[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.798422][ T26] audit: type=1800 audit(1569645606.641:25): pid=8738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.842884][ T26] audit: type=1800 audit(1569645606.641:26): pid=8738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 57.885723][ T26] audit: type=1800 audit(1569645606.651:27): pid=8738 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.115' (ECDSA) to the list of known hosts. 2019/09/28 04:40:16 fuzzer started 2019/09/28 04:40:18 dialing manager at 10.128.0.26:43243 2019/09/28 04:40:18 syscalls: 2496 2019/09/28 04:40:18 code coverage: enabled 2019/09/28 04:40:18 comparison tracing: enabled 2019/09/28 04:40:18 extra coverage: extra coverage is not supported by the kernel 2019/09/28 04:40:18 setuid sandbox: enabled 2019/09/28 04:40:18 namespace sandbox: enabled 2019/09/28 04:40:18 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/28 04:40:18 fault injection: enabled 2019/09/28 04:40:18 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/28 04:40:18 net packet injection: enabled 2019/09/28 04:40:18 net device setup: enabled 04:42:48 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xdc, r1, 0x400, 0xfff, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x800}, 0x400080c0) r2 = getpgrp(0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000240)=r2) r3 = syz_open_dev$audion(0xfffffffffffffffe, 0x7, 0x561200) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x101000004}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r4, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0xdc}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x81}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x401) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0xa) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f0000000400)) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000440)=0x0) getpgid(r5) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000480)={0xc3742cc2bba7b5b0, @bt={0xfffffffa, 0x5, 0x1, 0x2, 0x0, 0x4, 0xfffffffd, 0x5, 0x2, 0x1, 0x0, 0x401, 0x6, 0x7, 0x8, 0x10}}) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/qat_adf_ctl\x00', 0x18000, 0x0) ioctl$KDDISABIO(r6, 0x4b37) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x800, 0x0) r8 = syz_genetlink_get_family_id$fou(&(0x7f0000000600)='fou\x00') sendmsg$FOU_CMD_DEL(r7, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1000800}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x40, r8, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @multicast2}}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0xffffffff}]}, 0x40}, 0x1, 0x0, 0x0, 0x2004801}, 0x4) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000700)=0x5, 0x4) pwrite64(r7, &(0x7f0000000740)="a9aeb2d4dba4817fac90e11abfc19fbda7fa674ad1e47ff78bcc094af98280ccfff844d78a35d32dafbdcfeff96fb9203c7c7c911d432f9f3f3de40484a1c34bef4c3dfd38e7c247b1c417b458d1ddbfefa658c8409304", 0x57, 0x0) r9 = openat$null(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/null\x00', 0x280a00, 0x0) r10 = socket$caif_stream(0x25, 0x1, 0x3) ioctl$FICLONERANGE(r9, 0x4020940d, &(0x7f0000000800)={r10, 0x0, 0x9, 0x10001, 0x7fffffff}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer2\x00', 0x8000, 0x0) r11 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000880)='/dev/vga_arbiter\x00', 0x44000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r11, 0x8040ae9f, &(0x7f00000008c0)) r12 = pkey_alloc(0x0, 0x6) pkey_free(r12) r13 = getpid() sched_setattr(r13, &(0x7f0000000900)={0x30, 0x6, 0x1, 0x10001, 0x1f, 0x3, 0x5}, 0x0) 04:42:49 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2000) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1e) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000140)={0x9}, 0x4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x200, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4010}, 0x20044008) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000002c0)={'bridge_slave_0\x00', {0x2, 0x4e24, @rand_addr=0x10001}}) r3 = fsopen(&(0x7f0000000300)='iso9660\x00', 0x1) r4 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000340)='/dev/udmabuf\x00', 0x2) sendfile(r4, r3, &(0x7f0000000380), 0x2) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f00000003c0)=""/106) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x80, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f00000004c0)='fou\x00') sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x2c, r6, 0x400, 0x70bd27, 0x25dfdbff, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x33}, @FOU_ATTR_PEER_V4={0x8, 0x8, @empty}]}, 0x2c}, 0x1, 0x0, 0x0, 0x408c}, 0x20008000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000940)=0xe8) syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000600)='./file0\x00', 0x7fff, 0x1, &(0x7f00000006c0)=[{&(0x7f0000000640)="fd7fe0dc5ef72e0015cde5e3dd5b4c4599052e97c93eddffb5afa644cb1db8ab801da8bf9398d1807decd93f45add5bdb2fad20adccdb1abb7f4af8a755713991960402283360c5c85bc43ec1e41c9b6cd04cdbb6d38b753632b12995dba6861f32c", 0x62, 0x9}], 0x208004, &(0x7f0000000980)={[{@data_ordered='data=ordered'}, {@norecovery='norecovery'}, {@oldalloc='oldalloc'}, {@grpjquota='grpjquota='}, {@nolazytime='nolazytime'}, {@user_xattr='user_xattr'}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}, {@lazytime='lazytime'}, {@orlov='orlov'}], [{@uid_gt={'uid>', r7}}, {@measure='measure'}, {@euid_gt={'euid>'}}, {@uid_lt={'uid<', r8}}, {@audit='audit'}, {@audit='audit'}, {@subj_type={'subj_type', 0x3d, 'bridge_slave_0\x00'}}]}) r9 = openat$cgroup_ro(r0, &(0x7f0000000a80)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000ac0)='hybla\x00', 0x6) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000b00)={0xc9c4, 0x0, 0x3, {0x3, @raw_data="ad8fd356bc231d842f25437b75c792c63c80d27a8cc21350372b58aeea4487beb5fbd9d494dd332efa4128b919d07eeb02986ab6a00cfce6317f6c47e926aa234d3e5e4d19642562404eb08ae9311ce9a26b2d1be71918212b3a4ee45a3068b976f63e5406118002c7221fafaa94a06671263cc52c84247f7e87584e342b3171700549214b285756c14eea86d4eba22fe27a67e1160d913607332fdd9d6ed8197a2535ab1889b4346df9cd3140d0de53d6f820288917b12f7a7e978153517fd307f54431277d3689"}}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/ptmx\x00', 0x410080, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-monitor\x00', 0x101000, 0x0) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@remote, @in6=@loopback}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000d80)=0xe8) r11 = syz_open_dev$vcsa(&(0x7f0000000dc0)='/dev/vcsa#\x00', 0x3ff, 0x10001) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r11, 0x84, 0x21, &(0x7f0000000e00), &(0x7f0000000e40)=0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r9, 0x400c6615, &(0x7f0000000e80)) syz_open_dev$ndb(&(0x7f0000000ec0)='/dev/nbd#\x00', 0x0, 0x0) r12 = syz_open_dev$swradio(&(0x7f0000000f00)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r12, 0x12, 0x2, &(0x7f0000000f40)=""/130, &(0x7f0000001000)=0x82) syzkaller login: [ 220.146447][ T8907] IPVS: ftp: loaded support on port[0] = 21 [ 220.322190][ T8907] chnl_net:caif_netlink_parms(): no params data found [ 220.355502][ T8910] IPVS: ftp: loaded support on port[0] = 21 [ 220.389536][ T8907] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.399144][ T8907] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.408654][ T8907] device bridge_slave_0 entered promiscuous mode [ 220.418947][ T8907] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.427543][ T8907] bridge0: port 2(bridge_slave_1) entered disabled state 04:42:49 executing program 2: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000000)=""/97, 0x61, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=r0, 0x4) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x200, 0x0) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x27) r3 = msgget$private(0x0, 0x200) msgrcv(r3, &(0x7f0000000180)={0x0, ""/26}, 0x22, 0x3, 0x27573172b5a90611) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000200)={0x1, [0x0]}, &(0x7f0000000240)=0x8) r5 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x3, 0x18400) ioctl$KDGKBTYPE(r5, 0x4b33, &(0x7f00000002c0)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x9, 0x4000) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000380)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x4280, 0x0) ioctl$RNDZAPENTCNT(r6, 0x5204, &(0x7f0000000400)=0x3) r7 = dup3(0xffffffffffffffff, r4, 0x80000) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) r8 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000440)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_PARM(r8, 0xc0cc5615, &(0x7f0000000480)={0x7, @raw_data="9e0ed5626be014dcca7bf265bd46bfbea4525ed4926078224e3cecbf458fe094ab96bf1702ba060282419a9b12f99ce96dc7034357777c03ed4a676b49ec9a0d3e26ae4550ac4aa5bf0548985d83dbd4f96a9e05df47f241f98368a0dae682fcbd1b559e713d72c74f6f1e65e9eddd346710e14a65de54720b70b84e36f26115bad6ff667cc6901c7aff46d53e44b2e8c8221799c95ddef52b91fe0ceaf123a2599cd855af10a2d06092f52426ed6ffcb6b990a9038cf32a9d24b74663549a41061f8d79690b6b36"}) ioctl$KVM_GET_CLOCK(r7, 0x8030ae7c, &(0x7f0000000580)) r9 = syz_open_procfs(0x0, &(0x7f00000005c0)='net/unix\x00') getpeername$tipc(r9, &(0x7f0000000600), &(0x7f0000000640)=0x10) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ubi_ctrl\x00', 0x141800, 0x0) r11 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r10, 0x4c80, r11) write$UHID_SET_REPORT_REPLY(r8, &(0x7f00000006c0)={0xe, 0x4, 0x19, 0x2, 0x8d, "400e1857b55bf200d381b9b4c46ff3e0b6513459b947d9a67c67630111b15a28b5cb63bf118a339503c8a159f0e701de371e2e207e9d98951260829d0d5cd43f401a5d25d4fb667033220464f8249be9f70c95db256f683543d03f2b42edfc39d7451febcef0630b7dc72c5588d71a38213d34f700d728aa45f177c2aba9530f8374c8464608c95c741dc52a65"}, 0x99) r12 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000780)='/dev/autofs\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0x40042409, 0x1) fstat(r1, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002d80)='./file0\x00', &(0x7f0000002dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)=0x0) syz_mount_image$gfs2(&(0x7f00000007c0)='gfs2\x00', &(0x7f0000000800)='./file0\x00', 0x8, 0x8, &(0x7f0000002c40)=[{&(0x7f0000000840)="585b59259d3bfea7033f0aec476bd9eff96ae00bc34e82a7c4db95065258e9b663ddab892e184b0a3ec204d22da3b5f6960810ba234151e3f613cbdf58db71759bbf3654e4b25f7ef9b9948a3c5bc1ff02f2726007277b67f6ba8f9abc4ebc3bbfbb3f02d142bbe79982f26fc0cdd76b8fa7d08b807ab00c3e03426919027b1c1e2136a4426a76c026dcac8c4fa0ec0d809a01937a621004c63fe3cc1b78919fefef854d1db4ac20e24af3d8b94680b72398962c71eb76de6c5125dfd76901da8877634bf45156e433764222e4595ed08384a44b7ce8af8d8ad545877d4d7a2179a78d3949c2e0dcbea010e8783faa62", 0xf0, 0x332c}, {&(0x7f0000000940)="139281780dac727a190ade7c6234211f7dec21c07256d422e941183a447c4183bdd4108df089c3c8be00efe081b4afccb8a8abf4c10c13ee4d598eab402e64af74cee45c45a0999403e5c0660929596865205efbfeee04caa18a9ec96961090de9bfcb362b5ddee7b5793b24e66ec6d464cc53e170057c6543e358584efc8ec5b4e1740fd6c9350079ca6eba574d7a8e1300df1ba8716fd9dd79b734f148f78cc78b4f0a0fabec29900732d5021f1b0d605a5b87aaf6a44a774df13666d4a6b9e7b87098b4", 0xc5, 0x7}, {&(0x7f0000000a40)="dae07e037f078c34649a990296e1f819f73e245d43001c778df101213de08e48312b973219c6be68d7474ea3f3a97ce4e541b6c4abd2704c403ef786952b2398cfe433c5c24c69c697f87b63de2587a6a9b8", 0x52}, {&(0x7f0000000ac0)="6a57ab4b938609b20628ebd7cc58845537d0cb911b740ca5ab1a2b4e47b5df9bb18f2b666ef319981864c2c9dbfb4669e16431670f8fa751364530ce4f934f5359472a68dc8945cda96bf5555499bb2f963ee9ab04fbe3e9c103cc27bcb50a444eb005935c2e6297100160f257976ba5dedaf023bb1c52b06a1959e6ef7154b668a7c3bd90d9362daadd82c9234d4e0c011d4d31b7839accbcaeb6caae1796476536a71cb908d8d0e9c61579b48fdb275be16860ea83fa91dd22e71c8282a95386d03e450157b940d4eab0ade3ed29f727f2949ba0f1930f700f644d92585e57c7cc9bc1a8569cc72f348f7ef252276fd8d423f8", 0xf4, 0x9}, {&(0x7f0000000bc0)="9c2b4e444f0f5cc7572f7b6cd91ffae0dd92", 0x12, 0x200}, {&(0x7f0000000c00)="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", 0x1000, 0x9}, {&(0x7f0000001c00)="dd28963f98793949cfd659cecaa0e581de7da553bc1713c46bf9f68672d02271fe25c661d16b1ad43d07e10924f70862755b70ba", 0x34, 0x2}, {&(0x7f0000001c40)="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", 0x1000, 0x20}], 0x80000, &(0x7f0000002f00)={[{@hostdata={'hostdata', 0x3d, 'net/unix\x00'}}, {@suiddir='suiddir'}, {@locktable={'locktable', 0x3d, '+em0cpuset'}}, {@noquota='noquota'}, {@noquota='noquota'}], [{@fsuuid={'fsuuid', 0x3d, {[0x62, 0x65, 0x30, 0x35, 0x3d3bd736e786dc5e, 0x38, 0x2, 0x35], 0x2d, [0x51, 0x4c, 0x66, 0x32], 0x2d, [0x30, 0x4c, 0x39, 0x61], 0x2d, [0x30, 0x32, 0x63], 0x2d, [0x65, 0x22, 0x33, 0x61, 0x4, 0x0, 0x34, 0x64]}}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<'}}, {@fowner_eq={'fowner', 0x3d, r13}}, {@dont_appraise='dont_appraise'}, {@fowner_lt={'fowner<', r14}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x61, 0x63, 0x35, 0x65, 0x31, 0x33, 0x32], 0x2d, [0x65, 0x90, 0x39, 0x11], 0x2d, [0x30, 0x66, 0x6, 0x36], 0x2d, [0x31, 0x38, 0x39, 0x61], 0x2d, [0x32, 0x35, 0x38, 0x30, 0x39, 0x36, 0x39, 0x62]}}}, {@uid_gt={'uid>', r15}}]}) [ 220.435549][ T8907] device bridge_slave_1 entered promiscuous mode [ 220.499250][ T8907] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 220.520282][ T8907] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 220.600994][ T8907] team0: Port device team_slave_0 added [ 220.633275][ T8907] team0: Port device team_slave_1 added [ 220.648076][ T8910] chnl_net:caif_netlink_parms(): no params data found [ 220.678881][ T8913] IPVS: ftp: loaded support on port[0] = 21 04:42:49 executing program 3: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x200000) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x8, 0x49, 0x9, 0x3, 0x3e, 0xfff, 0x5e, 0x38, 0x10e, 0x5, 0x0, 0x20, 0x1, 0x0, 0xff, 0xffff}, [{0x5, 0x7fffffff, 0xffffffff, 0x101, 0x7, 0x2, 0x85, 0x7ff}, {0x4, 0x401, 0x2, 0x400, 0x3, 0xed6, 0x7ff, 0xc6126c}], "96ab17c928d4674de15e386646b40d95bf9eb60640c7e687cd16d6c1423deddb212fe95563b9042c24301ce8a3c83b3d59f980d1711e9462384a80061d6cdc254de87bc1144b26c9b642b8da35229126ef2498f9cb5d2c750b578f818dba3ac0046d"}, 0xda) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.mems\x00', 0x2, 0x0) write$binfmt_misc(r1, &(0x7f00000001c0)={'syz1', "8aace611028897ef05d75af572b8439a82ca516bc06da3ab31e8571f6970865c4b81dcd31df991cfc6e0ef6c1a1c0a190f98a9aaa3991c49857755d62124c7bd19d7cd62085affa74d6ce01baa73784e8fc7cd12894eb1958425c8b1a163f33057dc1130284fc555d3b906edb9448b6b089c96861590356b142c69b3c1703ab195e3ca7a83346151a94c5322c0c91b966a7f5dd4c7ef52eaf95d47c3735a6ed861a0529623215c15b098d0793e60026b1b1e674bcca2c79af557a28b0b9d95ffe8bb45789a01f84a0150cdf5fa48b94264102bd07d9a4063b8d22ecb2e745741bbf3c4e54959d2815e"}, 0xed) r2 = getpgrp(0x0) kcmp(0xffffffffffffffff, r2, 0x0, r0, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000001380)=[{{&(0x7f00000002c0)=@vsock, 0x80, &(0x7f0000000540)=[{&(0x7f0000000340)=""/36, 0x24}, {&(0x7f0000000380)=""/21, 0x15}, {&(0x7f00000003c0)=""/136, 0x88}, {&(0x7f0000000480)=""/159, 0x9f}], 0x4, &(0x7f0000000580)=""/145, 0x91}, 0x7}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000640)=""/34, 0x22}, {&(0x7f0000000680)=""/192, 0xc0}, {&(0x7f0000000740)=""/26, 0x1a}, {&(0x7f0000000780)=""/112, 0x70}], 0x4, &(0x7f0000000840)=""/95, 0x5f}, 0x9}, {{&(0x7f00000008c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000940)=""/124, 0x7c}, {&(0x7f00000009c0)=""/48, 0x30}], 0x2, &(0x7f0000000a40)=""/20, 0x14}, 0x9}, {{&(0x7f0000000a80)=@generic, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000b00)=""/148, 0x94}, {&(0x7f0000000bc0)=""/102, 0x66}, {&(0x7f0000000c40)=""/147, 0x93}, {&(0x7f0000000d00)=""/154, 0x9a}, {&(0x7f0000000dc0)=""/37, 0x25}], 0x5, &(0x7f0000000e80)=""/3, 0x3}, 0x3ff}, {{&(0x7f0000000ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000f40)=""/186, 0xba}, {&(0x7f0000001000)=""/11, 0xb}, {&(0x7f0000001040)}, {&(0x7f0000001080)=""/160, 0xa0}, {&(0x7f0000001140)=""/188, 0xbc}, {&(0x7f0000001200)=""/152, 0x98}], 0x6, &(0x7f0000001340)=""/37, 0x25}}], 0x5, 0x40, &(0x7f00000014c0)) bind$bt_l2cap(r3, &(0x7f0000001500)={0x1f, 0x7, {0x4, 0x20, 0x0, 0x7, 0x4, 0x3f}, 0x1f, 0x6}, 0xe) lsetxattr$security_smack_transmute(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)='security.SMACK64TRANSMUTE\x00', &(0x7f00000015c0)='TRUE', 0x4, 0x2) openat$cgroup_int(r0, &(0x7f0000001600)='cgroup.max.depth\x00', 0x2, 0x0) r4 = accept4(r3, &(0x7f0000001640)=@l2, &(0x7f00000016c0)=0x80, 0x80000) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000001700)={0x100}, 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000001740)='fou\x00') pipe(&(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r5, 0x40045542, &(0x7f00000017c0)=0x9) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000001800)='./file0/file0\x00', 0x10000, 0x8) r8 = openat(r5, &(0x7f0000001880)='./file0\x00', 0x200, 0x28) renameat2(r7, &(0x7f0000001840)='./file0\x00', r8, &(0x7f00000018c0)='./file0\x00', 0x4) ioctl$LOOP_CLR_FD(r6, 0x4c01) r9 = semget(0x1, 0x2, 0x440) clock_gettime(0x0, &(0x7f0000001940)={0x0, 0x0}) semtimedop(r9, &(0x7f0000001900)=[{0x4, 0x0, 0x1000}, {0x4, 0x9, 0x1800}, {0x1, 0x7, 0x2800}], 0x3, &(0x7f0000001980)={r10, r11+30000000}) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f00000019c0)="23bd43d1978d38f18717dea4563d0f97b7fbfce8757c9270dd8a0a3c68d4f7f1f8fe59900dd235dd2df0a4ad0631c2b99d6f2bfa70cc36af81e0bf1f0cd018011b5537c06d98612b4323aa781798377d1e026b7ff6fe7e2190821ecbd993d79875f2ab4be3fcacc6d5937449601f0de2503446f4468e05b6c4a2b3163ca1e5462bedee585cc65e32b8ea64855c6fd2331e1d1af8b20284897bc7875493127ab7a79370286b8f8b15ee8e8dec11c586f0d3b3473bcb145443a593d1297777b129f88c5a3a969d306d04b1b6d8a8dcdd1168c4", 0xd2) r12 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r12, 0x10f, 0x80, &(0x7f0000001b00), &(0x7f0000001b40)=0x4) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_NUM(r13, 0x4008af10, &(0x7f0000001b80)={0x2, 0x9}) write$FUSE_NOTIFY_DELETE(r12, &(0x7f0000001bc0)={0x35, 0x6, 0x0, {0x2, 0x0, 0xc, 0x0, 'cpuset.mems\x00'}}, 0x35) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r14, 0x6, 0x1f, &(0x7f0000001c00)="635e9f49dfd64533f99a3a6d37b974", 0xf) [ 220.779180][ T8907] device hsr_slave_0 entered promiscuous mode [ 220.836463][ T8907] device hsr_slave_1 entered promiscuous mode 04:42:49 executing program 4: r0 = socket(0xa, 0x0, 0x9) r1 = accept4$ax25(r0, 0x0, &(0x7f0000000000), 0x140000) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.syz\x00', &(0x7f00000000c0)=""/37, 0x25) lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@sha1={0x1, "450e48e61dd042419a46e2dde3ef166a82a8c834"}, 0x15, 0x2) r2 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x7fff, 0x0) sendto$isdn(r2, &(0x7f0000000200)={0x10000, 0x1, "ec"}, 0x9, 0x40058, &(0x7f0000000240)={0x22, 0x3, 0x1, 0x9, 0x8}, 0x6) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0xc0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r3, 0x2, &(0x7f00000002c0)='#\x00', &(0x7f0000000300)="450168e4256cc51891567c5aded5f20fd378db6cb9778e355f94864ec96eb323ae95c5196d87b9753df00d6005b797489f5b91af6a56061886f2a72abc82d2cdab4d4dcd9d357f802dd0", 0x4a) r4 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$lock(r2, 0x25, &(0x7f0000000380)={0x0, 0x1, 0x6, 0x2, r4}) prctl$PR_SET_FPEXC(0xc, 0x76319cd1e593a407) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r5, &(0x7f0000000400)=""/60, 0x3c, 