fallocate+0x921/0x2300 [ 2099.961037] ? lock_release+0x970/0x970 [ 2099.965027] ? arch_local_save_flags+0x40/0x40 [ 2099.969858] rwsem_down_write_failed+0xe/0x10 [ 2099.974385] ? rwsem_down_write_failed+0xe/0x10 [ 2099.979316] call_rwsem_down_write_failed+0x17/0x30 [ 2099.984369] down_write+0xa5/0x130 [ 2099.988171] ? ext4_fallocate+0x921/0x2300 [ 2099.992434] ? down_read+0x1d0/0x1d0 [ 2099.996185] ext4_fallocate+0x921/0x2300 [ 2100.000512] ? __fget+0x4d1/0x740 [ 2100.004010] ? ext4_insert_range+0x1410/0x1410 [ 2100.008823] ? graph_lock+0x170/0x170 [ 2100.012652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2100.018422] ? check_preemption_disabled+0x48/0x200 [ 2100.023476] ? check_preemption_disabled+0x48/0x200 [ 2100.028766] ? __lock_is_held+0xb5/0x140 [ 2100.032869] ? rcu_read_lock_sched_held+0x108/0x120 [ 2100.038121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2100.043689] ? __sb_start_write+0x1b2/0x370 [ 2100.048238] ? ext4_insert_range+0x1410/0x1410 [ 2100.052852] vfs_fallocate+0x4b4/0x940 [ 2100.057009] ksys_fallocate+0x56/0x90 [ 2100.060832] __x64_sys_fallocate+0x97/0xf0 [ 2100.065083] do_syscall_64+0x1b9/0x820 [ 2100.069210] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2100.074604] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2100.080853] ? trace_hardirqs_on_caller+0x310/0x310 [ 2100.085892] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2100.091117] ? recalc_sigpending_tsk+0x180/0x180 [ 2100.095892] ? kasan_check_write+0x14/0x20 [ 2100.100375] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2100.105252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2100.110827] RIP: 0033:0x457519 [ 2100.114152] Code: Bad RIP value. [ 2100.117683] RSP: 002b:00007f5910e59c78 EFLAGS: 00000246 ORIG_RAX: 000000000000011d [ 2100.125415] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457519 [ 2100.132954] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 2100.140399] RBP: 000000000072c0e0 R08: 0000000000000000 R09: 0000000000000000 [ 2100.147829] R10: 0000000000007fff R11: 0000000000000246 R12: 00007f5910e5a6d4 [ 2100.155114] R13: 00000000004bdbbb R14: 00000000004cc808 R15: 00000000ffffffff [ 2100.162630] INFO: task syz-executor0:766 blocked for more than 140 seconds. [ 2100.169897] Not tainted 4.19.0-rc7+ #59 [ 2100.174400] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2100.182579] syz-executor0 D20600 766 5526 0x00000004 [ 2100.188501] Call Trace: [ 2100.191114] __schedule+0x86c/0x1ed0 [ 2100.194838] ? perf_trace_lock+0x14d/0x7a0 [ 2100.199321] ? __sched_text_start+0x8/0x8 [ 2100.203497] ? mark_held_locks+0xc7/0x130 [ 2100.208944] ? graph_lock+0x170/0x170 [ 2100.212763] ? graph_lock+0x170/0x170 [ 2100.216746] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2100.221348] ? trace_hardirqs_on+0xbd/0x310 [ 2100.225682] ? prepare_to_wait+0x1b3/0x3f0 [ 2100.230219] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2100.235704] ? find_held_lock+0x36/0x1c0 [ 2100.239965] schedule+0xfe/0x460 [ 2100.243352] ? wait_transaction_locked+0x206/0x310 [ 2100.248669] ? __schedule+0x1ed0/0x1ed0 [ 2100.252671] ? lock_release+0x970/0x970 [ 2100.256882] wait_transaction_locked+0x24d/0x310 [ 2100.261664] ? ext4_init_security+0x40/0x40 [ 2100.266025] ? find_held_lock+0x36/0x1c0 [ 2100.270302] ? finish_wait+0x430/0x430 [ 2100.274227] add_transaction_credits+0x538/0xe50 [ 2100.279188] ? find_held_lock+0x36/0x1c0 [ 2100.283285] ? sub_reserved_credits+0x50/0x50 [ 2100.288028] ? is_bpf_text_address+0xac/0x170 [ 2100.292549] ? lock_downgrade+0x900/0x900 [ 2100.296877] ? check_preemption_disabled+0x48/0x200 [ 2100.301921] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2100.307905] ? kasan_check_read+0x11/0x20 [ 2100.312075] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2100.317550] ? rcu_bh_qs+0xc0/0xc0 [ 2100.321110] ? rcu_bh_qs+0xc0/0xc0 [ 2100.324656] ? unwind_dump+0x190/0x190 [ 2100.328825] ? is_bpf_text_address+0xd3/0x170 [ 2100.333347] ? lock_acquire+0x1ed/0x520 [ 2100.338636] ? start_this_handle+0x2a8/0x1250 [ 2100.343191] ? __save_stack_trace+0x8d/0xf0 [ 2100.347715] ? lock_release+0x970/0x970 [ 2100.351715] ? save_stack+0xa9/0xd0 [ 2100.355351] ? kasan_check_write+0x14/0x20 [ 2100.359855] start_this_handle+0x41f/0x1250 [ 2100.364197] ? __handle_mm_fault+0x35ca/0x53e0 [ 2100.368995] ? jbd2_journal_free_reserved+0x110/0x110 [ 2100.374213] ? graph_lock+0x170/0x170 [ 2100.378770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2100.384330] ? check_preemption_disabled+0x48/0x200 [ 2100.389608] ? check_preemption_disabled+0x48/0x200 [ 2100.394660] ? __lock_is_held+0xb5/0x140 [ 2100.398917] ? rcu_read_lock_sched_held+0x108/0x120 [ 2100.403959] ? kmem_cache_alloc+0x33a/0x730 [ 2100.408496] jbd2__journal_start+0x3c9/0xa90 [ 2100.412952] ? arch_local_save_flags+0x40/0x40 [ 2100.417764] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 2100.423511] ? __might_sleep+0x95/0x190 [ 2100.427746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2100.433313] __ext4_journal_start_sb+0x1a5/0x5f0 [ 2100.438286] ? ext4_dirty_inode+0x62/0xc0 [ 2100.442465] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 2100.448407] ? __lock_is_held+0xb5/0x140 [ 2100.452510] ? ext4_setattr+0x28f0/0x28f0 [ 2100.456908] ext4_dirty_inode+0x62/0xc0 [ 2100.460913] __mark_inode_dirty+0x7c3/0x1510 [ 2100.465336] ? __lock_page_or_retry+0xa00/0xa00 [ 2100.471494] ? __inode_attach_wb+0x13f0/0x13f0 [ 2100.476101] ? find_held_lock+0x36/0x1c0 [ 2100.480406] ? mark_held_locks+0xc7/0x130 [ 2100.484592] ? ktime_get_coarse_real_ts64+0x288/0x3b0 [ 2100.490022] ? ktime_get_coarse_real_ts64+0x288/0x3b0 [ 2100.495238] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2100.500073] ? trace_hardirqs_on+0xbd/0x310 [ 2100.504415] ? current_time+0x72/0x1b0 [ 2100.509554] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2100.515041] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2100.520279] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 2100.525494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2100.531236] ? timespec64_trunc+0xea/0x180 [ 2100.535491] ? inode_init_owner+0x340/0x340 [ 2100.540055] generic_update_time+0x26a/0x450 [ 2100.544492] ? file_remove_privs+0x540/0x540 [ 2100.549089] ? preempt_count_add+0x7d/0x160 [ 2100.553460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2100.559182] ? mnt_clone_write+0x10a/0x160 [ 2100.563447] ? file_remove_privs+0x540/0x540 [ 2100.568049] file_update_time+0x390/0x640 [ 2100.572236] ? current_time+0x1b0/0x1b0 [ 2100.576231] ? rcu_read_lock_sched_held+0x108/0x120 [ 2100.581507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2100.587238] ? __sb_start_write+0x1b2/0x370 [ 2100.591587] ext4_page_mkwrite+0x1fe/0x14a0 [ 2100.595930] ? ext4_change_inode_journal_flag+0x3e0/0x3e0 [ 2100.602788] ? up_read+0x1a/0x110 [ 2100.606262] ? ext4_filemap_fault+0x8d/0xad [ 2100.610818] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2100.616528] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2100.622083] ? unlock_page+0x2c2/0x4c0 [ 2100.625986] do_page_mkwrite+0x14e/0x660 [ 2100.630265] ? lock_page+0x170/0x170 [ 2100.633997] ? add_mm_counter_fast+0xd0/0xd0 [ 2100.638601] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2100.644166] __handle_mm_fault+0x35ca/0x53e0 [ 2100.648795] ? zap_class+0x640/0x640 [ 2100.652539] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 2100.657567] ? graph_lock+0x170/0x170 [ 2100.661385] ? print_usage_bug+0xc0/0xc0 [ 2100.665461] ? graph_lock+0x170/0x170 [ 2100.669471] ? graph_lock+0x170/0x170 [ 2100.673313] ? handle_mm_fault+0x42a/0xc70 [ 2100.677983] ? lock_downgrade+0x900/0x900 [ 2100.682153] ? check_preemption_disabled+0x48/0x200 [ 2100.687392] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2100.693205] ? kasan_check_read+0x11/0x20 [ 2100.697554] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2100.702853] ? rcu_bh_qs+0xc0/0xc0 [ 2100.706574] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2100.712043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2100.717829] ? check_preemption_disabled+0x48/0x200 [ 2100.722887] handle_mm_fault+0x54f/0xc70 [ 2100.728270] ? __handle_mm_fault+0x53e0/0x53e0 [ 2100.732877] ? find_vma+0x34/0x190 [ 2100.736611] __do_page_fault+0x67d/0xed0 [ 2100.740701] ? mm_fault_error+0x380/0x380 [ 2100.744860] ? trace_hardirqs_off+0xb8/0x310 [ 2100.749544] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2100.754931] ? trace_hardirqs_on+0x310/0x310 [ 2100.759549] do_page_fault+0xf2/0x7e0 [ 2100.763370] ? vmalloc_sync_all+0x30/0x30 [ 2100.767688] ? error_entry+0x70/0xd0 [ 2100.771420] ? trace_hardirqs_off_caller+0xbb/0x310 [ 2100.776631] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2100.781579] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2100.786726] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2100.791586] ? trace_hardirqs_on_caller+0x310/0x310 [ 2100.796785] ? trace_hardirqs_off+0x310/0x310 [ 2100.801305] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2100.806507] ? page_fault+0x8/0x30 [ 2100.810071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2100.814931] ? page_fault+0x8/0x30 [ 2100.818709] page_fault+0x1e/0x30 [ 2100.822175] RIP: 0033:0x4016a7 [ 2100.825376] Code: 20 48 80 98 80 44 00 90 42 58 0a 83 04 01 a5 85 20 01 00 90 81 99 61 00 72 ac a8 55 10 03 02 00 0b 27 10 06 00 00 08 04 2a 00 <02> 00 81 02 82 80 ca 04 24 00 54 00 07 02 24 01 00 10 02 02 42 29 [ 2100.844537] RSP: 002b:00007ffd7d13ffb0 EFLAGS: 00010287 [ 2100.850122] RAX: 0000001b2d127000 RBX: 0000000070f499d3 RCX: 0000001b2e120000 [ 2100.858708] RDX: 0000001b2d127004 RSI: 0000000000000a8d RDI: 00000000a0272a8a [ 2100.865994] RBP: 00000000000001cf R08: 00000000a0272a8e R09: 0000000000000000 [ 2100.873530] R10: 00007ffd7d140140 R11: 0000000000000246 R12: 000000000072c2c0 [ 2100.881008] R13: 00007efc3820b004 R14: 00007efc3820b000 R15: 000000000000488e [ 2100.888488] INFO: task syz-executor0:777 blocked for more than 140 seconds. [ 2100.895602] Not tainted 4.19.0-rc7+ #59 [ 2100.900284] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2100.908429] syz-executor0 D20520 777 5526 0x00000004 [ 2100.914091] Call Trace: [ 2100.916856] __schedule+0x86c/0x1ed0 [ 2100.920587] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2100.925715] ? __sched_text_start+0x8/0x8 [ 