0x58982866cf089c4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000500)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000440)=0x1, r6, 0x0, 0x2, 0x4}}, 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000540)=[@in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, @in6={0xa, 0x4e23, 0xff, @mcast1}, @in={0x2, 0x4e24, @broadcast}], 0x88) r7 = syz_open_dev$media(&(0x7f0000000600)='/dev/media#\x00', 0x4db, 0x8100) accept4$inet6(r7, &(0x7f0000000640)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000680)=0x1c, 0x1000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000006c0)={{0xc8, 0x2}, 'port1\x00', 0xdfb0f5a0458df735, 0x4c, 0x3, 0xffff0000, 0x1f, 0xff, 0x4, 0x0, 0x2, 0x4}) accept$nfc_llcp(r7, &(0x7f0000000780), &(0x7f0000000800)=0x60) accept4$unix(r2, &(0x7f0000000840), &(0x7f00000008c0)=0x6e, 0x800) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ubi_ctrl\x00', 0x401382, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r8, 0xc0186419, &(0x7f0000000a00)={0x0, &(0x7f0000000940)=""/71, &(0x7f00000009c0)}) r9 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/mixer\x00', 0x101200, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r9, 0x8905, &(0x7f0000000a80)) syz_extract_tcp_res(&(0x7f0000000ac0), 0xffffff4f, 0x4) r10 = add_key(&(0x7f0000000b00)='.dead\x00', &(0x7f0000000b40)={'syz', 0x2}, &(0x7f0000000b80)="bdc8f7c1eb651a4157c97b5efafb988508d9563343ae3da7cc49d38cf128f8e99f2f01e4bb307684d8fd6bd4f8fcea21d17528e15195d25cc1695d01afdc266b2c", 0x41, 0xfffffffffffffffe) r11 = add_key$keyring(&(0x7f0000000c40)='keyring\x00', &(0x7f0000000c80)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, r10, &(0x7f0000000c00)=@encrypted_update={'update ', 'default', 0x20, 'trusted:'}, 0x18, r11) r12 = syz_open_dev$swradio(&(0x7f0000000cc0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_SET_REGS(r12, 0x4090ae82, &(0x7f0000000d00)={[0x4, 0x8000000000000, 0x1, 0x31f, 0x10001, 0x401, 0x4, 0xffffffffffffab31, 0x8, 0x2ad, 0x3f, 0x80000001, 0x8, 0x2, 0x6, 0x3ff], 0x4000, 0x80020}) [ 221.014790][ T8907] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.022106][ T8907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.030057][ T8907] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.037207][ T8907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.057930][ T8915] IPVS: ftp: loaded support on port[0] = 21 [ 221.137877][ T8910] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.144982][ T8910] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.168119][ T8910] device bridge_slave_0 entered promiscuous mode 04:42:50 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x82b41, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x3, @local, 0x6}, @in6={0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, [], 0xb}, 0x718c}, @in6={0xa, 0x4e24, 0x5, @mcast1, 0x3}, @in6={0xa, 0x4e20, 0x3ff, @rand_addr="9750849c8bf6946375950e7ee6dcc063", 0x8}, @in6={0xa, 0x4e21, 0x2, @remote}, @in6={0xa, 0x4e24, 0x8, @rand_addr="18097080d15955f84eac804d95be9125"}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e24, 0x644, @loopback, 0x200}, @in6={0xa, 0x4e21, 0x3, @remote, 0xa7}, @in6={0xa, 0x4e23, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}], 0x10c) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/rpc\x00') mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x93864390ffe6547d, 0x84050, r1, 0x10000000) r2 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0xffffffff7fffffff, 0x1000) connect$bt_sco(r2, &(0x7f0000000200)={0x1f, {0x8, 0x3b, 0x4, 0xd1, 0x5, 0x1}}, 0x8) r3 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x7, 0x101000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000280)={0x1, [0x81]}, 0x6) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f00000002c0)) r4 = socket$isdn_base(0x22, 0x3, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000300)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x164, r5, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3aba}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000001}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="43b3838e45da2209629e8a48139dd607"}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x12}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfffffffb}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x8000}, 0x10) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sequencer\x00', 0x400, 0x0) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000000600)={0x5b847c037b68786a, 0x9, [@empty, @broadcast, @remote, @broadcast, @dev={[], 0x20}, @local, @local, @local, @random="402f527581b2"]}) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer2\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000780)=0xe8) getgroups(0x2, &(0x7f00000007c0)=[0x0, 0xffffffffffffffff]) write$FUSE_ENTRY(r7, &(0x7f0000000800)={0x90, 0x0, 0x2, {0x5, 0x2, 0x8000, 0x8, 0x5, 0xffffff81, {0x4, 0x0, 0x2, 0x6, 0x6, 0x5, 0x7f, 0x3f, 0x50000, 0xfd, 0x4a, r8, r9, 0x400, 0x3f}}}, 0x90) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/nullb0\x00', 0x448200, 0x0) ioctl$int_in(r10, 0x5452, &(0x7f0000000900)=0x4) r11 = syz_open_dev$media(&(0x7f0000000940)='/dev/media#\x00', 0xffffffff, 0x12000) ioctl$TUNGETVNETHDRSZ(r11, 0x800454d7, &(0x7f0000000980)) r12 = syz_open_dev$adsp(&(0x7f00000009c0)='/dev/adsp#\x00', 0x0, 0x200) ioctl$DRM_IOCTL_DROP_MASTER(r12, 0x641f) socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000a00)={0xff, 0x10a, 0x9, 0x4, 0x0}, &(0x7f0000000a40)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000b40)={r13, 0xa4, &(0x7f0000000a80)=[@in6={0xa, 0x4e23, 0x1, @loopback, 0x1}, @in6={0xa, 0x4e24, 0x1, @mcast1, 0x800}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e22, @rand_addr=0x8000}, @in={0x2, 0x4e20, @rand_addr=0x5}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e24, 0x81, @mcast2, 0x3}]}, &(0x7f0000000b80)=0x10) r14 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/video2\x00', 0x2, 0x0) fadvise64(r14, 0x0, 0x7, 0x1) [ 221.203282][ T8910] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.215756][ T8910] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.229050][ T8910] device bridge_slave_1 entered promiscuous mode [ 221.275653][ T8910] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 221.301678][ T8910] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 221.337934][ T8919] IPVS: ftp: loaded support on port[0] = 21 [ 221.350831][ T2836] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.373412][ T2836] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.440339][ T8910] team0: Port device team_slave_0 added [ 221.447854][ T8910] team0: Port device team_slave_1 added [ 221.478197][ T8907] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.506874][ T8915] chnl_net:caif_netlink_parms(): no params data found [ 221.518081][ T8921] IPVS: ftp: loaded support on port[0] = 21 [ 221.547477][ T8913] chnl_net:caif_netlink_parms(): no params data found [ 221.558494][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.566983][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.590925][ T8907] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.668827][ T8910] device hsr_slave_0 entered promiscuous mode [ 221.726376][ T8910] device hsr_slave_1 entered promiscuous mode [ 221.786190][ T8910] debugfs: Directory 'hsr0' with parent '/' already present! [ 221.818377][ T8915] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.825653][ T8915] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.834540][ T8915] device bridge_slave_0 entered promiscuous mode [ 221.842771][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.851858][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.860364][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.867462][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.901320][ T8915] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.909682][ T8915] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.918016][ T8915] device bridge_slave_1 entered promiscuous mode [ 221.924833][ T8913] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.932331][ T8913] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.940493][ T8913] device bridge_slave_0 entered promiscuous mode [ 221.948820][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.957981][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.967147][ T3570] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.974382][ T3570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.982592][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.008246][ T8913] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.015329][ T8913] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.024235][ T8913] device bridge_slave_1 entered promiscuous mode [ 222.043697][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.081600][ T8913] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 222.092326][ T8915] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 222.107873][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.117033][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.134836][ T8907] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 222.146705][ T8907] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 222.160144][ T8913] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 222.178360][ T8915] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 222.204482][ T8915] team0: Port device team_slave_0 added [ 222.211611][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.220147][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.229540][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.238159][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.247074][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.255672][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.264987][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.273948][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.304837][ T8913] team0: Port device team_slave_0 added [ 222.313737][ T8913] team0: Port device team_slave_1 added [ 222.322575][ T8915] team0: Port device team_slave_1 added [ 222.341292][ T8907] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.459125][ T8915] device hsr_slave_0 entered promiscuous mode [ 222.496626][ T8915] device hsr_slave_1 entered promiscuous mode [ 222.546252][ T8915] debugfs: Directory 'hsr0' with parent '/' already present! [ 222.558167][ T8910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.619487][ T8913] device hsr_slave_0 entered promiscuous mode [ 222.656599][ T8913] device hsr_slave_1 entered promiscuous mode [ 222.697247][ T8913] debugfs: Directory 'hsr0' with parent '/' already present! [ 222.712077][ T8919] chnl_net:caif_netlink_parms(): no params data found [ 222.781236][ T8910] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.803802][ T8919] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.811078][ T8919] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.819506][ T8919] device bridge_slave_0 entered promiscuous mode [ 222.831037][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.839413][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.857703][ T8921] chnl_net:caif_netlink_parms(): no params data found [ 222.868700][ T8919] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.876470][ T8919] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.887684][ T8919] device bridge_slave_1 entered promiscuous mode [ 222.906136][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.914719][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.936907][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.944025][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.952802][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.961990][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.972979][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.980206][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.991749][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.000836][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.050837][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.067688][ T8921] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.076181][ T8921] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.084466][ T8921] device bridge_slave_0 entered promiscuous mode 04:42:51 executing program 0: socket$inet(0x15, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/dev_mcast\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) sendfile(r2, r0, 0x0, 0x6f0a77bd) [ 223.094087][ T8921] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.105582][ T8921] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.114362][ T8921] device bridge_slave_1 entered promiscuous mode [ 223.137120][ T8919] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 223.158750][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.170844][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.209321][ C1] hrtimer: interrupt took 45811 ns [ 223.231178][ T8919] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 223.258127][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.266385][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.275758][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.290998][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.300362][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.308933][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.317717][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 04:42:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) request_key(&(0x7f0000000200)='logon\x00', &(0x7f0000000180)={'\x00', 0x3}, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 223.331966][ T8921] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 223.376810][ T8921] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 223.411657][ T8913] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.433352][ T8919] team0: Port device team_slave_0 added [ 223.443946][ T8919] team0: Port device team_slave_1 added [ 223.457061][ T8921] team0: Port device team_slave_0 added [ 223.470822][ T8913] 8021q: adding VLAN 0 to HW filter on device team0 04:42:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x8500000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) shutdown(r1, 0x1) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4004011) [ 223.488453][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.497136][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.507321][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.517286][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.525720][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.532846][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.542589][ T8921] team0: Port device team_slave_1 added [ 223.588958][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.597260][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.605865][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.614736][ T8917] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.622000][ T8917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.646992][ T8915] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.699470][ T8919] device hsr_slave_0 entered promiscuous mode [ 223.746370][ T8919] device hsr_slave_1 entered promiscuous mode 04:42:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6653070000003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab35f4ad614fd33cebbc150bb2b03b5b2461179f5f90bba001b50c0da6218a8106df2858ec973328e5a2c078a3fe3b52020203517e25ee74e82ba80a0fa881e689f7615baf78f08ea33bcb860d6a0b61193d4a1cb622431d42fee5e91531bfdfe5cb19ff15d6d891a92efa823a3c231ea82fdf0e7fcf567bf50600a243422daa960ab9f4b41d535a4e723362f56de8c859fa668b046005fc1e44e4e4b7966c8bbd036be5e23eb4b3d4e3d5bfe025b413ce4fd56f7ec78071f58e2979f98979a9013af6dae8eaf", 0x109}], 0x4, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 223.796557][ T8919] debugfs: Directory 'hsr0' with parent '/' already present! [ 223.843526][ T8915] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.861867][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.884580][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 04:42:52 executing program 0: creat(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xb, 0x11, r2, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x7}}, 0xfe0c) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 223.894643][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.903026][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.912338][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.921376][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.930345][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.979101][ T8921] device hsr_slave_0 entered promiscuous mode [ 223.989272][ T8957] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 224.016539][ T8921] device hsr_slave_1 entered promiscuous mode [ 224.067119][ T8921] debugfs: Directory 'hsr0' with parent '/' already present! [ 224.094092][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.104151][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 04:42:53 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40806685, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x44000, 0x0) io_setup(0x5, &(0x7f0000000480)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="84010000", @ANYRES16, @ANYBLOB="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"], 0x184}}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) clone3(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x40000, 0x4) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)={0xb4, 0x0, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1570}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x1}, 0x44000) [ 224.122913][ T8910] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.184609][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.201364][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.212628][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.224931][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.235928][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.243158][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.257952][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.270814][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.310936][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.321419][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.338490][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.352397][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.359562][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.374198][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.384090][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.400127][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.412642][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.425508][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.441627][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.577317][ T8913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 224.618114][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.628427][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 224.628441][ T26] audit: type=1804 audit(1569645773.461:31): pid=8964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir174161797/syzkaller.eZ1r5e/6/file0/file0" dev="loop0" ino=22 res=1 [ 