2100.930111] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2100.935587] ? kasan_check_write+0x14/0x20 [ 2100.940004] ? do_raw_spin_lock+0xc1/0x200 [ 2100.944271] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 2100.949566] ? prepare_to_wait_event+0x39f/0xa10 [ 2100.954354] ? prepare_to_wait_exclusive+0x480/0x480 [ 2100.959772] schedule+0xfe/0x460 [ 2100.963196] ? __schedule+0x1ed0/0x1ed0 [ 2100.967373] ? ___might_sleep+0x1ed/0x300 [ 2100.971544] ? arch_local_save_flags+0x40/0x40 [ 2100.976146] ? replenish_dl_entity.cold.55+0x36/0x36 [ 2100.981563] ? __might_sleep+0x95/0x190 [ 2100.985562] jbd2_log_wait_commit+0x312/0x490 [ 2100.991468] ? __bpf_trace_jbd2_update_log_tail+0x40/0x40 [ 2100.997194] ? ___preempt_schedule+0x16/0x18 [ 2101.001633] ? finish_wait+0x430/0x430 [ 2101.005538] ? _raw_write_unlock+0x3f/0x50 [ 2101.010019] jbd2_complete_transaction+0x188/0x1f0 [ 2101.014991] ext4_sync_file+0x1257/0x1510 [ 2101.019491] ? ext4_getfsmap+0xd70/0xd70 [ 2101.023579] ? page_endio+0xb60/0xb60 [ 2101.027695] ? current_time+0x1b0/0x1b0 [ 2101.031699] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2101.036945] ? generic_write_checks+0x382/0x5d0 [ 2101.041638] ? up_write+0x7b/0x220 [ 2101.045192] ? ext4_getfsmap+0xd70/0xd70 [ 2101.049507] vfs_fsync_range+0x140/0x220 [ 2101.053597] ext4_file_write_iter+0x692/0x1420 [ 2101.058464] ? ext4_file_mmap+0x410/0x410 [ 2101.062637] ? __lock_is_held+0xb5/0x140 [ 2101.066908] ? lock_downgrade+0x900/0x900 [ 2101.071079] ? ___might_sleep+0x1ed/0x300 [ 2101.075244] ? arch_local_save_flags+0x40/0x40 [ 2101.080061] ? usercopy_warn+0x110/0x110 [ 2101.084139] ? __fget+0x4aa/0x740 [ 2101.087840] ? __might_sleep+0x95/0x190 [ 2101.091834] ? graph_lock+0x170/0x170 [ 2101.095653] do_iter_readv_writev+0x8b0/0xa80 [ 2101.100426] ? vfs_dedupe_file_range+0x670/0x670 [ 2101.105220] ? rw_verify_area+0x118/0x360 [ 2101.109628] do_iter_write+0x185/0x5f0 [ 2101.113539] ? rcu_read_lock_sched_held+0x108/0x120 [ 2101.119898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2101.125474] vfs_writev+0x1f1/0x360 [ 2101.129380] ? vfs_iter_write+0xb0/0xb0 [ 2101.133379] ? lock_release+0x970/0x970 [ 2101.137567] ? arch_local_save_flags+0x40/0x40 [ 2101.142181] ? fget_raw+0x20/0x20 [ 2101.145657] ? kasan_check_read+0x11/0x20 [ 2101.150200] ? _copy_to_user+0xc8/0x110 [ 2101.154204] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2101.159998] ? put_timespec64+0x10f/0x1b0 [ 2101.164175] do_pwritev+0x1cc/0x280 [ 2101.167995] ? do_writev+0x310/0x310 [ 2101.171725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2101.177495] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2101.182880] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2101.188554] __x64_sys_pwritev+0x9a/0xf0 [ 2101.192640] do_syscall_64+0x1b9/0x820 [ 2101.196751] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2101.202140] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2101.207268] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2101.212132] ? trace_hardirqs_on_caller+0x310/0x310 [ 2101.217357] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2101.222408] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2101.227732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2101.232612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2101.238049] RIP: 0033:0x457519 [ 2101.241264] Code: Bad RIP value. [ 2101.244646] RSP: 002b:00007efc37009c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 2101.253763] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457519 [ 2101.261269] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000004 [ 2101.268756] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2101.276047] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efc3700a6d4 [ 2101.283613] R13: 00000000004c3145 R14: 00000000004d4bf0 R15: 00000000ffffffff [ 2101.291141] [ 2101.291141] Showing all locks held in the system: [ 2101.297669] 1 lock held by khungtaskd/983: [ 2101.301911] #0: 00000000b309097d (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 2101.310827] 3 locks held by rs:main Q:Reg/5361: [ 2101.315507] #0: 0000000002140676 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 2101.323782] #1: 00000000b3fc3197 (sb_writers#4){.+.+}, at: vfs_write+0x42a/0x560 [ 2101.331664] #2: 00000000d61d8991 (&sb->s_type->i_mutex_key#9){++++}, at: ext4_file_write_iter+0x2a1/0x1420 [ 2101.341824] 1 lock held by rsyslogd/5364: [ 2101.345986] #0: 000000003acbbbe0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 2101.354301] 2 locks held by getty/5485: [ 2101.358438] #0: 0000000061304fc4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2101.366916] #1: 00000000bd20a9e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2101.375912] 2 locks held by getty/5486: [ 2101.381784] #0: 000000001fe79be4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2101.390324] #1: 0000000046e4f298 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2101.399440] 2 locks held by getty/5487: [ 2101.403435] #0: 000000008bc7fe7c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2101.411933] #1: 00000000cab093a6 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2101.421039] 2 locks held by getty/5488: [ 2101.425021] #0: 00000000ae093df6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2101.433577] #1: 000000004247bc96 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2101.442669] 2 locks held by getty/5489: [ 2101.446822] #0: 00000000909f5bb7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2101.455118] #1: 0000000071cabd6f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2101.464236] 2 locks held by getty/5490: [ 2101.468358] #0: 00000000aa301693 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2101.476792] #1: 00000000bda7cbab (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2101.485696] 2 locks held by getty/5491: [ 2101.489899] #0: 000000005f4786cf (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 2101.498356] #1: 0000000086afee3e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1ce0 [ 2101.508550] 2 locks held by syz-executor3/5586: [ 2101.513230] #0: 000000004709540c (&type->i_mutex_dir_key#3){++++}, at: iterate_dir+0xd8/0x5d0 [ 2101.522239] #1: 00000000b3fc3197 (sb_writers#4){.+.+}, at: touch_atime+0x16c/0x320 [ 2101.530264] 2 locks held by syz-executor4/5632: [ 2101.534935] #0: 00000000ce68cdc5 (&type->i_mutex_dir_key#3){++++}, at: iterate_dir+0xd8/0x5d0 [ 2101.543960] #1: 00000000b3fc3197 (sb_writers#4){.+.+}, at: touch_atime+0x16c/0x320 [ 2101.552105] 1 lock held by syz-executor1/8071: [ 2101.556817] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.565113] 1 lock held by syz-executor0/8086: [ 2101.569864] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.578316] 1 lock held by syz-executor1/8112: [ 2101.582900] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.591405] 1 lock held by syz-executor1/8160: [ 2101.595999] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.604464] 1 lock held by syz-executor5/8282: [ 2101.609188] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.617620] 1 lock held by syz-executor0/8363: [ 2101.622206] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.630679] 1 lock held by syz-executor0/8681: [ 2101.635267] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.644887] 1 lock held by syz-executor0/8701: [ 2101.649617] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.658049] 1 lock held by syz-executor0/24534: [ 2101.662725] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.671173] 1 lock held by syz-executor5/2965: [ 2101.675760] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.684206] 1 lock held by syz-executor2/8060: [ 2101.689036] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.697492] 1 lock held by syz-executor5/8139: [ 2101.702090] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.710572] 1 lock held by syz-executor1/8207: [ 2101.715165] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.723637] 4 locks held by kworker/u4:5/9041: [ 2101.728366] #0: 00000000637425ae ((wq_completion)"writeback"){+.+.}, at: process_one_work+0xb43/0x1b90 [ 2101.738097] #1: 000000000fec27b8 ((work_completion)(&(&wb->dwork)->work)){+.+.}, at: process_one_work+0xb9a/0x1b90 [ 2101.748914] #2: 00000000e844fd95 (&type->s_umount_key#45){++++}, at: trylock_super+0x22/0x110 [ 2101.757905] #3: 00000000f3d10cdc (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0x9a/0x1a0 [ 2101.768350] 1 lock held by syz-executor2/20263: [ 2101.773022] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.781523] 1 lock held by syz-executor2/20634: [ 2101.786209] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.794724] 1 lock held by syz-executor2/20651: [ 2101.799592] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.808033] 1 lock held by syz-executor2/20661: [ 2101.812709] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.821165] 1 lock held by syz-executor2/20675: [ 2101.825837] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.834301] 1 lock held by syz-executor2/20683: [ 2101.839109] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.847542] 1 lock held by syz-executor2/20695: [ 2101.852214] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.860733] 1 lock held by syz-executor2/20731: [ 2101.865404] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.873875] 1 lock held by syz-executor2/20736: [ 2101.878686] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.887154] 1 lock held by syz-executor2/20742: [ 2101.891840] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.901486] 1 lock held by syz-executor2/20780: [ 2101.906169] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.914651] 1 lock held by syz-executor2/20815: [ 2101.919479] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.927924] 1 lock held by syz-executor2/20824: [ 2101.932596] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.941054] 1 lock held by syz-executor2/20833: [ 2101.945725] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.954251] 1 lock held by syz-executor2/20850: [ 2101.959065] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.967502] 1 lock held by syz-executor2/20859: [ 2101.972177] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.980635] 1 lock held by syz-executor2/20864: [ 2101.985324] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2101.993781] 1 lock