224.668970][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.692623][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.742430][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.765373][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.787647][ T8919] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.803055][ T8915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 04:42:53 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "035b62bf9a74ac646234a84087d2aa3ffbddaede", "0d06dd33cf1ee89569779c179c1ffe3eb5e9e2b8"}) [ 224.846288][ T8921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.864695][ T8919] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.883306][ T8913] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 224.890748][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.899436][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.923213][ T8921] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.994498][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.023540][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.052499][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.069872][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.079048][ T8917] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.086283][ T8917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.095135][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.103808][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.112776][ T8917] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.120201][ T8917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.128112][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.137072][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.145621][ T8917] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.153428][ T8917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.161436][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.170361][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.178887][ T8917] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.186098][ T8917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.193681][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.203772][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.211800][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.269918][ T8915] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.283454][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.294901][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.318857][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.331297][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.341275][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.350417][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.359676][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 04:42:54 executing program 0: clone(0x208, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)='./file1\x00') execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000380)=0x404100000001, 0xfe3f) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132441) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103301ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140), 0x4) [ 225.406704][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.444350][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.474442][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.515334][ T8919] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 225.541249][ T8919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 225.582823][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.594995][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.620897][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.634930][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 225.651724][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 225.663363][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 225.683275][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.692795][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.707945][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.731638][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.742500][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 225.827363][ T8919] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.852662][ T8921] 8021q: adding VLAN 0 to HW filter on device batadv0 04:42:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000400)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x5, 0x73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:42:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x117}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffd3f, 0x0, 0x0, 0x0, 0xff70}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:42:55 executing program 3: migrate_pages(0x0, 0x9, 0x0, &(0x7f0000000140)=0x2) 04:42:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) 04:42:55 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x216, 0x210007fd, &(0x7f0000000380)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f0000000540)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x204) shutdown(r0, 0x1) 04:42:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x14, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8}, @IFLA_IPTUN_ENCAP_TYPE={0x8}]]}}}]}, 0x44}}, 0x0) [ 226.457676][ T9058] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 226.485854][ T9066] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 04:42:55 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x216, 0x210007fd, &(0x7f0000000380)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f0000000540)="03268a927f1f6587b967480b41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x2, 0x0, 0x204) shutdown(r0, 0x1) [ 226.540434][ T9066] netlink: 'syz-executor.0': attribute type 15 has an invalid length. [ 226.583185][ T9071] kvm [9069]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000074 [ 226.603843][ T9071] kvm [9069]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000074 04:42:55 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f909, 0xd408, [], @p_u8=0x0}}) [ 226.632928][ T9071] kvm [9069]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000074 [ 226.676351][ T9071] kvm [9069]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000074 04:42:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='V'], 0x1) fallocate(r1, 0x0, 0x40000, 0x4) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0xd000000, r1, 0x0, 0x8}) 04:42:55 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000440)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x4) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000800)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000080)=0x80, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) sendmmsg(r2, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}, 0xffffffff00000000}], 0x142, 0x44040) 04:42:55 executing program 3: getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) syz_open_procfs(0x0, 0x0) creat(0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:42:55 executing program 0: write(0xffffffffffffffff, &(0x7f0000000000), 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) creat(&(0x7f0000002440)='./file0\x00', 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 04:42:55 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x0, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup(0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) 04:42:58 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') 04:42:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:42:58 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x4) 04:42:58 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:42:58 executing program 4: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f909, 0x0, [], @p_u8=0x0}}) 04:42:58 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000340)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) [ 229.490855][ T26] audit: type=1804 audit(1569645778.331:32): pid=9122 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir174161797/syzkaller.eZ1r5e/12/bus" dev="sda1" ino=16560 res=1 04:42:58 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001200e7ef007b0a00f4afd7030a7c", 0xfefc, 0x0, 0x0, 0x1d4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 229.581507][ T26] audit: type=1804 audit(1569645778.421:33): pid=9122 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir174161797/syzkaller.eZ1r5e/12/bus" dev="sda1" ino=16560 res=1 04:42:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:42:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xa, 0xa, 0x100000000000913, 0x1}, 0x3c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2, [0x0, 0x0, 0x8000000000000000]}, 0x2c) accept$alg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 229.618542][ T26] audit: type=1804 audit(1569645778.461:34): pid=9122 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir174161797/syzkaller.eZ1r5e/12/bus" dev="sda1" ino=16560 res=1 04:42:58 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x8, 0x2, [@tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x38}}, 0x0) 04:42:58 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) clock_gettime(0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',noextend,\x00']) write$P9_RREADDIR(r0, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r0, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) getpgrp(0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) 04:42:58 executing program 4: openat$hwrng(0xffffffffffffff9c, 0x0, 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket(0x100000000011, 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x10, 0x0, 0x0) write(r2, &(0x7f0000000240), 0x0) recvmmsg(r2, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) r3 = socket(0x10, 0x80002, 0x0) write(r3, &(0x7f0000000240)="2600000022004701d26e050000000000000005006d20002b1f000a4a51f1ee839cd53400b017", 0x26) recvmmsg(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x2, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000300)={0x0, 0x1f, 0x3, 0x0, 0x0, [{r2, 0x0, 0x9}, {r3}, {r0}]}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x0) syncfs(r4) 04:42:58 executing program 0: r0 = gettid() times(0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) uname(0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) timer_settime(r1, 0x0, 0x0, 0x0) timer_settime(r1, 0xccef6e5273d11977, &(0x7f0000000300)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_settime(r1, 0x3, &(0x7f0000000080)={{0x77359400}, {0x0, 0x9}}, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x7, 0x1f}) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040)) tkill(r0, 0x1000000000015) 04:42:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x4000000040100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x2, 0x3}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1) fcntl$setstatus(r1, 0x4, 0x42802) 04:42:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:42:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:42:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="850000002e00000017000000000086009500000000000000e63f435878d4c2bc2da21f00000000114b004e6f6f13651d15b6c7fe28f7dddd66f85e4c82d89a0da02fbd6250dd1a55943e7ec97a13bf3239682310d9d3ce27a1ea801a327c7da7508798c894152c0900000001ef3f12167142ec35a443bad466320e4d2f5f738a5e56c59e1d119f351bcf57c80469488e3b1320a728188740d46fe8eb869adb769770154f50745a64560f7d0ee9ef094e1d2e1e"], &(0x7f0000000180)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r2, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r3, &(0x7f000000ac80), 0x66, 0x0) [ 230.075654][ T9175] ptrace attach of "/root/syz-executor.3"[9174] was attempted by "/root/syz-executor.3"[9175] 04:42:59 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000200)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872a13afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@dax='dax'}]}) 04:42:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) socket$kcm(0x29, 0x1000000000000005, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 230.303624][ T9187] EXT4-fs (loop4): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 230.328422][ T9187] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 04:42:59 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)='\a', 0x1) [ 230.390754][ T9187] EXT4-fs (loop4): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 230.413896][ T9187] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 04:42:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) socket$kcm(0x29, 0x1000000000000005, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:42:59 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000200)="25bca274769e620aa734fa0095e0612687463915e38802a9d8aea872a13afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@dax='dax'}]}) 04:42:59 executing program 2: write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001a005f0214f9f40700090401800000000000000200000000", 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) dup(0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) openat$zero(0xffffffffffffff9c, 0x0, 0x80101, 0x0) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(r2, 0x0, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfb3f) 04:42:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) socket$kcm(0x29, 0x1000000000000005, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 230.876941][ T9216] EXT4-fs (loop4): DAX enabled. Warning: EXPERIMENTAL, use at your own risk [ 230.898508][ T9216] EXT4-fs (loop4): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 04:43:01 executing program 0: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) getsockopt$bt_hci(r0, 0x84, 0x81, 0x0, &(0x7f0000000040)) 04:43:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x588d85fa35d75ebb) 04:43:01 executing program 3: syz_open_dev$sndctrl(0x0, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x5, r1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {0x8, 0x1}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 04:43:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae46, &(0x7f0000000080)) 04:43:01 executing program 2: write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001a005f0214f9f40700090401800000000000000200000000", 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) dup(0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) openat$zero(0xffffffffffffff9c, 0x0, 0x80101, 0x0) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(r2, 0x0, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfb3f) 04:43:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:02 executing program 1: write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001a005f0214f9f40700090401800000000000000200000000", 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) dup(0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfb3f) fallocate(r2, 0x0, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfb3f) [ 233.156890][ T9229] overlayfs: workdir and upperdir must reside under the same mount 04:43:02 executing program 0: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:43:02 executing program 4: socket$inet6(0xa, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {0xffffffffffffffff, 0x0, 0x2}}, 0xa) write(0xffffffffffffffff, &(0x7f0000000240)="2600000022004701d26e050000000000000005006d20002b1f000a4a51f1ee839cd53400b017", 0x26) recvmmsg(0xffffffffffffffff, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="2600000022004701d26e050000000000000005006d20002b1f000a4a51f1ee839cd53400b017", 0x26) recvmmsg(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x2, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)={0x0, 0x1f, 0x3, 0x0, 0x0, [{0xffffffffffffffff, 0x0, 0x9}, {}, {}]}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) syncfs(r0) [ 233.353463][ T9229] overlayfs: workdir and upperdir must reside under the same mount [ 233.392872][ T9251] XFS (loop0): Invalid superblock magic number 04:43:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000000100)=@framed={{}, [@alu={0x8000000201a7f19, 0x5, 0x7, 0x0, 0x1, 0x2}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 04:43:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0x10, &(0x7f00000001c0)={&(0x7f0000000140)={0x2, 0x104, 0x6, {0x0, 0x7530}, {}, {0x0, 0x0, 0x1}, 0x1, @canfd={{0x2, 0x0, 0x1, 0x1}, 0x7, 0x0, 0x0, 0x0, "84a10235541d46f9f753cd22fdccd783b321cf21cfaa42e9ff4bd4f92f4420e8d5094f61aade38776dfe9e967c4c4671d9eb047f61b6b3d6133ac817bfa8e8e7"}}, 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x20000080) msgrcv(0x0, 0x0, 0x0, 0x1, 0x3800) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x6, &(0x7f0000000000)=[{0x0, 0x0, 0x4, 0xae}, {0x1, 0x8, 0x1, 0x4}, {0x7, 0x7f, 0x3, 0x6}, {0x7f, 0x7, 0x1, 0x9}, {0x7ff, 0x7, 0x9, 0x7}, {0x6, 0x9, 0x81, 0x6}]}, 0x10) 04:43:02 executing program 3: r0 = memfd_create(&(0x7f0000000100)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, 0x0, 0x0) 04:43:02 executing program 4: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, 0x0, &(0x7f0000048000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB=',noextend,\x00']) write$P9_RREADDIR(r0, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r0, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r1 = getpgrp(0xffffffffffffffff) prlimit64(r1, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)}, 0x0) close(r2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='9p\x00', 0x400, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid'}}], [{@measure='measure'}]}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/rtc0\x00', 0xfffffffffffffffd, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000300)=@name={0x1e, 0x2, 0x0, {{0x0, 0x1}, 0x3}}, 0x1ac417f0bcad037c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001400)='/dev/sequencer2\x00', 0x90d082, 0x0) 04:43:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:02 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) recvmsg$kcm(r0, &(0x7f0000004040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800020000000400100000da060000d5e34adddb5692337b0e00020000000034000000000400"], &(0x7f0000000280)=""/237, 0x2a, 0xed, 0x1}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r6 = socket$kcm(0x29, 0x5, 0x0) gettid() write$cgroup_pid(r5, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e000000520081f8f7000000000000040a4865160b0001000e000000000004000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x41, 0x0, 0x5, 0x4, 0x0, 0x10000, 0x100c4, 0x8, 0x89, 0x451, 0x0, 0x63, 0x1, 0xc9e, 0x0, 0x1, 0x5, 0x9, 0x6, 0x100000000, 0x9, 0xe7a7, 0x20, 0x5b, 0x4, 0xfffffffffffffffc, 0x0, 0x8001, 0x1000, 0x10000, 0xff, 0x0, 0x9, 0x8, 0x0, 0x7, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xc}, 0x28, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r8 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(r4, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000540), 0x800) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x2f5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1e, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6627239a, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000200)='syzkaller\x00', 0x5, 0x75, &(0x7f0000000400)=""/117, 0x40f00, 0x0, [], 0x0, 0xf, r2, 0x8, &(0x7f0000000480)={0x4, 0x9}, 0x8, 0x10, 0x0, 0xffffffffffffff53}, 0x70) write$cgroup_int(r8, 0x0, 0x0) 04:43:02 executing program 3: syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0x4}}}]}, 