held by syz-executor2/20871: [ 2101.998647] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.007081] 1 lock held by syz-executor2/20893: [ 2102.011756] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.020259] 1 lock held by syz-executor2/20903: [ 2102.024931] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.034543] 1 lock held by syz-executor2/20916: [ 2102.039383] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.047826] 1 lock held by syz-executor2/20927: [ 2102.052497] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.061009] 1 lock held by syz-executor2/20938: [ 2102.065681] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.074157] 1 lock held by syz-executor2/21476: [ 2102.078975] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.087494] 1 lock held by syz-executor1/23818: [ 2102.092170] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.100726] 1 lock held by syz-executor1/23844: [ 2102.105404] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.113898] 1 lock held by syz-executor1/24038: [ 2102.118721] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.127169] 1 lock held by syz-executor1/24067: [ 2102.131841] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.140315] 1 lock held by syz-executor1/25870: [ 2102.144992] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.153774] 1 lock held by syz-executor2/31247: [ 2102.159724] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.168175] 1 lock held by syz-executor2/31321: [ 2102.172847] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.181324] 1 lock held by syz-executor2/31337: [ 2102.185998] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.194634] 1 lock held by syz-executor2/31423: [ 2102.199536] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.207982] 1 lock held by syz-executor2/31460: [ 2102.212655] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.221141] 1 lock held by syz-executor2/31497: [ 2102.225820] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.234313] 1 lock held by syz-executor2/31615: [ 2102.239134] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.247836] 1 lock held by syz-executor2/31670: [ 2102.252519] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.261058] 1 lock held by syz-executor2/31717: [ 2102.265736] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.274302] 1 lock held by syz-executor2/31763: [ 2102.279152] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.288730] 1 lock held by syz-executor1/8422: [ 2102.293316] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.301849] 1 lock held by syz-executor2/8993: [ 2102.306590] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.314894] 1 lock held by syz-executor5/25111: [ 2102.319755] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.328201] 1 lock held by syz-executor1/25223: [ 2102.332882] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.341344] 1 lock held by syz-executor1/25234: [ 2102.346016] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.354530] 1 lock held by syz-executor1/25370: [ 2102.359348] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.367777] 1 lock held by syz-executor5/28476: [ 2102.372458] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.381436] 1 lock held by syz-executor5/28508: [ 2102.386120] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.394590] 1 lock held by syz-executor5/28553: [ 2102.399402] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.408512] 1 lock held by syz-executor5/28563: [ 2102.413184] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.422795] 1 lock held by syz-executor5/28573: [ 2102.427617] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.435914] 1 lock held by syz-executor5/28650: [ 2102.440758] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.449204] 1 lock held by syz-executor5/28662: [ 2102.453885] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.462446] 1 lock held by syz-executor5/28714: [ 2102.467282] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.475580] 1 lock held by syz-executor5/28724: [ 2102.480431] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.488902] 1 lock held by syz-executor5/28747: [ 2102.493583] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.502044] 1 lock held by syz-executor5/28828: [ 2102.507506] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.515804] 1 lock held by syz-executor5/28840: [ 2102.520672] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.529125] 1 lock held by syz-executor5/28906: [ 2102.533797] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.542304] 1 lock held by syz-executor5/29016: [ 2102.548247] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.556804] 1 lock held by syz-executor5/29029: [ 2102.561487] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.569977] 1 lock held by syz-executor5/29067: [ 2102.574653] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.583141] 1 lock held by syz-executor5/29096: [ 2102.587959] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.596268] 1 lock held by syz-executor5/29148: [ 2102.601122] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.609630] 1 lock held by syz-executor5/29158: [ 2102.614484] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.623050] 1 lock held by syz-executor5/29206: [ 2102.627910] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.636525] 1 lock held by syz-executor1/30723: [ 2102.641209] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.649763] 1 lock held by syz-executor1/30735: [ 2102.654447] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.663050] 1 lock held by syz-executor1/30821: [ 2102.667924] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.676240] 1 lock held by syz-executor1/30938: [ 2102.682290] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.690833] 1 lock held by syz-executor1/30977: [ 2102.695512] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.704034] 1 lock held by syz-executor1/31068: [ 2102.708923] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.717404] 1 lock held by syz-executor1/31087: [ 2102.722094] #0: 00000000f3d10cdc (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0x9a/0x1a0 [ 2102.731509] 1 lock held by syz-executor1/31192: [ 2102.736188] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.744749] 1 lock held by syz-executor1/31339: [ 2102.749614] #0: 00000000f3d10cdc (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0x9a/0x1a0 [ 2102.759013] 1 lock held by syz-executor1/31500: [ 2102.763693] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.772235] 1 lock held by syz-executor1/31514: [ 2102.777127] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.785440] 1 lock held by syz-executor1/31536: [ 2102.790337] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.798838] 1 lock held by syz-executor1/31668: [ 2102.803519] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.813173] 1 lock held by syz-executor1/31736: [ 2102.817993] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.826494] 1 lock held by syz-executor1/31884: [ 2102.831179] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.839705] 1 lock held by syz-executor1/31917: [ 2102.844389] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.852908] 1 lock held by syz-executor1/31941: [ 2102.857756] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.866052] 1 lock held by syz-executor1/31967: [ 2102.870874] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.879323] 1 lock held by syz-executor1/31994: [ 2102.883995] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.892479] 1 lock held by syz-executor1/32023: [ 2102.897297] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.905586] 1 lock held by syz-executor0/32072: [ 2102.910466] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.918910] 1 lock held by syz-executor1/32086: [ 2102.923586] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.932066] 1 lock held by syz-executor1/32107: [ 2102.938013] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.946466] 1 lock held by syz-executor1/32199: [ 2102.951137] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.959633] 1 lock held by syz-executor1/32224: [ 2102.964309] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.972749] 1 lock held by syz-executor1/32280: [ 2102.977558] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.986193] 1 lock held by syz-executor1/32549: [ 2102.991047] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2102.999490] 1 lock held by syz-executor1/448: [ 2103.003988] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2103.012485] 1 lock held by syz-executor1/463: [ 2103.017123] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2103.025415] 1 lock held by syz-executor1/643: [ 2103.030081] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2103.038529] 1 lock held by syz-executor1/694: [ 2103.043026] #0: 00000000f3d10cdc (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0x9a/0x1a0 [ 2103.052352] 1 lock held by syz-executor1/711: [ 2103.057037] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2103.065327] 1 lock held by syz-executor1/730: [ 2103.071113] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2103.079552] 1 lock held by syz-executor1/750: [ 2103.084071] #0: 0000000058574a90 (sb_internal){.+.+}, at: ext4_evict_inode+0x5e5/0x1ad0 [ 2103.092525] 6 locks held by syz-executor1/762: [ 2103.097256] 2 locks held by syz-executor1/767: [ 2103.101840] #0: 00000000b3fc3197 (sb_writers#4){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 2103.109988] #1: 000000006f1fd45f (&sb->s_type->i_mutex_key#9){++++}, at: process_measurement+0x190f/0x1bf0 [ 2103.120107] 2 locks held by syz-executor1/793: [ 2103.124695] #0: 00000000b3fc3197 (sb_writers#4){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 2103.132796] #1: 0000000094a7ea35 (&sb->s_type->i_mutex_key#9){++++}, at: process_measurement+0xc3e/0x1bf0 [ 2103.142811] 2 locks held by syz-executor1/794: [ 2103.147544] #0: 00000000b3fc3197 (sb_writers#4){.+.+}, at: vfs_fallocate+0x72a/0x940 [ 2103.155582] #1: 0000000094a7ea35 (&sb->s_type->i_mutex_key#9){++++}, at: ext4_fallocate+0x921/0x2300 [ 2103.165276] 2 locks held by syz-executor0/766: [ 2103.170013] #0: 00000000ca905e50 (&mm->mmap_sem){++++}, at: __do_page_fault+0x3e3/0xed0 [ 2103.178472] #1: 0000000057414b34 (sb_pagefaults){.