0x34}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x0, 0x5, r0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {0x8, 0x1}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 04:43:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4010ae67, &(0x7f0000000080)) 04:43:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @empty}, {0x4000030000000304, @broadcast}, 0x0, {0x2, 0x0, @remote}, '\xecJ\x00\x965\x00'}) 04:43:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 234.021581][ T9298] overlayfs: conflicting lowerdir path [ 234.027070][ T9299] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 234.130660][ T9298] overlayfs: workdir and upperdir must reside under the same mount 04:43:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0xc00caee0, &(0x7f0000000080)) 04:43:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x1fe}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000040)) 04:43:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:03 executing program 3: 04:43:03 executing program 4: socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = gettid() ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) set_mempolicy(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) tkill(r0, 0x800000000000014) [ 234.358158][ T9299] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 234.433443][ T9299] CPU: 0 PID: 9299 Comm: syz-executor.2 Not tainted 5.3.0-next-20190926 #0 [ 234.442084][ T9299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.452155][ T9299] Call Trace: [ 234.455459][ T9299] dump_stack+0x172/0x1f0 [ 234.459895][ T9299] dump_header+0x177/0x1152 [ 234.464433][ T9299] ? pagefault_out_of_memory+0x11c/0x11c [ 234.470172][ T9299] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 234.475995][ T9299] ? ___ratelimit+0x60/0x595 [ 234.480600][ T9299] ? do_raw_spin_unlock+0x57/0x270 [ 234.485724][ T9299] oom_kill_process.cold+0x10/0x15 [ 234.490941][ T9299] out_of_memory+0x334/0x1340 [ 234.495635][ T9299] ? __sched_text_start+0x8/0x8 [ 234.500640][ T9299] ? oom_killer_disable+0x280/0x280 [ 234.505867][ T9299] mem_cgroup_out_of_memory+0x1d8/0x240 [ 234.511519][ T9299] ? memcg_stat_show+0xc40/0xc40 [ 234.516762][ T9299] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 234.522676][ T9299] ? cgroup_file_notify+0x140/0x1b0 [ 234.527986][ T9299] memory_max_write+0x262/0x3a0 [ 234.532857][ T9299] ? mem_cgroup_write+0x370/0x370 [ 234.537898][ T9299] ? lock_acquire+0x190/0x410 [ 234.542592][ T9299] ? kernfs_fop_write+0x227/0x480 [ 234.547636][ T9299] cgroup_file_write+0x241/0x790 [ 234.552603][ T9299] ? mem_cgroup_write+0x370/0x370 [ 234.557644][ T9299] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 234.563298][ T9299] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 234.569065][ T9299] kernfs_fop_write+0x2b8/0x480 [ 234.573937][ T9299] __vfs_write+0x8a/0x110 [ 234.578282][ T9299] ? kernfs_fop_open+0xd80/0xd80 04:43:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="d6000000120081ae08060c0f006b10007f03e3f702000000000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e74703c48f93b8e54e8ff57cb573d2686aa6d3ecc56d25ceedd652b2146b9629e64c729d4033c98d010000c69235ebf27b6349e4f6e33769040031a8b1e472b8763fcc81933853e83f157b2e8fa89ac55aad52d7a20e7fb85956fe56572a368f07abee2fbab604ceda51b0480289a062aa31d7ca575c53be5f2b496f091344d9160b2dd57879ea3255d9b9234a3b7035608b05021d61095b60cc088d2a0f60", 0xd6}], 0x1}, 0x0) 04:43:03 executing program 4: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x200000000000003}, 0x77) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) [ 234.583233][ T9299] vfs_write+0x268/0x5d0 [ 234.587500][ T9299] ksys_write+0x14f/0x290 [ 234.591841][ T9299] ? __ia32_sys_read+0xb0/0xb0 [ 234.596615][ T9299] ? do_syscall_64+0x26/0x760 [ 234.602263][ T9299] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.608342][ T9299] ? do_syscall_64+0x26/0x760 [ 234.613033][ T9299] __x64_sys_write+0x73/0xb0 [ 234.617632][ T9299] do_syscall_64+0xfa/0x760 [ 234.622161][ T9299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.628094][ T9299] RIP: 0033:0x459a29 [ 234.632052][ T9299] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.651665][ T9299] RSP: 002b:00007efe69754c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 234.660184][ T9299] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 234.668173][ T9299] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 234.676240][ T9299] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 234.684310][ T9299] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efe697556d4 [ 234.692541][ T9299] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 234.809960][ T9299] memory: usage 9032kB, limit 0kB, failcnt 8 [ 234.875819][ T9299] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 234.924741][ T9299] Memory cgroup stats for /syz2: [ 234.924980][ T9299] anon 6623232 [ 234.924980][ T9299] file 0 [ 234.924980][ T9299] kernel_stack 65536 [ 234.924980][ T9299] slab 2007040 [ 234.924980][ T9299] sock 0 [ 234.924980][ T9299] shmem 0 [ 234.924980][ T9299] file_mapped 0 [ 234.924980][ T9299] file_dirty 0 [ 234.924980][ T9299] file_writeback 0 [ 234.924980][ T9299] anon_thp 6291456 [ 234.924980][ T9299] inactive_anon 0 [ 234.924980][ T9299] active_anon 6557696 [ 234.924980][ T9299] inactive_file 0 [ 234.924980][ T9299] active_file 0 [ 234.924980][ T9299] unevictable 0 [ 234.924980][ T9299] slab_reclaimable 405504 [ 234.924980][ T9299] slab_unreclaimable 1601536 [ 234.924980][ T9299] pgfault 792 [ 234.924980][ T9299] pgmajfault 0 [ 234.924980][ T9299] workingset_refault 0 [ 234.924980][ T9299] workingset_activate 0 [ 234.924980][ T9299] workingset_nodereclaim 0 [ 234.924980][ T9299] pgrefill 0 [ 234.924980][ T9299] pgscan 0 [ 234.924980][ T9299] pgsteal 0 [ 234.924980][ T9299] pgactivate 0 [ 235.021247][ T9299] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9171,uid=0 [ 235.038036][ T9299] Memory cgroup out of memory: Killed process 9171 (syz-executor.2) total-vm:72708kB, anon-rss:4248kB, file-rss:35792kB, shmem-rss:0kB, UID:0 pgtables:147456kB oom_score_adj:1000 [ 235.059064][ T1066] oom_reaper: reaped process 9171 (syz-executor.2), now anon-rss:0kB, file-rss:34832kB, shmem-rss:0kB [ 235.071327][ T9294] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 235.083689][ T9294] CPU: 0 PID: 9294 Comm: syz-executor.2 Not tainted 5.3.0-next-20190926 #0 [ 235.092391][ T9294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.102453][ T9294] Call Trace: [ 235.105755][ T9294] dump_stack+0x172/0x1f0 [ 235.110114][ T9294] dump_header+0x177/0x1152 [ 235.114625][ T9294] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 235.120436][ T9294] ? ___ratelimit+0x2c8/0x595 [ 235.125119][ T9294] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 235.130943][ T9294] ? lockdep_hardirqs_on+0x421/0x5e0 [ 235.136246][ T9294] ? trace_hardirqs_on+0x67/0x240 [ 235.141281][ T9294] ? pagefault_out_of_memory+0x11c/0x11c [ 235.146929][ T9294] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 235.152934][ T9294] ? ___ratelimit+0x60/0x595 [ 235.157517][ T9294] ? do_raw_spin_unlock+0x57/0x270 [ 235.162621][ T9294] oom_kill_process.cold+0x10/0x15 [ 235.167726][ T9294] out_of_memory+0x334/0x1340 [ 235.172395][ T9294] ? lock_downgrade+0x920/0x920 [ 235.177254][ T9294] ? oom_killer_disable+0x280/0x280 [ 235.182552][ T9294] mem_cgroup_out_of_memory+0x1d8/0x240 [ 235.188391][ T9294] ? memcg_stat_show+0xc40/0xc40 [ 235.193336][ T9294] ? do_raw_spin_unlock+0x57/0x270 [ 235.198452][ T9294] ? _raw_spin_unlock+0x2d/0x50 [ 235.203463][ T9294] try_charge+0xf4b/0x1440 [ 235.208061][ T9294] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 235.213806][ T9294] ? percpu_ref_tryget_live+0x111/0x290 [ 235.219436][ T9294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.225666][ T9294] ? __kasan_check_read+0x11/0x20 [ 235.230756][ T9294] ? get_mem_cgroup_from_mm+0x156/0x320 [ 235.236309][ T9294] mem_cgroup_try_charge+0x136/0x590 [ 235.241734][ T9294] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 235.247992][ T9294] mem_cgroup_try_charge_delay+0x1f/0xa0 [ 235.253626][ T9294] __handle_mm_fault+0x1f07/0x4040 [ 235.258743][ T9294] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 235.264333][ T9294] ? handle_mm_fault+0x292/0xaa0 [ 235.269267][ T9294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.275504][ T9294] ? __kasan_check_read+0x11/0x20 [ 235.280527][ T9294] handle_mm_fault+0x3b7/0xaa0 [ 235.285286][ T9294] __do_page_fault+0x536/0xdd0 [ 235.290051][ T9294] do_page_fault+0x38/0x590 [ 235.294736][ T9294] page_fault+0x39/0x40 [ 235.298889][ T9294] RIP: 0033:0x41136f [ 235.302794][ T9294] Code: 0f 84 c8 02 00 00 48 83 bd 78 ff ff ff 00 0f 84 f9 04 00 00 48 8b 95 68 ff ff ff 44 89 95 38 ff ff ff 4c 8d ac 10 00 f7 ff ff <49> 89 85 90 06 00 00 49 8d 85 10 03 00 00 49 89 95 98 06 00 00 41 [ 235.322777][ T9294] RSP: 002b:00007ffeb9b6e460 EFLAGS: 00010206 [ 235.328940][ T9294] RAX: 00007efe696f3000 RBX: 0000000000020000 RCX: 0000000000459a7a [ 235.336910][ T9294] RDX: 0000000000021000 RSI: 0000000000021000 RDI: 0000000000000000 [ 235.344963][ T9294] RBP: 00007ffeb9b6e540 R08: ffffffffffffffff R09: 0000000000000000 [ 235.353106][ T9294] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffeb9b6e630 [ 235.361089][ T9294] R13: 00007efe69713700 R14: 0000000000000002 R15: 000000000075c07c [ 235.370215][ T9294] memory: usage 4624kB, limit 0kB, failcnt 21 [ 235.376544][ T9294] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 235.383389][ T9294] Memory cgroup stats for /syz2: [ 235.383548][ T9294] anon 2355200 [ 235.383548][ T9294] file 0 [ 235.383548][ T9294] kernel_stack 65536 [ 235.383548][ T9294] slab 2007040 [ 235.383548][ T9294] sock 0 [ 235.383548][ T9294] shmem 0 [ 235.383548][ T9294] file_mapped 0 [ 235.383548][ T9294] file_dirty 0 [ 235.383548][ T9294] file_writeback 0 [ 235.383548][ T9294] anon_thp 2097152 [ 235.383548][ T9294] inactive_anon 0 [ 235.383548][ T9294] active_anon 2289664 [ 235.383548][ T9294] inactive_file 0 [ 235.383548][ T9294] active_file 0 [ 235.383548][ T9294] unevictable 0 [ 235.383548][ T9294] slab_reclaimable 405504 [ 235.383548][ T9294] slab_unreclaimable 1601536 [ 235.383548][ T9294] pgfault 792 [ 235.383548][ T9294] pgmajfault 0 [ 235.383548][ T9294] workingset_refault 0 [ 235.383548][ T9294] workingset_activate 0 [ 235.383548][ T9294] workingset_nodereclaim 0 [ 235.383548][ T9294] pgrefill 0 [ 235.383548][ T9294] pgscan 0 [ 235.383548][ T9294] pgsteal 0 [ 235.383548][ T9294] pgactivate 0 [ 235.480785][ T9294] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9294,uid=0 [ 235.498191][ T9294] Memory cgroup out of memory: Killed process 9294 (syz-executor.2) total-vm:72840kB, anon-rss:2148kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:143360kB oom_score_adj:1000 [ 235.518119][ T1066] oom_reaper: reaped process 9294 (syz-executor.2), now anon-rss:0kB, file-rss:33856kB, shmem-rss:0kB 04:43:04 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) recvmsg$kcm(r0, &(0x7f0000004040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800020000000400100000da060000d5e34adddb5692337b0e00020000000034000000000400"], &(0x7f0000000280)=""/237, 0x2a, 0xed, 0x1}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r6 = socket$kcm(0x29, 0x5, 0x0) gettid() write$cgroup_pid(r5, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e000000520081f8f7000000000000040a4865160b0001000e000000000004000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x41, 0x0, 0x5, 0x4, 0x0, 0x10000, 0x100c4, 0x8, 0x89, 0x451, 0x0, 0x63, 0x1, 0xc9e, 0x0, 0x1, 0x5, 0x9, 0x6, 0x100000000, 0x9, 0xe7a7, 0x20, 0x5b, 0x4, 0xfffffffffffffffc, 0x0, 0x8001, 0x1000, 0x10000, 0xff, 0x0, 0x9, 0x8, 0x0, 0x7, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xc}, 0x28, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r8 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(r4, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000540), 0x800) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x2f5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1e, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6627239a, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000200)='syzkaller\x00', 0x5, 0x75, &(0x7f0000000400)=""/117, 0x40f00, 0x0, [], 0x0, 0xf, r2, 0x8, &(0x7f0000000480)={0x4, 0x9}, 0x8, 0x10, 0x0, 0xffffffffffffff53}, 0x70) write$cgroup_int(r8, 0x0, 0x0) 04:43:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net////\x00', 0x400496602, 0x0) 04:43:04 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003700000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006502faff000000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 04:43:04 executing program 4: 04:43:04 executing program 0: [ 235.744036][ T8913] syz-executor.2 invoked oom-killer: gfp_mask=0x40c50(GFP_NOFS|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 235.764257][ T8913] CPU: 1 PID: 8913 Comm: syz-executor.2 Not tainted 5.3.0-next-20190926 #0 [ 235.772909][ T8913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.782973][ T8913] Call Trace: [ 235.786260][ T8913] dump_stack+0x172/0x1f0 [ 235.790581][ T8913] dump_header+0x177/0x1152 [ 235.795067][ T8913] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 235.800856][ T8913] ? ___ratelimit+0x2c8/0x595 [ 235.805516][ T8913] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 235.811310][ T8913] ? lockdep_hardirqs_on+0x421/0x5e0 [ 235.816675][ T8913] ? trace_hardirqs_on+0x67/0x240 [ 235.821868][ T8913] ? pagefault_out_of_memory+0x11c/0x11c [ 235.827500][ T8913] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 235.833420][ T8913] ? ___ratelimit+0x60/0x595 [ 235.837993][ T8913] ? do_raw_spin_unlock+0x57/0x270 [ 235.843102][ T8913] oom_kill_process.cold+0x10/0x15 [ 235.848200][ T8913] out_of_memory+0x334/0x1340 [ 235.852871][ T8913] ? lock_downgrade+0x920/0x920 [ 235.857709][ T8913] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 235.863673][ T8913] ? oom_killer_disable+0x280/0x280 [ 235.868891][ T8913] mem_cgroup_out_of_memory+0x1d8/0x240 [ 235.874424][ T8913] ? memcg_stat_show+0xc40/0xc40 [ 235.879347][ T8913] ? do_raw_spin_unlock+0x57/0x270 [ 235.884443][ T8913] ? _raw_spin_unlock+0x2d/0x50 [ 235.889283][ T8913] try_charge+0xf4b/0x1440 [ 235.893702][ T8913] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 235.899261][ T8913] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 235.904927][ T8913] ? cache_grow_begin+0x122/0xd20 [ 235.909941][ T8913] ? find_held_lock+0x35/0x130 [ 235.914709][ T8913] ? cache_grow_begin+0x122/0xd20 [ 235.919724][ T8913] __memcg_kmem_charge_memcg+0x7c/0x130 [ 235.925264][ T8913] ? lock_downgrade+0x920/0x920 [ 235.930888][ T8913] ? memcg_kmem_put_cache+0x50/0x50 [ 235.936074][ T8913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.942302][ T8913] ? __kasan_check_read+0x11/0x20 [ 235.947314][ T8913] cache_grow_begin+0x629/0xd20 [ 235.952149][ T8913] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 235.957862][ T8913] ? mempolicy_slab_node+0x139/0x390 [ 235.963238][ T8913] fallback_alloc+0x1fd/0x2d0 [ 235.967910][ T8913] ____cache_alloc_node+0x1bc/0x1d0 [ 235.973104][ T8913] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.979339][ T8913] kmem_cache_alloc+0x1ef/0x710 [ 235.984174][ T8913] ? lock_downgrade+0x920/0x920 [ 235.989010][ T8913] ? rwlock_bug.part.0+0x90/0x90 [ 235.993939][ T8913] ? ratelimit_state_init+0xb0/0xb0 [ 235.999122][ T8913] ext4_alloc_inode+0x1f/0x640 [ 236.003869][ T8913] ? ratelimit_state_init+0xb0/0xb0 [ 236.009053][ T8913] alloc_inode+0x68/0x1e0 [ 236.013371][ T8913] iget_locked+0x1a6/0x4b0 [ 236.017776][ T8913] __ext4_iget+0x265/0x3e20 [ 236.022282][ T8913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.028623][ T8913] ? ext4_get_projid+0x190/0x190 [ 236.033554][ T8913] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 236.039089][ T8913] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 236.045063][ T8913] ? d_alloc_parallel+0xa78/0x1c30 [ 236.050171][ T8913] ext4_lookup+0x3b1/0x7a0 [ 236.054577][ T8913] ? ext4_cross_rename+0x1430/0x1430 [ 236.059850][ T8913] ? __lock_acquire+0x16f2/0x4a00 [ 236.064882][ T8913] ? __kasan_check_read+0x11/0x20 [ 236.069907][ T8913] ? lockdep_init_map+0x1be/0x6d0 [ 236.074922][ T8913] __lookup_slow+0x279/0x500 [ 236.079502][ T8913] ? vfs_unlink+0x620/0x620 [ 236.084010][ T8913] lookup_slow+0x58/0x80 [ 236.088242][ T8913] path_mountpoint+0x5d2/0x1e60 [ 236.093085][ T8913] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 236.098891][ T8913] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 236.104875][ T8913] ? path_openat+0x46d0/0x46d0 [ 236.109662][ T8913] filename_mountpoint+0x18e/0x390 [ 236.114764][ T8913] ? filename_parentat.isra.0+0x410/0x410 [ 236.120476][ T8913] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 236.126652][ T8913] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.132893][ T8913] ? __phys_addr_symbol+0x30/0x70 [ 236.137960][ T8913] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 236.143772][ T8913] ? __check_object_size+0x3d/0x437 [ 236.148971][ T8913] ? strncpy_from_user+0x2b4/0x400 [ 236.154078][ T8913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.160389][ T8913] ? getname_flags+0x277/0x5b0 [ 236.165226][ T8913] user_path_mountpoint_at+0x3a/0x50 [ 236.170496][ T8913] ksys_umount+0x164/0xf00 [ 236.175070][ T8913] ? __ia32_sys_rmdir+0x40/0x40 [ 236.180010][ T8913] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.186264][ T8913] ? __detach_mounts+0x2a0/0x2a0 [ 236.191202][ T8913] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 236.196679][ T8913] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 236.202135][ T8913] ? do_syscall_64+0x26/0x760 [ 236.206802][ T8913] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.212852][ T8913] ? do_syscall_64+0x26/0x760 [ 236.217524][ T8913] ? lockdep_hardirqs_on+0x421/0x5e0 [ 236.222798][ T8913] __x64_sys_umount+0x54/0x80 [ 236.227460][ T8913] do_syscall_64+0xfa/0x760 [ 236.231976][ T8913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.237857][ T8913] RIP: 0033:0x45c457 [ 236.241741][ T8913] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.261542][ T8913] RSP: 002b:00007ffeb9b6d608 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 [ 236.270341][ T8913] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045c457 [ 236.278325][ T8913] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffeb9b6d6b0 [ 236.286282][ T8913] RBP: 0000000000000027 R08: 0000000000000000 R09: 000000000000000f 04:43:05 executing program 0: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) recvmsg$kcm(r0, &(0x7f0000004040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800020000000400100000da060000d5e34adddb5692337b0e00020000000034000000000400"], &(0x7f0000000280)=""/237, 0x2a, 0xed, 0x1}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r6 = socket$kcm(0x29, 0x5, 0x0) gettid() write$cgroup_pid(r5, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e000000520081f8f7000000000000040a4865160b0001000e000000000004000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x41, 0x0, 0x5, 0x4, 0x0, 0x10000, 0x100c4, 0x8, 0x89, 0x451, 0x0, 0x63, 0x1, 0xc9e, 0x0, 0x1, 0x5, 0x9, 0x6, 0x100000000, 0x9, 0xe7a7, 0x20, 0x5b, 0x4, 0xfffffffffffffffc, 0x0, 0x8001, 0x1000, 0x10000, 0xff, 0x0, 0x9, 0x8, 0x0, 0x7, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xc}, 0x28, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r8 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(r4, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000540), 0x800) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x2f5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1e, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6627239a, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000200)='syzkaller\x00', 0x5, 0x75, &(0x7f0000000400)=""/117, 0x40f00, 0x0, [], 0x0, 0xf, r2, 0x8, &(0x7f0000000480)={0x4, 0x9}, 0x8, 0x10, 0x0, 0xffffffffffffff53}, 0x70) write$cgroup_int(r8, 0x0, 0x0) 04:43:05 executing program 4: [ 236.294260][ T8913] R10: 000000000000000a R11: 0000000000000202 R12: 00007ffeb9b6e740 [ 236.302576][ T8913] R13: 0000555555fcb940 R14: 0000000000000000 R15: 00007ffeb9b6e740 [ 236.317084][ T8913] memory: usage 2228kB, limit 0kB, failcnt 41 [ 236.323824][ T8913] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 236.348376][ T8913] Memory cgroup stats for /syz2: [ 236.348627][ T8913] anon 184320 [ 236.348627][ T8913] file 0 [ 236.348627][ T8913] kernel_stack 0 [ 236.348627][ T8913] slab 2007040 [ 236.348627][ T8913] sock 0 [ 236.348627][ T8913] shmem 0 [ 236.348627][ T8913] file_mapped 0 [ 236.348627][ T8913] file_dirty 0 [ 236.348627][ T8913] file_writeback 0 [ 236.348627][ T8913] anon_thp 0 [ 236.348627][ T8913] inactive_anon 0 [ 236.348627][ T8913] active_anon 118784 [ 236.348627][ T8913] inactive_file 0 [ 236.348627][ T8913] active_file 0 04:43:05 executing program 1: [ 236.348627][ T8913] unevictable 0 [ 236.348627][ T8913] slab_reclaimable 405504 [ 236.348627][ T8913] slab_unreclaimable 1601536 [ 236.348627][ T8913] pgfault 792 [ 236.348627][ T8913] pgmajfault 0 [ 236.348627][ T8913] workingset_refault 0 [ 236.348627][ T8913] workingset_activate 0 [ 236.348627][ T8913] workingset_nodereclaim 0 [ 236.348627][ T8913] pgrefill 0 [ 236.348627][ T8913] pgscan 0 [ 236.348627][ T8913] pgsteal 0 [ 236.348627][ T8913] pgactivate 0 [ 236.348627][ T8913] pgdeactivate 0 04:43:05 executing program 4: 04:43:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:05 executing program 1: [ 236.607240][ T9360] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 236.783239][ T8913] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=8913,uid=0 [ 236.803574][ T8913] Memory cgroup out of memory: Killed process 8913 (syz-executor.2) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:135168kB oom_score_adj:0 [ 236.885025][ T1066] oom_reaper: reaped process 8913 (syz-executor.2), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB [ 236.900213][ T9360] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 236.916533][ T9360] CPU: 1 PID: 9360 Comm: syz-executor.0 Not tainted 5.3.0-next-20190926 #0 [ 236.925311][ T9360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.935370][ T9360] Call Trace: [ 236.938679][ T9360] dump_stack+0x172/0x1f0 [ 236.943028][ T9360] dump_header+0x177/0x1152 [ 236.947558][ T9360] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 236.953466][ T9360] ? ___ratelimit+0x2c8/0x595 [ 236.953540][ T9360] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 236.953556][ T9360] ? lockdep_hardirqs_on+0x421/0x5e0 [ 236.964126][ T9360] ? trace_hardirqs_on+0x67/0x240 [ 236.964143][ T9360] ? pagefault_out_of_memory+0x11c/0x11c [ 236.964160][ T9360] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 236.964181][ T9360] ? ___ratelimit+0x60/0x595 [ 236.991110][ T9360] ? do_raw_spin_unlock+0x57/0x270 [ 236.996249][ T9360] oom_kill_process.cold+0x10/0x15 [ 237.001436][ T9360] out_of_memory+0x334/0x1340 [ 237.006327][ T9360] ? oom_killer_disable+0x280/0x280 [ 237.011762][ T9360] mem_cgroup_out_of_memory+0x1d8/0x240 [ 237.017299][ T9360] ? memcg_stat_show+0xc40/0xc40 [ 237.022233][ T9360] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 237.028259][ T9360] ? cgroup_file_notify+0x140/0x1b0 [ 237.033466][ T9360] memory_max_write+0x262/0x3a0 [ 237.038316][ T9360] ? mem_cgroup_write+0x370/0x370 [ 237.043353][ T9360] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 237.048826][ T9360] cgroup_file_write+0x241/0x790 [ 237.053766][ T9360] ? mem_cgroup_write+0x370/0x370 [ 237.058844][ T9360] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 237.064465][ T9360] ? kernfs_ops+0x9f/0x120 [ 237.068922][ T9360] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 237.074547][ T9360] kernfs_fop_write+0x2b8/0x480 [ 237.079387][ T9360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.085619][ T9360] __vfs_write+0x8a/0x110 [ 237.089940][ T9360] ? kernfs_fop_open+0xd80/0xd80 [ 237.095099][ T9360] vfs_write+0x268/0x5d0 [ 237.099448][ T9360] ksys_write+0x14f/0x290 [ 237.103770][ T9360] ? __ia32_sys_read+0xb0/0xb0 [ 237.108529][ T9360] ? do_syscall_64+0x26/0x760 [ 237.113345][ T9360] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.119591][ T9360] ? do_syscall_64+0x26/0x760 [ 237.124263][ T9360] __x64_sys_write+0x73/0xb0 [ 237.128849][ T9360] do_syscall_64+0xfa/0x760 [ 237.133353][ T9360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.139325][ T9360] RIP: 0033:0x459a29 [ 237.143224][ T9360] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.162840][ T9360] RSP: 002b:00007fb9fc31cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 237.171240][ T9360] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 237.179213][ T9360] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 237.187191][ T9360] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 237.195328][ T9360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb9fc31d6d4 [ 237.203383][ T9360] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 237.213330][ T9360] memory: usage 10648kB, limit 0kB, failcnt 0 [ 237.247160][ T9360] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 237.254545][ T9360] Memory cgroup stats for /syz0: [ 237.258619][ T9360] anon 6873088 [ 237.258619][ T9360] file 118784 [ 237.258619][ T9360] kernel_stack 196608 [ 237.258619][ T9360] slab 3158016 [ 237.258619][ T9360] sock 0 [ 237.258619][ T9360] shmem 0 [ 237.258619][ T9360] file_mapped 0 [ 237.258619][ T9360] file_dirty 0 [ 237.258619][ T9360] file_writeback 0 [ 237.258619][ T9360] anon_thp 6291456 [ 237.258619][ T9360] inactive_anon 0 [ 237.258619][ T9360] active_anon 6799360 [ 237.258619][ T9360] inactive_file 135168 [ 237.258619][ T9360] active_file 0 [ 237.258619][ T9360] unevictable 0 [ 237.258619][ T9360] slab_reclaimable 946176 [ 237.258619][ T9360] slab_unreclaimable 2211840 [ 237.258619][ T9360] pgfault 3432 [ 237.258619][ T9360] pgmajfault 0 [ 237.258619][ T9360] workingset_refault 0 [ 237.258619][ T9360] workingset_activate 0 [ 237.258619][ T9360] workingset_nodereclaim 0 [ 237.258619][ T9360] pgrefill 0 [ 237.258619][ T9360] pgscan 0 [ 237.258619][ T9360] pgsteal 0 [ 237.258619][ T9360] pgactivate 0 [ 237.354825][ T9360] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9359,uid=0 [ 237.370437][ T9360] Memory cgroup out of memory: Killed process 9360 (syz-executor.0) total-vm:72708kB, anon-rss:2200kB, file-rss:35880kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 237.411499][ T8907] syz-executor.0 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 237.424259][ T8907] CPU: 0 PID: 8907 Comm: syz-executor.0 Not tainted 5.3.0-next-20190926 #0 [ 237.433021][ T8907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.443165][ T8907] Call Trace: [ 237.446476][ T8907] dump_stack+0x172/0x1f0 [ 237.450809][ T8907] dump_header+0x177/0x1152 [ 237.455326][ T8907] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 237.461317][ T8907] ? ___ratelimit+0x2c8/0x595 [ 237.466170][ T8907] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 237.472182][ T8907] ? lockdep_hardirqs_on+0x421/0x5e0 [ 237.477475][ T8907] ? trace_hardirqs_on+0x67/0x240 [ 237.482497][ T8907] ? pagefault_out_of_memory+0x11c/0x11c [ 237.488138][ T8907] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 237.493956][ T8907] ? ___ratelimit+0x60/0x595 [ 237.498542][ T8907] ? do_raw_spin_unlock+0x57/0x270 [ 237.503657][ T8907] oom_kill_process.cold+0x10/0x15 [ 237.508774][ T8907] out_of_memory+0x334/0x1340 [ 237.513457][ T8907] ? lock_downgrade+0x920/0x920 [ 237.518322][ T8907] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 237.524139][ T8907] ? oom_killer_disable+0x280/0x280 [ 237.529355][ T8907] mem_cgroup_out_of_memory+0x1d8/0x240 [ 237.534905][ T8907] ? memcg_stat_show+0xc40/0xc40 [ 237.539849][ T8907] ? do_raw_spin_unlock+0x57/0x270 [ 237.544980][ T8907] ? _raw_spin_unlock+0x2d/0x50 [ 237.549840][ T8907] try_charge+0xf4b/0x1440 [ 237.554385][ T8907] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 237.559933][ T8907] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 237.565492][ T8907] ? cache_grow_begin+0x122/0xd20 [ 237.570521][ T8907] ? find_held_lock+0x35/0x130 [ 237.575282][ T8907] ? cache_grow_begin+0x122/0xd20 [ 237.580315][ T8907] __memcg_kmem_charge_memcg+0x7c/0x130 [ 237.586045][ T8907] ? lock_downgrade+0x920/0x920 [ 237.590899][ T8907] ? memcg_kmem_put_cache+0x50/0x50 [ 237.596362][ T8907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.602698][ T8907] ? __kasan_check_read+0x11/0x20 [ 237.607814][ T8907] cache_grow_begin+0x629/0xd20 [ 237.612665][ T8907] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 237.618533][ T8907] ? mempolicy_slab_node+0x139/0x390 [ 237.623821][ T8907] fallback_alloc+0x1fd/0x2d0 [ 237.628506][ T8907] ____cache_alloc_node+0x1bc/0x1d0 [ 237.633712][ T8907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.640045][ T8907] kmem_cache_alloc+0x1ef/0x710 [ 237.644926][ T8907] ? rcu_read_lock_held+0x9c/0xb0 [ 237.649957][ T8907] __d_alloc+0x2e/0x8c0 [ 237.654118][ T8907] d_alloc+0x4d/0x280 [ 237.658104][ T8907] d_alloc_parallel+0xf4/0x1c30 [ 237.663047][ T8907] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 237.669296][ T8907] ? __d_lookup_rcu+0x6c0/0x6c0 [ 237.674146][ T8907] ? __lock_acquire+0x16f2/0x4a00 [ 237.679346][ T8907] ? __kasan_check_read+0x11/0x20 [ 237.684371][ T8907] ? mark_lock+0xc2/0x1220 [ 237.688787][ T8907] ? lockdep_init_map+0x1be/0x6d0 [ 237.693814][ T8907] ? lockdep_init_map+0x1be/0x6d0 [ 237.698933][ T8907] __lookup_slow+0x1ab/0x500 [ 237.703633][ T8907] ? vfs_unlink+0x620/0x620 [ 237.708173][ T8907] lookup_slow+0x58/0x80 [ 237.712415][ T8907] path_mountpoint+0x5d2/0x1e60 [ 237.717615][ T8907] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 237.723909][ T8907] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 237.730019][ T8907] ? path_openat+0x46d0/0x46d0 [ 237.734805][ T8907] filename_mountpoint+0x18e/0x390 [ 237.740081][ T8907] ? filename_parentat.isra.0+0x410/0x410 [ 237.745779][ T8907] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 237.751941][ T8907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.758184][ T8907] ? __phys_addr_symbol+0x30/0x70 [ 237.763197][ T8907] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 237.769184][ T8907] ? __check_object_size+0x3d/0x437 [ 237.774382][ T8907] ? strncpy_from_user+0x2b4/0x400 [ 237.779493][ T8907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.785724][ T8907] ? getname_flags+0x277/0x5b0 [ 237.790507][ T8907] user_path_mountpoint_at+0x3a/0x50 [ 237.795797][ T8907] ksys_umount+0x164/0xf00 [ 237.800196][ T8907] ? down_read_non_owner+0x490/0x490 [ 237.805466][ T8907] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 237.811693][ T8907] ? __detach_mounts+0x2a0/0x2a0 [ 237.816633][ T8907] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 237.822081][ T8907] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 237.827526][ T8907] ? do_syscall_64+0x26/0x760 [ 237.832198][ T8907] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.838260][ T8907] ? do_syscall_64+0x26/0x760 [ 237.843028][ T8907] ? lockdep_hardirqs_on+0x421/0x5e0 [ 237.848322][ T8907] __x64_sys_umount+0x54/0x80 [ 237.852992][ T8907] do_syscall_64+0xfa/0x760 [ 237.857490][ T8907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.863545][ T8907] RIP: 0033:0x45c457 [ 237.867549][ T8907] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.887418][ T8907] RSP: 002b:00007ffed9ab06f8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 237.896025][ T8907] RAX: ffffffffffffffda RBX: 0000000000039f05 RCX: 000000000045c457 [ 237.904051][ T8907] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffed9ab07a0 [ 237.912017][ T8907] RBP: 000000000000003e R08: 0000000000000000 R09: 000000000000000f [ 237.920372][ T8907] R10: 000000000000000a R11: 0000000000000206 R12: 00007ffed9ab1830 [ 237.928355][ T8907] R13: 000055555586c940 R14: 0000000000000000 R15: 00007ffed9ab1830 [ 237.939050][ T8907] memory: usage 8264kB, limit 0kB, failcnt 12 [ 237.945702][ T8907] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 237.953483][ T8907] Memory cgroup stats for /syz0: [ 237.953590][ T8907] anon 4595712 [ 237.953590][ T8907] file 118784 [ 237.953590][ T8907] kernel_stack 131072 [ 237.953590][ T8907] slab 3158016 [ 237.953590][ T8907] sock 0 [ 237.953590][ T8907] shmem 0 [ 237.953590][ T8907] file_mapped 0 [ 237.953590][ T8907] file_dirty 0 [ 237.953590][ T8907] file_writeback 0 [ 237.953590][ T8907] anon_thp 4194304 [ 237.953590][ T8907] inactive_anon 0 [ 237.953590][ T8907] active_anon 4595712 [ 237.953590][ T8907] inactive_file 135168 [ 237.953590][ T8907] active_file 0 [ 237.953590][ T8907] unevictable 0 [ 237.953590][ T8907] slab_reclaimable 946176 [ 237.953590][ T8907] slab_unreclaimable 2211840 [ 237.953590][ T8907] pgfault 3465 [ 237.953590][ T8907] pgmajfault 0 [ 237.953590][ T8907] workingset_refault 0 [ 237.953590][ T8907] workingset_activate 0 [ 237.953590][ T8907] workingset_nodereclaim 0 [ 237.953590][ T8907] pgrefill 0 [ 237.953590][ T8907] pgscan 33 [ 237.953590][ T8907] pgsteal 0 [ 237.953590][ T8907] pgactivate 0 [ 238.050181][ T8907] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8953,uid=0 [ 238.067659][ T8907] Memory cgroup out of memory: Killed process 8953 (syz-executor.0) total-vm:72708kB, anon-rss:2196kB, file-rss:35784kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 238.092351][ T8907] syz-executor.0 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 238.105181][ T8907] CPU: 0 PID: 8907 Comm: syz-executor.0 Not tainted 5.3.0-next-20190926 #0 [ 238.113985][ T8907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.124042][ T8907] Call Trace: [ 238.127345][ T8907] dump_stack+0x172/0x1f0 [ 238.131674][ T8907] dump_header+0x177/0x1152 [ 238.136164][ T8907] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 238.141961][ T8907] ? ___ratelimit+0x2c8/0x595 [ 238.146643][ T8907] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 238.153324][ T8907] ? lockdep_hardirqs_on+0x421/0x5e0 [ 238.158599][ T8907] ? trace_hardirqs_on+0x67/0x240 [ 238.163614][ T8907] ? pagefault_out_of_memory+0x11c/0x11c [ 238.169243][ T8907] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 238.175057][ T8907] ? ___ratelimit+0x60/0x595 [ 238.179727][ T8907] ? do_raw_spin_unlock+0x57/0x270 [ 238.184829][ T8907] oom_kill_process.cold+0x10/0x15 [ 238.190035][ T8907] out_of_memory+0x334/0x1340 [ 238.194987][ T8907] ? lock_downgrade+0x920/0x920 [ 238.199832][ T8907] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 238.205631][ T8907] ? oom_killer_disable+0x280/0x280 [ 238.210837][ T8907] mem_cgroup_out_of_memory+0x1d8/0x240 [ 238.216381][ T8907] ? memcg_stat_show+0xc40/0xc40 [ 238.221495][ T8907] ? do_raw_spin_unlock+0x57/0x270 [ 238.226609][ T8907] ? _raw_spin_unlock+0x2d/0x50 [ 238.231472][ T8907] try_charge+0xf4b/0x1440 [ 238.235896][ T8907] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 238.241439][ T8907] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 238.247007][ T8907] ? cache_grow_begin+0x122/0xd20 [ 238.252033][ T8907] ? find_held_lock+0x35/0x130 [ 238.256780][ T8907] ? cache_grow_begin+0x122/0xd20 [ 238.261802][ T8907] __memcg_kmem_charge_memcg+0x7c/0x130 [ 238.267342][ T8907] ? lock_downgrade+0x920/0x920 [ 238.272185][ T8907] ? memcg_kmem_put_cache+0x50/0x50 [ 238.277383][ T8907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.283649][ T8907] ? __kasan_check_read+0x11/0x20 [ 238.288851][ T8907] cache_grow_begin+0x629/0xd20 [ 238.293864][ T8907] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 238.299585][ T8907] ? mempolicy_slab_node+0x139/0x390 [ 238.305577][ T8907] fallback_alloc+0x1fd/0x2d0 [ 238.310267][ T8907] ____cache_alloc_node+0x1bc/0x1d0 [ 238.315616][ T8907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 238.322121][ T8907] kmem_cache_alloc+0x1ef/0x710 [ 238.327074][ T8907] ? rcu_read_lock_held+0x9c/0xb0 [ 238.332087][ T8907] __d_alloc+0x2e/0x8c0 [ 238.336357][ T8907] d_alloc+0x4d/0x280 [ 238.340323][ T8907] d_alloc_parallel+0xf4/0x1c30 [ 238.345165][ T8907] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 238.351419][ T8907] ? __d_lookup_rcu+0x6c0/0x6c0 [ 238.356324][ T8907] ? __lock_acquire+0x16f2/0x4a00 [ 238.361332][ T8907] ? __kasan_check_read+0x11/0x20 [ 238.366386][ T8907] ? mark_lock+0xc2/0x1220 [ 238.370805][ T8907] ? lockdep_init_map+0x1be/0x6d0 [ 238.376015][ T8907] ? lockdep_init_map+0x1be/0x6d0 [ 238.381034][ T8907] __lookup_slow+0x1ab/0x500 [ 238.385605][ T8907] ? vfs_unlink+0x620/0x620 [ 238.390133][ T8907] lookup_slow+0x58/0x80 [ 238.394378][ T8907] path_mountpoint+0x5d2/0x1e60 [ 238.399217][ T8907] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 238.404769][ T8907] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 238.410748][ T8907] ? path_openat+0x46d0/0x46d0 [ 238.415510][ T8907] filename_mountpoint+0x18e/0x390 [ 238.420603][ T8907] ? filename_parentat.isra.0+0x410/0x410 [ 238.426316][ T8907] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 238.432620][ T8907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 238.439093][ T8907] ? __phys_addr_symbol+0x30/0x70 [ 238.444106][ T8907] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 238.449914][ T8907] ? __check_object_size+0x3d/0x437 [ 238.455635][ T8907] ? strncpy_from_user+0x2b4/0x400 [ 238.460958][ T8907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.467286][ T8907] ? getname_flags+0x277/0x5b0 [ 238.472065][ T8907] user_path_mountpoint_at+0x3a/0x50 [ 238.477340][ T8907] ksys_umount+0x164/0xf00 [ 238.481740][ T8907] ? down_read_non_owner+0x490/0x490 [ 238.487104][ T8907] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 238.493335][ T8907] ? __detach_mounts+0x2a0/0x2a0 [ 238.498260][ T8907] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 238.503704][ T8907] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 238.509157][ T8907] ? do_syscall_64+0x26/0x760 [ 238.513870][ T8907] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.519930][ T8907] ? do_syscall_64+0x26/0x760 [ 238.524604][ T8907] ? lockdep_hardirqs_on+0x421/0x5e0 [ 238.529886][ T8907] __x64_sys_umount+0x54/0x80 [ 238.534559][ T8907] do_syscall_64+0xfa/0x760 [ 238.539050][ T8907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.544928][ T8907] RIP: 0033:0x45c457 [ 238.548814][ T8907] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.568616][ T8907] RSP: 002b:00007ffed9ab06f8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 238.577038][ T8907] RAX: ffffffffffffffda RBX: 0000000000039f05 RCX: 000000000045c457 [ 238.585002][ T8907] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffed9ab07a0 [ 238.592957][ T8907] RBP: 000000000000003e R08: 0000000000000000 R09: 000000000000000f [ 238.601007][ T8907] R10: 000000000000000a R11: 0000000000000206 R12: 00007ffed9ab1830 [ 238.608973][ T8907] R13: 000055555586c940 R14: 0000000000000000 R15: 00007ffed9ab1830 