+.+}, at: ext4_page_mkwrite+0x1d0/0x14a0 [ 2103.187182] 1 lock held by syz-executor0/777: [ 2103.191684] #0: 00000000b3fc3197 (sb_writers#4){.+.+}, at: vfs_writev+0x2bd/0x360 [ 2103.200756] 1 lock held by syz-executor0/782: [ 2103.205254] #0: 00000000f3d10cdc (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0x9a/0x1a0 [ 2103.214612] 2 locks held by syz-executor0/786: [ 2103.219433] #0: 00000000b3fc3197 (sb_writers#4){.+.+}, at: do_sys_ftruncate+0x28b/0x550 [ 2103.228053] #1: 000000008272d2a5 (&sb->s_type->i_mutex_key#9){++++}, at: do_truncate+0x1b0/0x2d0 [ 2103.237308] 3 locks held by syz-executor0/788: [ 2103.241896] #0: 000000003bfd4a26 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 2103.250086] #1: 00000000b3fc3197 (sb_writers#4){.+.+}, at: vfs_write+0x42a/0x560 [ 2103.257917] #2: 000000008272d2a5 (&sb->s_type->i_mutex_key#9){++++}, at: ext4_file_write_iter+0x30b/0x1420 [ 2103.268016] 2 locks held by syz-executor0/789: [ 2103.272601] #0: 00000000b3fc3197 (sb_writers#4){.+.+}, at: mnt_want_write_file+0x68/0x110 [ 2103.281297] #1: 000000008272d2a5 (&sb->s_type->i_mutex_key#9){++++}, at: lock_two_nondirectories+0xfb/0x120 [ 2103.291512] 1 lock held by syz-executor0/790: [ 2103.296015] #0: 000000008272d2a5 (&sb->s_type->i_mutex_key#9){++++}, at: process_measurement+0x190f/0x1bf0 [ 2103.306158] 2 locks held by syz-executor5/784: [ 2103.310895] #0: 00000000b3fc3197 (sb_writers#4){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 2103.319015] #1: 00000000467ecc8a (&type->i_mutex_dir_key#3/1){+.+.}, at: filename_create+0x1b2/0x5b0 [ 2103.329746] 2 locks held by syz-executor2/785: [ 2103.334335] #0: 00000000b3fc3197 (sb_writers#4){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 2103.342531] #1: 000000002b27246a (&type->i_mutex_dir_key#3/1){+.+.}, at: filename_create+0x1b2/0x5b0 [ 2103.352141] [ 2103.353783] ============================================= [ 2103.353783] [ 2103.360988] NMI backtrace for cpu 1 [ 2103.364635] CPU: 1 PID: 983 Comm: khungtaskd Not tainted 4.19.0-rc7+ #59 [ 2103.371487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2103.381346] Call Trace: [ 2103.383951] dump_stack+0x1c4/0x2b4 [ 2103.387597] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2103.392802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2103.398359] nmi_cpu_backtrace.cold.3+0x63/0xa2 [ 2103.403108] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 2103.408316] nmi_trigger_cpumask_backtrace+0x1b3/0x1ed [ 2103.413611] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2103.418813] watchdog+0xb3e/0x1050 [ 2103.422386] ? reset_hung_task_detector+0xd0/0xd0 [ 2103.427251] ? __kthread_parkme+0xce/0x1a0 [ 2103.431503] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2103.436620] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2103.441735] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2103.446328] ? trace_hardirqs_on+0xbd/0x310 [ 2103.450660] ? kasan_check_read+0x11/0x20 [ 2103.454817] ? __kthread_parkme+0xce/0x1a0 [ 2103.459066] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2103.464535] ? kasan_check_write+0x14/0x20 [ 2103.468783] ? do_raw_spin_lock+0xc1/0x200 [ 2103.473037] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 2103.478156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2103.483711] ? __kthread_parkme+0xfb/0x1a0 [ 2103.487968] kthread+0x35a/0x420 [ 2103.491346] ? reset_hung_task_detector+0xd0/0xd0 [ 2103.496197] ? kthread_bind+0x40/0x40 [ 2103.500017] ret_from_fork+0x3a/0x50 [ 2103.503929] Sending NMI from CPU 1 to CPUs 0: [ 2103.509758] INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 1.022 msecs [ 2103.510509] NMI backtrace for cpu 0 [ 2103.510517] CPU: 0 PID: 762 Comm: syz-executor1 Not tainted 4.19.0-rc7+ #59 [ 2103.510525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2103.510530] RIP: 0010:__sanitizer_cov_trace_pc+0x26/0x50 [ 2103.510544] Code: 5d c3 66 90 55 48 89 e5 65 48 8b 04 25 40 ee 01 00 65 8b 15 9c 14 83 7e 81 e2 00 01 1f 00 48 8b 75 08 75 2b 8b 90 d0 12 00 00 <83> fa 02 75 20 48 8b 88 d8 12 00 00 8b 80 d4 12 00 00 48 8b 11 48 [ 2103.510549] RSP: 0018:ffff8801766f71b0 EFLAGS: 00000246 [ 2103.510559] RAX: ffff8801883526c0 RBX: ffff8801b7d17680 RCX: ffffffff821e6f9a [ 2103.510566] RDX: 0000000000000002 RSI: ffffffff821e6fab RDI: 0000000000000003 [ 2103.510573] RBP: ffff8801766f71b0 R08: ffff8801883526c0 R09: 1ffffffff1273965 [ 2103.510579] R10: ffffed003b5c4732 R11: ffff8801dae23993 R12: 0000000000008008 [ 2103.510586] R13: 0000000040aeeaf6 R14: ffff880177db1670 R15: ffff8801766f73e0 [ 2103.510593] FS: 00007f5910ebd700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 2103.510599] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2103.510605] CR2: ffffffffff600400 CR3: 00000001b49e8000 CR4: 00000000001426f0 [ 2103.510612] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2103.510618] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2103.510622] Call Trace: [ 2103.510627] mext_check_coverage.constprop.13+0x26b/0x510 [ 2103.510632] ? mext_page_mkuptodate+0x12b0/0x12b0 [ 2103.510637] ext4_move_extents+0x2784/0x3c20 [ 2103.510642] ? ext4_double_up_write_data_sem+0x30/0x30 [ 2103.510646] ? __fget+0x4aa/0x740 [ 2103.510651] ? lock_downgrade+0x900/0x900 [ 2103.510656] ? check_preemption_disabled+0x48/0x200 [ 2103.510661] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2103.510666] ? kasan_check_read+0x11/0x20 [ 2103.510671] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2103.510676] ? rcu_bh_qs+0xc0/0xc0 [ 2103.510680] ? __fget+0x4d1/0x740 [ 2103.510684] ? ksys_dup3+0x680/0x680 [ 2103.510689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2103.510694] ? graph_lock+0x170/0x170 [ 2103.510698] ? check_preemption_disabled+0x48/0x200 [ 2103.510704] ? check_preemption_disabled+0x48/0x200 [ 2103.510709] ? __lock_is_held+0xb5/0x140 [ 2103.510714] ? rcu_read_lock_sched_held+0x108/0x120 [ 2103.510718] ? preempt_count_add+0x7d/0x160 [ 2103.510723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2103.510728] ? __mnt_want_write_file+0xa2/0xc0 [ 2103.510733] ext4_ioctl+0x3154/0x4210 [ 2103.510738] ? ext4_ioctl_group_add+0x560/0x560 [ 2103.510743] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2103.510748] ? kasan_check_read+0x11/0x20 [ 2103.510753] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2103.510757] ? rcu_bh_qs+0xc0/0xc0 [ 2103.510763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2103.510768] ? avc_has_extended_perms+0xab2/0x15a0 [ 2103.510773] ? avc_ss_reset+0x190/0x190 [ 2103.510778] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 2103.510782] ? kasan_check_read+0x11/0x20 [ 2103.510787] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 2103.510791] ? rcu_bh_qs+0xc0/0xc0 [ 2103.510796] ? ___might_sleep+0x1ed/0x300 [ 2103.510801] ? arch_local_save_flags+0x40/0x40 [ 2103.510805] ? __might_fault+0x12b/0x1e0 [ 2103.510810] ? lock_downgrade+0x900/0x900 [ 2103.510815] ? ext4_ioctl_group_add+0x560/0x560 [ 2103.510819] do_vfs_ioctl+0x1de/0x1720 [ 2103.510824] ? ioctl_preallocate+0x300/0x300 [ 2103.510829] ? selinux_file_mprotect+0x620/0x620 [ 2103.510834] ? kstrtobool_from_user+0xdf/0x140 [ 2103.510839] ? __sanitizer_cov_trace_const_cmp1+0x1b/0x20 [ 2103.510843] ? put_timespec64+0x10f/0x1b0 [ 2103.510848] ? nsecs_to_jiffies+0x30/0x30 [ 2103.510852] ? do_syscall_64+0x9a/0x820 [ 2103.510858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2103.510862] ? security_file_ioctl+0x94/0xc0 [ 2103.510867] ksys_ioctl+0xa9/0xd0 [ 2103.510871] __x64_sys_ioctl+0x73/0xb0 [ 2103.510876] do_syscall_64+0x1b9/0x820 [ 2103.510881] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2103.510886] ? syscall_return_slowpath+0x5e0/0x5e0 [ 2103.510891] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2103.510897] ? trace_hardirqs_on_caller+0x310/0x310 [ 2103.510902] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2103.510907] ? prepare_exit_to_usermode+0x291/0x3b0 [ 2103.510912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2103.510917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2103.510921] RIP: 0033:0x457519 [ 2103.510934] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2103.510939] RSP: 002b:00007f5910ebcc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2103.510951] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457519 [ 2103.510958] RDX: 0000000020000240 RSI: 00000000c028660f RDI: 0000000000000003 [ 2103.510964] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2103.510971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5910ebd6d4 [ 2103.510977] R13: 00000000004bf57c R14: 00000000004cf400 R15: 00000000ffffffff [ 2103.514014] Kernel panic - not syncing: hung_task: blocked tasks [ 2103.996030] CPU: 1 PID: 983 Comm: khungtaskd Not tainted 4.19.0-rc7+ #59 [ 2104.002887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2104.012263] Call Trace: [ 2104.014891] dump_stack+0x1c4/0x2b4 [ 2104.018561] ? dump_stack_print_info.cold.2+0x52/0x52 [ 2104.023799] panic+0x238/0x4e7 [ 2104.027017] ? add_taint.cold.5+0x16/0x16 [ 2104.031202] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 2104.036692] ? nmi_trigger_cpumask_backtrace+0x1c4/0x1ed [ 2104.042175] ? nmi_trigger_cpumask_backtrace+0x173/0x1ed [ 2104.047655] ? nmi_trigger_cpumask_backtrace+0x16a/0x1ed [ 2104.053142] watchdog+0xb4f/0x1050 [ 2104.056989] ? reset_hung_task_detector+0xd0/0xd0 [ 2104.061874] ? __kthread_parkme+0xce/0x1a0 [ 2104.066140] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2104.071279] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 2104.076414] ? lockdep_hardirqs_on+0x421/0x5c0 [ 2104.081057] ? trace_hardirqs_on+0xbd/0x310 [ 2104.085406] ? kasan_check_read+0x11/0x20 [ 2104.089587] ? __kthread_parkme+0xce/0x1a0 [ 2104.093859] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2104.099348] ? kasan_check_write+0x14/0x20 [ 2104.103618] ? do_raw_spin_lock+0xc1/0x200 [ 2104.107886] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 2104.113014] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2104.118580] ? __kthread_parkme+0xfb/0x1a0 [ 2104.122848] kthread+0x35a/0x420 [ 2104.126244] ? reset_hung_task_detector+0xd0/0xd0 [ 2104.131112] ? kthread_bind+0x40/0x40 [ 2104.134944] ret_from_fork+0x3a/0x50 [ 2104.139800] Kernel Offset: disabled [ 2104.143473] Rebooting in 86400 seconds..