04:43:07 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) recvmsg$kcm(r0, &(0x7f0000004040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800020000000400100000da060000d5e34adddb5692337b0e00020000000034000000000400"], &(0x7f0000000280)=""/237, 0x2a, 0xed, 0x1}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r6 = socket$kcm(0x29, 0x5, 0x0) gettid() write$cgroup_pid(r5, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e000000520081f8f7000000000000040a4865160b0001000e000000000004000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x41, 0x0, 0x5, 0x4, 0x0, 0x10000, 0x100c4, 0x8, 0x89, 0x451, 0x0, 0x63, 0x1, 0xc9e, 0x0, 0x1, 0x5, 0x9, 0x6, 0x100000000, 0x9, 0xe7a7, 0x20, 0x5b, 0x4, 0xfffffffffffffffc, 0x0, 0x8001, 0x1000, 0x10000, 0xff, 0x0, 0x9, 0x8, 0x0, 0x7, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xc}, 0x28, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r8 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(r4, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000540), 0x800) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x2f5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1e, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6627239a, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000200)='syzkaller\x00', 0x5, 0x75, &(0x7f0000000400)=""/117, 0x40f00, 0x0, [], 0x0, 0xf, r2, 0x8, &(0x7f0000000480)={0x4, 0x9}, 0x8, 0x10, 0x0, 0xffffffffffffff53}, 0x70) write$cgroup_int(r8, 0x0, 0x0) 04:43:07 executing program 4: 04:43:07 executing program 3: 04:43:07 executing program 1: 04:43:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:07 executing program 0: [ 238.620419][ T8907] memory: usage 5916kB, limit 0kB, failcnt 18 [ 238.633199][ T8907] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 04:43:07 executing program 1: [ 238.663894][ T8907] Memory cgroup stats for /syz0: [ 238.664010][ T8907] anon 2375680 [ 238.664010][ T8907] file 118784 [ 238.664010][ T8907] kernel_stack 131072 [ 238.664010][ T8907] slab 3158016 [ 238.664010][ T8907] sock 0 [ 238.664010][ T8907] shmem 0 [ 238.664010][ T8907] file_mapped 0 [ 238.664010][ T8907] file_dirty 0 [ 238.664010][ T8907] file_writeback 0 [ 238.664010][ T8907] anon_thp 2097152 [ 238.664010][ T8907] inactive_anon 0 [ 238.664010][ T8907] active_anon 2375680 [ 238.664010][ T8907] inactive_file 135168 04:43:07 executing program 4: [ 238.664010][ T8907] active_file 0 [ 238.664010][ T8907] unevictable 0 [ 238.664010][ T8907] slab_reclaimable 946176 [ 238.664010][ T8907] slab_unreclaimable 2211840 [ 238.664010][ T8907] pgfault 3465 [ 238.664010][ T8907] pgmajfault 0 [ 238.664010][ T8907] workingset_refault 0 [ 238.664010][ T8907] workingset_activate 0 [ 238.664010][ T8907] workingset_nodereclaim 0 [ 238.664010][ T8907] pgrefill 33 [ 238.664010][ T8907] pgscan 33 [ 238.664010][ T8907] pgsteal 0 [ 238.664010][ T8907] pgactivate 0 04:43:07 executing program 3: 04:43:07 executing program 4: 04:43:07 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) recvmsg$kcm(r0, &(0x7f0000004040)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffef1) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb01001800020000000400100000da060000d5e34adddb5692337b0e00020000000034000000000400"], &(0x7f0000000280)=""/237, 0x2a, 0xed, 0x1}, 0x20) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r6 = socket$kcm(0x29, 0x5, 0x0) gettid() write$cgroup_pid(r5, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e000000520081f8f7000000000000040a4865160b0001000e000000000004000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x41, 0x0, 0x5, 0x4, 0x0, 0x10000, 0x100c4, 0x8, 0x89, 0x451, 0x0, 0x63, 0x1, 0xc9e, 0x0, 0x1, 0x5, 0x9, 0x6, 0x100000000, 0x9, 0xe7a7, 0x20, 0x5b, 0x4, 0xfffffffffffffffc, 0x0, 0x8001, 0x1000, 0x10000, 0xff, 0x0, 0x9, 0x8, 0x0, 0x7, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0xc}, 0x28, 0x4, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x8) openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xe, &(0x7f0000000000), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) r8 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(r4, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000540), 0x800) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x2f5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1e, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6627239a, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000200)='syzkaller\x00', 0x5, 0x75, &(0x7f0000000400)=""/117, 0x40f00, 0x0, [], 0x0, 0xf, r2, 0x8, &(0x7f0000000480)={0x4, 0x9}, 0x8, 0x10, 0x0, 0xffffffffffffff53}, 0x70) write$cgroup_int(r8, 0x0, 0x0) 04:43:07 executing program 1: 04:43:07 executing program 3: [ 239.026137][ T8907] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=9022,uid=0 04:43:07 executing program 4: [ 239.094976][ T8907] Memory cgroup out of memory: Killed process 9022 (syz-executor.0) total-vm:72840kB, anon-rss:2208kB, file-rss:34816kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:1000 04:43:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:08 executing program 3: 04:43:08 executing program 1: [ 239.204191][ T1066] oom_reaper: reaped process 9022 (syz-executor.0), now anon-rss:0kB, file-rss:34688kB, shmem-rss:0kB [ 239.311430][ T8907] syz-executor.0 invoked oom-killer: gfp_mask=0x40cd0(GFP_KERNEL|__GFP_COMP|__GFP_RECLAIMABLE), order=0, oom_score_adj=0 [ 239.402710][ T8907] CPU: 0 PID: 8907 Comm: syz-executor.0 Not tainted 5.3.0-next-20190926 #0 [ 239.411460][ T8907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.421863][ T8907] Call Trace: [ 239.425256][ T8907] dump_stack+0x172/0x1f0 [ 239.429983][ T8907] dump_header+0x177/0x1152 [ 239.434574][ T8907] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 239.440901][ T8907] ? ___ratelimit+0x2c8/0x595 [ 239.445674][ T8907] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 239.451571][ T8907] ? lockdep_hardirqs_on+0x421/0x5e0 [ 239.456845][ T8907] ? trace_hardirqs_on+0x67/0x240 [ 239.461859][ T8907] ? pagefault_out_of_memory+0x11c/0x11c [ 239.467496][ T8907] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 239.473450][ T8907] ? ___ratelimit+0x60/0x595 [ 239.478219][ T8907] ? do_raw_spin_unlock+0x57/0x270 [ 239.483610][ T8907] oom_kill_process.cold+0x10/0x15 [ 239.488828][ T8907] out_of_memory+0x334/0x1340 [ 239.493583][ T8907] ? lock_downgrade+0x920/0x920 [ 239.498511][ T8907] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 239.504920][ T8907] ? oom_killer_disable+0x280/0x280 [ 239.510120][ T8907] mem_cgroup_out_of_memory+0x1d8/0x240 [ 239.515826][ T8907] ? memcg_stat_show+0xc40/0xc40 [ 239.520754][ T8907] ? do_raw_spin_unlock+0x57/0x270 [ 239.525872][ T8907] ? _raw_spin_unlock+0x2d/0x50 [ 239.531004][ T8907] try_charge+0xf4b/0x1440 [ 239.535587][ T8907] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 239.541135][ T8907] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 239.546846][ T8907] ? cache_grow_begin+0x122/0xd20 [ 239.551861][ T8907] ? find_held_lock+0x35/0x130 [ 239.556851][ T8907] ? cache_grow_begin+0x122/0xd20 [ 239.562971][ T8907] __memcg_kmem_charge_memcg+0x7c/0x130 [ 239.568536][ T8907] ? lock_downgrade+0x920/0x920 [ 239.573478][ T8907] ? memcg_kmem_put_cache+0x50/0x50 [ 239.578667][ T8907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.585080][ T8907] ? __kasan_check_read+0x11/0x20 [ 239.590097][ T8907] cache_grow_begin+0x629/0xd20 [ 239.595154][ T8907] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 239.601037][ T8907] ? mempolicy_slab_node+0x139/0x390 [ 239.606506][ T8907] fallback_alloc+0x1fd/0x2d0 [ 239.611425][ T8907] ____cache_alloc_node+0x1bc/0x1d0 [ 239.616611][ T8907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 239.626807][ T8907] kmem_cache_alloc+0x1ef/0x710 [ 239.631648][ T8907] ? rcu_read_lock_held+0x9c/0xb0 [ 239.636675][ T8907] __d_alloc+0x2e/0x8c0 [ 239.640819][ T8907] d_alloc+0x4d/0x280 [ 239.644805][ T8907] d_alloc_parallel+0xf4/0x1c30 [ 239.649864][ T8907] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.656812][ T8907] ? __d_lookup_rcu+0x6c0/0x6c0 [ 239.661759][ T8907] ? __lock_acquire+0x16f2/0x4a00 [ 239.666901][ T8907] ? __kasan_check_read+0x11/0x20 [ 239.671913][ T8907] ? mark_lock+0xc2/0x1220 [ 239.677010][ T8907] ? lockdep_init_map+0x1be/0x6d0 [ 239.682132][ T8907] ? lockdep_init_map+0x1be/0x6d0 [ 239.687148][ T8907] __lookup_slow+0x1ab/0x500 [ 239.692261][ T8907] ? vfs_unlink+0x620/0x620 [ 239.696941][ T8907] lookup_slow+0x58/0x80 [ 239.701273][ T8907] path_mountpoint+0x5d2/0x1e60 [ 239.706112][ T8907] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 239.711750][ T8907] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 239.717836][ T8907] ? path_openat+0x46d0/0x46d0 [ 239.722755][ T8907] filename_mountpoint+0x18e/0x390 [ 239.727949][ T8907] ? filename_parentat.isra.0+0x410/0x410 [ 239.733742][ T8907] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 239.740458][ T8907] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 239.746772][ T8907] ? __phys_addr_symbol+0x30/0x70 [ 239.752070][ T8907] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 239.757864][ T8907] ? __check_object_size+0x3d/0x437 [ 239.763053][ T8907] ? strncpy_from_user+0x2b4/0x400 [ 239.768307][ T8907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.775412][ T8907] ? getname_flags+0x277/0x5b0 [ 239.780263][ T8907] user_path_mountpoint_at+0x3a/0x50 [ 239.786087][ T8907] ksys_umount+0x164/0xf00 [ 239.790497][ T8907] ? down_read_non_owner+0x490/0x490 [ 239.796214][ T8907] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.802889][ T8907] ? __detach_mounts+0x2a0/0x2a0 [ 239.808783][ T8907] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 239.815446][ T8907] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 239.821297][ T8907] ? do_syscall_64+0x26/0x760 [ 239.826611][ T8907] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.833472][ T8907] ? do_syscall_64+0x26/0x760 [ 239.838224][ T8907] ? lockdep_hardirqs_on+0x421/0x5e0 [ 239.843606][ T8907] __x64_sys_umount+0x54/0x80 [ 239.848285][ T8907] do_syscall_64+0xfa/0x760 [ 239.852885][ T8907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.858766][ T8907] RIP: 0033:0x45c457 [ 239.862649][ T8907] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.882703][ T8907] RSP: 002b:00007ffed9ab06f8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 239.891527][ T8907] RAX: ffffffffffffffda RBX: 0000000000039f05 RCX: 000000000045c457 [ 239.899748][ T8907] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007ffed9ab07a0 [ 239.907706][ T8907] RBP: 000000000000003e R08: 0000000000000000 R09: 000000000000000f [ 239.915991][ T8907] R10: 000000000000000a R11: 0000000000000206 R12: 00007ffed9ab1830 [ 239.924054][ T8907] R13: 000055555586c940 R14: 0000000000000000 R15: 00007ffed9ab1830 [ 240.178698][ T8907] memory: usage 3600kB, limit 0kB, failcnt 31 [ 240.185872][ T8907] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 240.211467][ T8907] Memory cgroup stats for /syz0: [ 240.211570][ T8907] anon 225280 [ 240.211570][ T8907] file 118784 [ 240.211570][ T8907] kernel_stack 65536 [ 240.211570][ T8907] slab 3158016 [ 240.211570][ T8907] sock 0 [ 240.211570][ T8907] shmem 0 [ 240.211570][ T8907] file_mapped 0 [ 240.211570][ T8907] file_dirty 0 [ 240.211570][ T8907] file_writeback 0 [ 240.211570][ T8907] anon_thp 0 [ 240.211570][ T8907] inactive_anon 0 [ 240.211570][ T8907] active_anon 225280 [ 240.211570][ T8907] inactive_file 135168 [ 240.211570][ T8907] active_file 0 [ 240.211570][ T8907] unevictable 0 [ 240.211570][ T8907] slab_reclaimable 946176 [ 240.211570][ T8907] slab_unreclaimable 2211840 [ 240.211570][ T8907] pgfault 3465 [ 240.211570][ T8907] pgmajfault 0 [ 240.211570][ T8907] workingset_refault 0 [ 240.211570][ T8907] workingset_activate 0 [ 240.211570][ T8907] workingset_nodereclaim 0 [ 240.211570][ T8907] pgrefill 33 [ 240.211570][ T8907] pgscan 33 [ 240.211570][ T8907] pgsteal 0 [ 240.211570][ T8907] pgactivate 0 [ 240.319231][ T8907] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=8907,uid=0 [ 240.340526][ T8907] Memory cgroup out of memory: Killed process 8907 (syz-executor.0) total-vm:72444kB, anon-rss:100kB, file-rss:35776kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:0 [ 240.365055][ T1066] oom_reaper: reaped process 8907 (syz-executor.0), now anon-rss:0kB, file-rss:34880kB, shmem-rss:0kB 04:43:09 executing program 0: 04:43:09 executing program 4: 04:43:09 executing program 3: 04:43:09 executing program 1: 04:43:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 241.605855][ T46] device bridge_slave_1 left promiscuous mode [ 241.614608][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.699972][ T46] device bridge_slave_0 left promiscuous mode [ 241.706348][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.546800][ T46] device hsr_slave_0 left promiscuous mode [ 243.606276][ T46] device hsr_slave_1 left promiscuous mode [ 243.659779][ T46] team0 (unregistering): Port device team_slave_1 removed [ 243.672243][ T46] team0 (unregistering): Port device team_slave_0 removed [ 243.685602][ T46] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 243.725954][ T46] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 243.823898][ T46] bond0 (unregistering): Released all slaves [ 243.935526][ T9416] IPVS: ftp: loaded support on port[0] = 21 [ 244.018474][ T9416] chnl_net:caif_netlink_parms(): no params data found [ 244.099263][ T9416] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.112831][ T9416] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.123591][ T9416] device bridge_slave_0 entered promiscuous mode [ 244.138294][ T9416] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.145522][ T9416] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.160026][ T9416] device bridge_slave_1 entered promiscuous mode [ 244.193459][ T9416] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 244.214648][ T9416] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 244.244356][ T9416] team0: Port device team_slave_0 added [ 244.258840][ T9416] team0: Port device team_slave_1 added [ 244.329112][ T9416] device hsr_slave_0 entered promiscuous mode [ 244.382806][ T9416] device hsr_slave_1 entered promiscuous mode [ 244.456158][ T9416] debugfs: Directory 'hsr0' with parent '/' already present! [ 244.483886][ T9416] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.491208][ T9416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.498739][ T9416] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.505806][ T9416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.582408][ T9416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.605442][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.622061][ T3570] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.632584][ T3570] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.655009][ T9416] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.673776][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.690707][ T3570] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.697858][ T3570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.737143][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.752896][ T3583] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.760553][ T3583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.777700][ T3583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.804017][ T9416] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 244.821903][ T9416] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 244.837177][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 244.845295][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.861434][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 244.874087][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 244.902457][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 244.915241][ T9416] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 245.122383][ T9424] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 245.221240][ T9424] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 245.241829][ T9424] CPU: 0 PID: 9424 Comm: syz-executor.2 Not tainted 5.3.0-next-20190926 #0 [ 245.250471][ T9424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.260627][ T9424] Call Trace: [ 245.263935][ T9424] dump_stack+0x172/0x1f0 [ 245.268274][ T9424] dump_header+0x177/0x1152 [ 245.273040][ T9424] ? pagefault_out_of_memory+0x11c/0x11c [ 245.278694][ T9424] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 245.284490][ T9424] ? ___ratelimit+0x60/0x595 [ 245.289069][ T9424] ? do_raw_spin_unlock+0x57/0x270 [ 245.294295][ T9424] oom_kill_process.cold+0x10/0x15 [ 245.299406][ T9424] out_of_memory+0x334/0x1340 [ 245.304236][ T9424] ? __sched_text_start+0x8/0x8 [ 245.309082][ T9424] ? oom_killer_disable+0x280/0x280 [ 245.314276][ T9424] mem_cgroup_out_of_memory+0x1d8/0x240 [ 245.319808][ T9424] ? memcg_stat_show+0xc40/0xc40 [ 245.324733][ T9424] ? _raw_spin_unlock_irqrestore+0xbd/0xe0 [ 245.330537][ T9424] ? cgroup_file_notify+0x140/0x1b0 [ 245.335720][ T9424] memory_max_write+0x262/0x3a0 [ 245.340556][ T9424] ? mem_cgroup_write+0x370/0x370 [ 245.345584][ T9424] ? lock_acquire+0x190/0x410 [ 245.350249][ T9424] ? kernfs_fop_write+0x227/0x480 [ 245.355261][ T9424] cgroup_file_write+0x241/0x790 [ 245.360188][ T9424] ? mem_cgroup_write+0x370/0x370 [ 245.365240][ T9424] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 245.370887][ T9424] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 245.376518][ T9424] kernfs_fop_write+0x2b8/0x480 [ 245.381360][ T9424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 245.387672][ T9424] __vfs_write+0x8a/0x110 [ 245.391986][ T9424] ? kernfs_fop_open+0xd80/0xd80 [ 245.396905][ T9424] vfs_write+0x268/0x5d0 [ 245.401132][ T9424] ksys_write+0x14f/0x290 [ 245.405460][ T9424] ? __ia32_sys_read+0xb0/0xb0 [ 245.410311][ T9424] ? do_syscall_64+0x26/0x760 [ 245.415148][ T9424] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.421318][ T9424] ? do_syscall_64+0x26/0x760 [ 245.425989][ T9424] __x64_sys_write+0x73/0xb0 [ 245.430577][ T9424] do_syscall_64+0xfa/0x760 [ 245.435266][ T9424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.441159][ T9424] RIP: 0033:0x459a29 [ 245.445044][ T9424] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.464856][ T9424] RSP: 002b:00007fa2d346cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 245.473259][ T9424] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 245.481434][ T9424] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 245.489513][ T9424] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 245.497488][ T9424] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2d346d6d4 [ 245.505460][ T9424] R13: 00000000004c9bcb R14: 00000000004e1460 R15: 00000000ffffffff [ 245.516821][ T9424] memory: usage 4652kB, limit 0kB, failcnt 42 [ 245.523103][ T9424] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 245.530453][ T9424] Memory cgroup stats for /syz2: [ 245.532653][ T9424] anon 2306048 [ 245.532653][ T9424] file 0 [ 245.532653][ T9424] kernel_stack 65536 [ 245.532653][ T9424] slab 2007040 [ 245.532653][ T9424] sock 0 [ 245.532653][ T9424] shmem 0 [ 245.532653][ T9424] file_mapped 0 [ 245.532653][ T9424] file_dirty 0 [ 245.532653][ T9424] file_writeback 0 [ 245.532653][ T9424] anon_thp 2097152 [ 245.532653][ T9424] inactive_anon 0 [ 245.532653][ T9424] active_anon 2306048 [ 245.532653][ T9424] inactive_file 0 [ 245.532653][ T9424] active_file 0 [ 245.532653][ T9424] unevictable 0 [ 245.532653][ T9424] slab_reclaimable 405504 [ 245.532653][ T9424] slab_unreclaimable 1601536 [ 245.532653][ T9424] pgfault 858 [ 245.532653][ T9424] pgmajfault 0 [ 245.532653][ T9424] workingset_refault 0 [ 245.532653][ T9424] workingset_activate 0 [ 245.532653][ T9424] workingset_nodereclaim 0 [ 245.532653][ T9424] pgrefill 0 [ 245.532653][ T9424] pgscan 0 [ 245.532653][ T9424] pgsteal 0 [ 245.532653][ T9424] pgactivate 0 [ 245.629071][ T9424] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9423,uid=0 [ 245.646612][ T9424] Memory cgroup out of memory: Killed process 9423 (syz-executor.2) total-vm:72580kB, anon-rss:2184kB, file-rss:35848kB, shmem-rss:0kB, UID:0 pgtables:139264kB oom_score_adj:1000 [ 245.667957][ T1066] oom_reaper: reaped process 9423 (syz-executor.2), now anon-rss:0kB, file-rss:34896kB, shmem-rss:0kB 04:43:14 executing program 2: 04:43:14 executing program 4: 04:43:14 executing program 1: 04:43:14 executing program 3: 04:43:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:14 executing program 0: [ 245.929492][ T9416] syz-executor.2 invoked oom-killer: gfp_mask=0x40cc0(GFP_KERNEL|__GFP_COMP), order=0, oom_score_adj=0 [ 245.970985][ T9416] CPU: 0 PID: 9416 Comm: syz-executor.2 Not tainted 5.3.0-next-20190926 #0 [ 245.979706][ T9416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.989942][ T9416] Call Trace: [ 245.993392][ T9416] dump_stack+0x172/0x1f0 [ 245.997742][ T9416] dump_header+0x177/0x1152 [ 246.002256][ T9416] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 246.008058][ T9416] ? ___ratelimit+0x2c8/0x595 [ 246.008131][ T9416] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 246.008147][ T9416] ? lockdep_hardirqs_on+0x421/0x5e0 [ 246.008162][ T9416] ? trace_hardirqs_on+0x67/0x240 [ 246.008178][ T9416] ? pagefault_out_of_memory+0x11c/0x11c [ 246.008196][ T9416] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 246.018750][ T9416] ? ___ratelimit+0x60/0x595 [ 246.045034][ T9416] ? do_raw_spin_unlock+0x57/0x270 [ 246.050244][ T9416] oom_kill_process.cold+0x10/0x15 [ 246.055354][ T9416] out_of_memory+0x334/0x1340 [ 246.060169][ T9416] ? lock_downgrade+0x920/0x920 [ 246.065033][ T9416] ? mem_cgroup_unmark_under_oom+0x8d/0xb0 [ 246.070864][ T9416] ? oom_killer_disable+0x280/0x280 [ 246.076086][ T9416] mem_cgroup_out_of_memory+0x1d8/0x240 [ 246.081636][ T9416] ? memcg_stat_show+0xc40/0xc40 [ 246.086594][ T9416] ? do_raw_spin_unlock+0x57/0x270 [ 246.091842][ T9416] ? _raw_spin_unlock+0x2d/0x50 [ 246.097668][ T9416] try_charge+0xf4b/0x1440 [ 246.102635][ T9416] ? mem_cgroup_oom_trylock+0x1a0/0x1a0 [ 246.108278][ T9416] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 246.113860][ T9416] ? cache_grow_begin+0x122/0xd20 04:43:14 executing program 4: [ 246.118897][ T9416] ? find_held_lock+0x35/0x130 [ 246.123670][ T9416] ? cache_grow_begin+0x122/0xd20 [ 246.128798][ T9416] __memcg_kmem_charge_memcg+0x7c/0x130 [ 246.134353][ T9416] ? lock_downgrade+0x920/0x920 [ 246.139303][ T9416] ? memcg_kmem_put_cache+0x50/0x50 [ 246.144512][ T9416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 246.150765][ T9416] ? __kasan_check_read+0x11/0x20 [ 246.155813][ T9416] cache_grow_begin+0x629/0xd20 [ 246.160682][ T9416] ? __sanitizer_cov_trace_cmp2+0x11/0x20 [ 246.166602][ T9416] ? mempolicy_slab_node+0x139/0x390 04:43:15 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 246.171902][ T9416] fallback_alloc+0x1fd/0x2d0 [ 246.176599][ T9416] ____cache_alloc_node+0x1bc/0x1d0 [ 246.181812][ T9416] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 246.188104][ T9416] kmem_cache_alloc+0x1ef/0x710 [ 246.193053][ T9416] ? stack_trace_save+0xac/0xe0 [ 246.197915][ T9416] __alloc_file+0x27/0x340 [ 246.202345][ T9416] alloc_empty_file+0x72/0x170 [ 246.207122][ T9416] path_openat+0xef/0x46d0 [ 246.211547][ T9416] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 246.217488][ T9416] ? kasan_slab_alloc+0xf/0x20 [ 246.217499][ T9416] ? kmem_cache_alloc+0x121/0x710 [ 246.217513][ T9416] ? getname_flags+0xd6/0x5b0 [ 246.217524][ T9416] ? getname+0x1a/0x20 [ 246.217536][ T9416] ? do_sys_open+0x2c9/0x5d0 [ 246.217550][ T9416] ? __x64_sys_open+0x7e/0xc0 [ 246.217565][ T9416] ? __kasan_check_read+0x11/0x20 [ 246.217578][ T9416] ? mark_lock+0xc2/0x1220 [ 246.217593][ T9416] ? __kasan_check_read+0x11/0x20 [ 246.227354][ T9416] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 246.227373][ T9416] ? __alloc_fd+0x487/0x620 [ 246.227391][ T9416] do_filp_open+0x1a1/0x280 [ 246.227407][ T9416] ? may_open_dev+0x100/0x100 [ 246.227422][ T9416] ? lock_downgrade+0x920/0x920 [ 246.227435][ T9416] ? rwlock_bug.part.0+0x90/0x90 [ 246.227451][ T9416] ? __kasan_check_read+0x11/0x20 [ 246.227460][ T9416] ? do_raw_spin_unlock+0x57/0x270 [ 246.227476][ T9416] ? _raw_spin_unlock+0x2d/0x50 [ 246.227486][ T9416] ? __alloc_fd+0x487/0x620 [ 246.227511][ T9416] do_sys_open+0x3fe/0x5d0 [ 246.227527][ T9416] ? filp_open+0x80/0x80 [ 246.227539][ T9416] ? __detach_mounts+0x2a0/0x2a0 [ 246.227555][ T9416] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 246.227567][ T9416] ? do_syscall_64+0x26/0x760 [ 246.227580][ T9416] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.227591][ T9416] ? do_syscall_64+0x26/0x760 [ 246.227610][ T9416] __x64_sys_open+0x7e/0xc0 [ 246.348410][ T9416] do_syscall_64+0xfa/0x760 [ 246.352923][ T9416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.358905][ T9416] RIP: 0033:0x4579a0 04:43:15 executing program 4: [ 246.362810][ T9416] Code: 31 c0 e9 45 ff ff ff 0f 1f 00 80 3f 00 0f 84 f7 00 00 00 55 53 b9 02 00 00 00 be 00 08 09 00 89 c8 48 81 ec 98 00 00 00 0f 05 <48> 3d 00 f0 ff ff 48 89 c3 0f 87 e9 00 00 00 85 db 0f 88 2f 01 00 [ 246.382531][ T9416] RSP: 002b:00007fffcb81e0a0 EFLAGS: 00000206 ORIG_RAX: 0000000000000002 [ 246.391241][ T9416] RAX: ffffffffffffffda RBX: 000000000003bd7f RCX: 00000000004579a0 [ 246.399398][ T9416] RDX: 000000000000000c RSI: 0000000000090800 RDI: 00007fffcb81f280 [ 246.407503][ T9416] RBP: 0000000000000002 R08: 0000000000000001 R09: 0000555556331940 04:43:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmsg$nl_netfilter(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="4c03000610046ee8000000773bda843730120997ebec95eba442e0fda620af4b73133ea39ea3c127ac5405647e56e3fdf4123fca5cdc153969a0f0b42a38d76b8b3e034232a4e8c029a12e76025c668cc86db7506a40d14a2a3ce2f1b8250f36728293c0bd629a234088aa3764e4f230d0d11deca30906b05b0267ab764eec9823ac37f6c0e2a70001d15813fb48d5274c30876a28518322696bbe1977e36dccd7743745ed25daa0f12f0931a3d0dd3675ae60cb325e0000000000000000000000000000802a3f49a2"], 0xc9}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 04:43:15 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) [ 246.415711][ T9416] R10: 0000000000000000 R11: 0000000000000206 R12: 00007fffcb81f280 [ 246.423709][ T9416] R13: 00007fffcb81f270 R14: 0000000000000000 R15: 00007fffcb81f280 04:43:15 executing program 4: [ 246.796096][ T9416] memory: usage 2320kB, limit 0kB, failcnt 54 [ 246.802223][ T9416] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 246.872486][ T9416] Memory cgroup stats for /syz2: [ 246.872705][ T9416] anon 53248 [ 246.872705][ T9416] file 0 [ 246.872705][ T9416] kernel_stack 65536 [ 246.872705][ T9416] slab 2007040 [ 246.872705][ T9416] sock 0 [ 246.872705][ T9416] shmem 0 [ 246.872705][ T9416] file_mapped 0 [ 246.872705][ T9416] file_dirty 0 [ 246.872705][ T9416] file_writeback 0 [ 246.872705][ T9416] anon_thp 0 [ 246.872705][ T9416] inactive_anon 0 [ 246.872705][ T9416] active_anon 53248 [ 246.872705][ T9416] inactive_file 0 [ 246.872705][ T9416] active_file 0 [ 246.872705][ T9416] unevictable 0 [ 246.872705][ T9416] slab_reclaimable 405504 [ 246.872705][ T9416] slab_unreclaimable 1601536 [ 246.872705][ T9416] pgfault 858 [ 246.872705][ T9416] pgmajfault 0 [ 246.872705][ T9416] workingset_refault 0 [ 246.872705][ T9416] workingset_activate 0 [ 246.872705][ T9416] workingset_nodereclaim 0 [ 246.872705][ T9416] pgrefill 0 [ 246.872705][ T9416] pgscan 0 [ 246.872705][ T9416] pgsteal 0 [ 246.872705][ T9416] pgactivate 0 [ 246.872705][ T9416] pgdeactivate 0 [ 246.984144][ T9416] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=9416,uid=0 [ 247.007375][ T9416] Memory cgroup out of memory: Killed process 9416 (syz-executor.2) total-vm:72448kB, anon-rss:72kB, file-rss:34832kB, shmem-rss:0kB, UID:0 pgtables:131072kB oom_score_adj:0 [ 247.031848][ T1066] oom_reaper: reaped process 9416 (syz-executor.2), now anon-rss:0kB, file-rss:33936kB, shmem-rss:0kB 04:43:16 executing program 2: 04:43:16 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:16 executing program 1: 04:43:16 executing program 4: 04:43:16 executing program 3: [ 248.192404][ T9465] IPVS: ftp: loaded support on port[0] = 21 [ 248.329153][ T9465] chnl_net:caif_netlink_parms(): no params data found [ 248.342852][ T46] device bridge_slave_1 left promiscuous mode [ 248.349406][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.427212][ T46] device bridge_slave_0 left promiscuous mode [ 248.433428][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.487051][ T46] device hsr_slave_0 left promiscuous mode [ 250.526384][ T46] device hsr_slave_1 left promiscuous mode [ 250.605382][ T46] team0 (unregistering): Port device team_slave_1 removed [ 250.620327][ T46] team0 (unregistering): Port device team_slave_0 removed [ 250.631257][ T46] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 250.670500][ T46] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 250.754663][ T46] bond0 (unregistering): Released all slaves [ 250.867188][ T9465] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.874548][ T9465] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.882607][ T9465] device bridge_slave_0 entered promiscuous mode [ 250.891322][ T9465] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.898545][ T9465] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.906360][ T9465] device bridge_slave_1 entered promiscuous mode [ 250.927636][ T9465] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 250.938590][ T9465] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 250.960106][ T9465] team0: Port device team_slave_0 added [ 250.967641][ T9465] team0: Port device team_slave_1 added [ 251.038069][ T9465] device hsr_slave_0 entered promiscuous mode [ 251.096570][ T9465] device hsr_slave_1 entered promiscuous mode [ 251.203830][ T9465] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.211080][ T9465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.218588][ T9465] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.225654][ T9465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.305548][ T9465] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.329780][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.344762][ T2836] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.353295][ T2836] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.370364][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 251.391363][ T9465] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.412432][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.428715][ T2836] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.435896][ T2836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.474543][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.485580][ T8917] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.492716][ T8917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.510066][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.536420][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.544612][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.560898][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.581168][ T9465] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 251.595431][ T9465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.611856][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.648167][ T9465] 8021q: adding VLAN 0 to HW filter on device batadv0 04:43:20 executing program 0: 04:43:20 executing program 1: 04:43:20 executing program 4: 04:43:20 executing program 3: 04:43:20 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r0}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:20 executing program 2: 04:43:20 executing program 3: 04:43:20 executing program 1: 04:43:20 executing program 4: 04:43:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:20 executing program 0: 04:43:20 executing program 3: 04:43:21 executing program 1: 04:43:21 executing program 4: 04:43:21 executing program 0: 04:43:21 executing program 4: 04:43:21 executing program 1: [ 254.070614][ T9511] IPVS: ftp: loaded support on port[0] = 21 [ 254.207594][ T9511] chnl_net:caif_netlink_parms(): no params data found [ 254.310354][ T9511] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.317581][ T9511] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.325301][ T9511] device bridge_slave_0 entered promiscuous mode [ 254.333880][ T9511] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.341149][ T9511] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.349072][ T9511] device bridge_slave_1 entered promiscuous mode [ 254.434913][ T9511] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.446488][ T9511] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.535578][ T9511] team0: Port device team_slave_0 added [ 254.543925][ T9511] team0: Port device team_slave_1 added [ 254.679139][ T9511] device hsr_slave_0 entered promiscuous mode [ 254.716601][ T9511] device hsr_slave_1 entered promiscuous mode [ 254.756283][ T9511] debugfs: Directory 'hsr0' with parent '/' already present! [ 254.840937][ T9511] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.848310][ T9511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.855596][ T9511] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.863010][ T9511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.972221][ T9511] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.988478][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.997159][ T8917] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.005256][ T8917] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.014971][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 255.027138][ T46] device bridge_slave_1 left promiscuous mode [ 255.033553][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.086951][ T46] device bridge_slave_0 left promiscuous mode [ 255.093233][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.036586][ T46] device hsr_slave_0 left promiscuous mode [ 257.096397][ T46] device hsr_slave_1 left promiscuous mode [ 257.147750][ T46] team0 (unregistering): Port device team_slave_1 removed [ 257.162552][ T46] team0 (unregistering): Port device team_slave_0 removed [ 257.174699][ T46] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 257.233388][ T46] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 257.325250][ T46] bond0 (unregistering): Released all slaves [ 257.442677][ T9511] 8021q: adding VLAN 0 to HW filter on device team0 [ 257.454282][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 257.464028][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.472700][ T3570] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.479991][ T3570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.499448][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 257.510282][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.519070][ T3570] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.526168][ T3570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.535134][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 257.544126][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 257.556706][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 257.567505][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.583349][ T9511] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 257.594336][ T9511] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 257.606524][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.614459][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.623424][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.632378][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.642188][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.651527][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.660026][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.669617][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.723540][ T9511] 8021q: adding VLAN 0 to HW filter on device batadv0 04:43:26 executing program 2: 04:43:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:26 executing program 3: 04:43:26 executing program 0: 04:43:26 executing program 1: 04:43:26 executing program 4: 04:43:26 executing program 1: 04:43:26 executing program 3: 04:43:26 executing program 4: 04:43:26 executing program 0: 04:43:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:27 executing program 2: 04:43:27 executing program 3: seccomp(0x1, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x24480, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x80000) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x2, 0x0, 0x1, 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xaaaab89, &(0x7f0000000200)=[{&(0x7f0000000080)="02005500000001000000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 04:43:27 executing program 1: r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syncfs(r0) 04:43:27 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r0, 0x0, 0x0) 04:43:27 executing program 2: memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x8400, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="480090c2aa7c84a6f20a643900002400070500"/30, @ANYRES32=r1, @ANYBLOB="00000000f1ffffff0000000008000100687462001c000200180002000300"/48], 0x48}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={@loopback, 0x70, r1}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r3 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r4 = dup2(r3, r2) r5 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r6 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r7 = dup2(r6, r5) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) r8 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$selinux_attr(r8, &(0x7f0000000040)='system_u:object_r:useradd_exec_t:s0\x00', 0x24) r9 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r8, 0x108200) r10 = open(&(0x7f0000000080)='./bus\x00', 0x84800, 0x0) sendfile(r8, r10, 0x0, 0x8000fffffffe) sendfile(r9, r10, 0x0, 0xffffffff) r11 = socket$inet_udplite(0x2, 0x2, 0x88) r12 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r12, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}}, &(0x7f0000000000)=0xb0) dup2(r11, r12) r13 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r13) r14 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r14, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r13, 0x84, 0xf, &(0x7f00000005c0)={0x0, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x8e1e, 0xe66}, &(0x7f0000000680)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x2}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r10, 0x84, 0x72, &(0x7f0000000500)={0x0, 0x4ab, 0x30}, &(0x7f0000000540)=0xc) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) setsockopt$sock_timeval(r4, 0x1, 0xa6, &(0x7f0000000480), 0x10) syz_open_dev$radio(&(0x7f00000004c0)='/dev/radio#\x00', 0x1, 0x2) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) r15 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r16 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r17 = dup2(r16, r15) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r17, 0xc08c5332, 0x0) ioctl$KVM_GET_DIRTY_LOG(r17, 0x4010ae42, &(0x7f00000000c0)={0x2710, 0x0, &(0x7f0000af8000/0x4000)=nil}) 04:43:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x185900) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000100)={0xfffffff7, 0x7, 0x81}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RXATTRWALK(r3, &(0x7f0000000040)={0xf, 0x1f, 0x2, 0x100}, 0xf) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32=r1, @ANYBLOB="00000800ffffffff000000000c0001006e6574656d0000004c00020003000000000800000000000018d10000050000000000000026fe08007df880591538e7fe0c00030001000000050000000c000b0100010000000000000c000300020000009e00000008000100736671194800020000000000000000000000000010000000000000000000000c000000008000000000000000000000000000000000000000000000000000000000c7000000000000000000000bbb9aecd643adea3db6ab644dd4fd310a8c8ea3413e85d0c74c85f48db5b646fa39a0e1ba0038f5af5ccd7d9e7a0f7afa34f0080200d1aa48b9c7d72af2c63b676c85b3a428f7586c0883c22956adeeab3339342995fd55dae78b1928cae6c58a2e0c1313bdaeb4bc2bdc8fc699c476279ee9981d5dfa2b5846b2bd97e91c2e8bd0a1f9b255e0131d3a1ec4ef5719b205a4fe88484edf6cf06598f825f4d4447a2fd01f0035abf3c51ae38cb782cf5fb9e74b80d131395d73de8b7c10c93917edd4d659be5293c671"], 0xcc}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.nlink\x00') sendmmsg$alg(r4, &(0x7f0000000140)=[{0x40000000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet_sctp(0x2, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r8, 0x84, 0x71, &(0x7f0000000400)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={r10, 0xe0, "bf58114fc57775bc5947b9ab64c51f528162eb73d37cbdcb2c1b3d1258d47ebc2e5bc8a2ce136568e7afcc179c2f3be190602acc7e6f1b81bc9b52cdd144eadd4bb826c06526f18725f819489f58c28a117086d9458e1b282b567984dc2d059fa9017984176818ca8fc9bd8270a7aafeed09e82d1780dfb82b9f03a92fa5e0cbd7544840e22b92856953908b0a0abfb4ae6e93cbd075c413e32565ac9bd655d7fc44dabb16e25f0c5dcf66b527954681263748159affad95f50729adafe40d7d57bdde2af78e592393f30899e2d0029506eb0b82957f5a561fc2a68f9be6a176"}, &(0x7f0000000280)=0xe8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r10, 0xd63, 0x9e64}, 0xc) 04:43:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:27 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000001480)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) inotify_init1(0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x10000, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000140)) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) dup2(r2, r1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 04:43:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xffffffffffffff95) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2745, 0x105702) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000080)=""/144) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e28, 0x0, @ipv4={[], [], @multicast2}}, 0xfffffffffffffee5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:43:27 executing program 4: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x1200000000003, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100082) add_key$keyring(&(0x7f0000000700)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r2 = socket$inet_sctp(0x2, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0x71, &(0x7f0000000400)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={r4, 0xe0, "bf58114fc57775bc5947b9ab64c51f528162eb73d37cbdcb2c1b3d1258d47ebc2e5bc8a2ce136568e7afcc179c2f3be190602acc7e6f1b81bc9b52cdd144eadd4bb826c06526f18725f819489f58c28a117086d9458e1b282b567984dc2d059fa9017984176818ca8fc9bd8270a7aafeed09e82d1780dfb82b9f03a92fa5e0cbd7544840e22b92856953908b0a0abfb4ae6e93cbd075c413e32565ac9bd655d7fc44dabb16e25f0c5dcf66b527954681263748159affad95f50729adafe40d7d57bdde2af78e592393f30899e2d0029506eb0b82957f5a561fc2a68f9be6a176"}, &(0x7f0000000280)=0xe8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r4, 0x7}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000005c0)={0x0, @in={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}}, [0xa7f3, 0x5, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x100000000, 0x7fff, 0x6, 0x0, 0x401, 0x40, 0x1]}, &(0x7f0000000380)=0x100) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x400000, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) io_setup(0x0, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0xc0984124, 0x0) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x4, 0x0, &(0x7f0000000080)=0x8001}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000540)={'filter\x00', 0x4}, 0x68) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) io_destroy(0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x3, 0x4}, &(0x7f0000000500)=0x18) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) r6 = memfd_create(&(0x7f00000003c0)='/\xd2\a\xaa(\t0\xedj\\\xe6W\x14E\x80VfM\'\x80\xb1\xce\x86Wp#\x00\xc2\x11\x04\xb5\a\x9e\x83X\x8e?yE\xec\xeb2-\xbb\vO\xf9P\xd7\xd7\xf5\xa8\xaeW\x8e\xe5Q\xd9\x9ew\x8e}\x868\x9f2\xf9\x17\xf5\xf8;\xd5g\bS\x91Q\xf1a\x0e$9[k@\x0fj\x83\x9d\xb1\xd5\xd7\xa5\xc1\x05ox\xe4\xdc6\x04\xc1n\xf6\xf8\x1c\xf2\xa9\xbb\xbc\x12u\xfd\xeb0bK\xb8A\x93\xb3\x8co\a\xe1}R\xa6x\xde\xb5;\xea\xa0', 0x4) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r6) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r6) [ 258.802475][ T26] audit: type=1804 audit(1569645807.641:35): pid=9566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir442362736/syzkaller.HuwlVx/3/bus" dev="sda1" ino=16577 res=1 04:43:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 258.930407][ T26] audit: type=1800 audit(1569645807.641:36): pid=9566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16577 res=0 [ 259.067571][ T26] audit: type=1804 audit(1569645807.711:37): pid=9557 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir442362736/syzkaller.HuwlVx/3/bus" dev="sda1" ino=16577 res=1 04:43:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r3, 0x8200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1000002, 0x11, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)={'sy\x9a}'}, 0xff5f) [ 259.222986][ T26] audit: type=1804 audit(1569645807.941:38): pid=9578 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir442362736/syzkaller.HuwlVx/3/bus" dev="sda1" ino=16577 res=1 [ 259.256864][ T9568] syz-executor.1 (9568) used greatest stack depth: 22904 bytes left 04:43:28 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0xd176f95fe398c309, 0x0) openat$cgroup_type(r4, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x84456a4d3e1d46b8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="340000e4", @ANYRES16=r5, @ANYBLOB="000227bd7000fbdbdf25010000000000000001410000001800170000001c000000017564703a73797a3000000000"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x2008010) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:28 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000200)=[@in6={0xa, 0x4e21, 0x4, @local, 0xffff}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e21, 0x10001, @empty, 0xfff}, @in6={0xa, 0x4e22, 0x2, @local, 0x2}], 0x84) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000001c0)=0x8, 0x2) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x100000000) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x40080, 0x0) ioctl$SIOCX25GDTEFACILITIES(r2, 0x89ea, &(0x7f0000000100)) pipe2(&(0x7f0000000080), 0x0) 04:43:28 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000001480)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) inotify_init1(0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x10000, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000140)) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) dup2(r2, r1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) 04:43:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="85d43358067a0405519c49000000130000005d000000000000009500000000000000cf081cf434b9eaafdc0a00e9bfde51afe9c81a21d05725caf1cae63487d70c02"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x10}}, 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd030e98ff4dc870bd6688a8", 0x0, 0x1204}, 0x28) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000300), &(0x7f0000000340)=0xc) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup2(r2, r0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="280000002300010000080000000000000400000014000c0000000000000000000000ffff00000000"], 0x28}}, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000380)={0x0, 0x8, 0x100}, &(0x7f00000003c0)=0x8) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x6}, 0x0) [ 259.402489][ T26] audit: type=1800 audit(1569645807.941:39): pid=9578 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16577 res=0 04:43:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000080)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1, 0x2000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 259.567478][ T9597] QAT: failed to copy from user cfg_data. [ 259.577927][ T26] audit: type=1804 audit(1569645807.951:40): pid=9566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir442362736/syzkaller.HuwlVx/3/bus" dev="sda1" ino=16577 res=1 [ 259.597283][ T9608] netlink: 'syz-executor.4': attribute type 12 has an invalid length. 04:43:28 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0xd176f95fe398c309, 0x0) openat$cgroup_type(r4, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x84456a4d3e1d46b8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="340000e4", @ANYRES16=r5, @ANYBLOB="000227bd7000fbdbdf25010000000000000001410000001800170000001c000000017564703a73797a3000000000"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x2008010) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:28 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40041, @perf_config_ext={0x6, 0xefc4}, 0xe345c3afc62c1a7c, 0x0, 0xda, 0x0, 0x7, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x400000, 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0xfea4) fallocate(r1, 0x11, 0x7ffd, 0x8000) fallocate(r1, 0x3, 0x0, 0xfff9) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @bcast, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$sock_proto_private(r2, 0x89e5, &(0x7f0000000180)="af3a632a71ba9f29b973415b5cb9b1fdddbf0b3ea6383d552f655dbe25b6716faa3930b577dc01b1c6ba0e5a6687f4227fb5484b7ce09ccc3a5a92f8ff5db491f64d4371717619643965f54428da4a3956") lstat(0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x4, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000240)={0x0, "ce8b44145e2f523de46b0d29d445033ac5d680b4725ea59bb955f594e34cfda8", 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.n\xd3!\n\x82c~\x949', 0x1ff) socket$kcm(0x29, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)='^bdevwlan0procsecurity\x00') [ 259.725392][ T26] audit: type=1804 audit(1569645808.021:41): pid=9557 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir442362736/syzkaller.HuwlVx/3/bus" dev="sda1" ino=16577 res=1 04:43:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:28 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9) socket$netlink(0x10, 0x3, 0x4000000000000004) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$evdev(r6, &(0x7f0000000000)=[{{0x0, 0x7530}, 0xb, 0x4, 0x21}, {{}, 0x11, 0x401, 0x7}], 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r3, &(0x7f00000004c0)=[{&(0x7f0000000300)="f0934ed8a0ab7ac0a61831404d48a2ca4d9493253a9b4c82056d715f97a1dc9b91766e0e75ea73d1eb9e59629dcd6e492c27c22c739ddd549e9dfc446487a3aa424df343a4baa5edc406c7527314de74cbcde7bc27f4fa18af79270d61703c4ee84186a03182e3fce0d7f36706fd252c38ae467c244efc9107914576a6292ab155e0f3db86ecc638ebf7e154b9ed8af6419a466824283cdc02b3963dcc10a9ed1261eb287bf8e6bf493a42b30510e44f181b4c875c239ce48f7b8a9a54d2af6330a80ffae2e00adde9db19503a58df18cf3d406ad1f7ee250ea1e2bf9d8bf6ccbf9d6ddc4deeaf71f625b43c"}, {&(0x7f0000000200)="0ce42731acbac0e54202236efbe6df3bf922a12494912875639e23b1bea50a3f024283cc36987226da7780329cdcdd28cd482ec8a5586fb93e71a1eb51303d82b160a95f"}, {&(0x7f0000000400)="a3b378bb501874d65912e6a2e928fcb92117e97f17448f0616c63487b97b64fcaf4e53eb64f8866058dc8b169cdc81d526b4335d5e64d7a566ac22947607905d43e932ea0f3fdd5cc661073a7b33085b0d29cff03ba379e805da154346ee2a37f76b74a901b72941e80eff5882a192c4c841da677c7c4b8f8dedee3bd2457a8e726af0c53f68fa3cb4369277732b645e87f45b42cb92be906e78"}], 0x104) [ 259.999783][ T9625] QAT: failed to copy from user cfg_data. 04:43:28 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0xd176f95fe398c309, 0x0) openat$cgroup_type(r4, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x84456a4d3e1d46b8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="340000e4", @ANYRES16=r5, @ANYBLOB="000227bd7000fbdbdf25010000000000000001410000001800170000001c000000017564703a73797a3000000000"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x2008010) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) [ 260.240293][ T9632] QAT: failed to copy from user cfg_data. 04:43:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:29 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0xd176f95fe398c309, 0x0) openat$cgroup_type(r4, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x84456a4d3e1d46b8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="340000e4", @ANYRES16=r5, @ANYBLOB="000227bd7000fbdbdf25010000000000000001410000001800170000001c000000017564703a73797a3000000000"], 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x2008010) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000400)=[@in6={0xa, 0x0, 0x0, @loopback}, @in6={0xa, 0x0, 0x0, @loopback}], 0x1e) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) dup3(r4, r0, 0x80000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0x71, &(0x7f0000000400)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={r6, 0xe0, "bf58114fc57775bc5947b9ab64c51f528162eb73d37cbdcb2c1b3d1258d47ebc2e5bc8a2ce136568e7afcc179c2f3be190602acc7e6f1b81bc9b52cdd144eadd4bb826c06526f18725f819489f58c28a117086d9458e1b282b567984dc2d059fa9017984176818ca8fc9bd8270a7aafeed09e82d1780dfb82b9f03a92fa5e0cbd7544840e22b92856953908b0a0abfb4ae6e93cbd075c413e32565ac9bd655d7fc44dabb16e25f0c5dcf66b527954681263748159affad95f50729adafe40d7d57bdde2af78e592393f30899e2d0029506eb0b82957f5a561fc2a68f9be6a176"}, &(0x7f0000000280)=0xe8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000080)={r6, @in6={{0xa, 0x4e20, 0x8, @rand_addr="5779b6ed95db576c477ca989aba1c047", 0xd57d}}, 0x3, 0x8, 0x2, 0x400, 0x8}, &(0x7f0000000140)=0x98) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000000)={0xfff, 0x1}) 04:43:29 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) init_module(&(0x7f0000000280)=':\x00', 0x2, &(0x7f00000002c0)='/dev/kvm\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2, 0x40d000) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet_sctp(0x2, 0x1, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r8, 0x84, 0x71, &(0x7f0000000400)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={r10, 0xe0, "bf58114fc57775bc5947b9ab64c51f528162eb73d37cbdcb2c1b3d1258d47ebc2e5bc8a2ce136568e7afcc179c2f3be190602acc7e6f1b81bc9b52cdd144eadd4bb826c06526f18725f819489f58c28a117086d9458e1b282b567984dc2d059fa9017984176818ca8fc9bd8270a7aafeed09e82d1780dfb82b9f03a92fa5e0cbd7544840e22b92856953908b0a0abfb4ae6e93cbd075c413e32565ac9bd655d7fc44dabb16e25f0c5dcf66b527954681263748159affad95f50729adafe40d7d57bdde2af78e592393f30899e2d0029506eb0b82957f5a561fc2a68f9be6a176"}, &(0x7f0000000280)=0xe8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000300)={0x8bd7, 0x8007, 0x3, 0x2, r10}, &(0x7f0000000340)=0x10) sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="04002dbd7000fbdbdf250900000038000600080001000200000008000100feffffff08000100f94cc5483d61e8e8d7cd00000800010004000000080001008000000004000200180006000800010001010000040002000800010002000000"], 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4000061) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:43:29 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40041, @perf_config_ext={0x6, 0xefc4}, 0xe345c3afc62c1a7c, 0x0, 0xda, 0x0, 0x7, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x400000, 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0xfea4) fallocate(r1, 0x11, 0x7ffd, 0x8000) fallocate(r1, 0x3, 0x0, 0xfff9) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @bcast, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$sock_proto_private(r2, 0x89e5, &(0x7f0000000180)="af3a632a71ba9f29b973415b5cb9b1fdddbf0b3ea6383d552f655dbe25b6716faa3930b577dc01b1c6ba0e5a6687f4227fb5484b7ce09ccc3a5a92f8ff5db491f64d4371717619643965f54428da4a3956") lstat(0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x4, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000240)={0x0, "ce8b44145e2f523de46b0d29d445033ac5d680b4725ea59bb955f594e34cfda8", 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.n\xd3!\n\x82c~\x949', 0x1ff) socket$kcm(0x29, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)='^bdevwlan0procsecurity\x00') [ 260.557010][ T9646] QAT: failed to copy from user cfg_data. 04:43:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:29 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0xd176f95fe398c309, 0x0) openat$cgroup_type(r4, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xffeff034}, {0x80000006}]}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) perf_event_open(0x0, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000180)=0x4, 0x4) connect$inet(r2, &(0x7f0000000380)={0x2, 0x0, @broadcast}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_ENUMSTD(r8, 0xc0485619, &(0x7f00000001c0)={0x406, 0x4000, "2508d3aff1845e34e52f67130ed232a5bf8604647906292d", {0x7, 0x2}, 0x9}) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 04:43:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x2}, 0x1c) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0100000000000000280012000c0001007665746800000000180002001400000000001a7dcf3fa7f5bedbc2b851a6306438f370fe3cd3f34e0453ed9e56df53204d4e4843bc9ea5c9da37495e00c29c571b5edb21786c00dd0b5ae974fde8ba3273130200000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9, 0x1, 'hfsc\x00'}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x2, 'htb\x00'}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'irlan0\x00', r6}) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000100)=0x1, 0x4) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x202d960d733e1730, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 260.837571][ T9659] QAT: failed to copy from user cfg_data. 04:43:29 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0xd176f95fe398c309, 0x0) openat$cgroup_type(r4, &(0x7f00000002c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 261.062865][ T9672] QAT: failed to copy from user cfg_data. [ 261.106078][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 04:43:30 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0xd176f95fe398c309, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(0x0, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_emit_ethernet(0x47, &(0x7f0000000280)={@empty, @local, [{[{0x9100, 0x0, 0x1}], {0x8100, 0x2, 0x1, 0x1}}], {@arp={0x806, @generic={0x30c, 0x0, 0x6, 0xd, 0x4, @empty, "28d97b9d00c89fa9ba21d194e1", @remote, "166da2760dbab0ed625365ddc19c542c"}}}}, &(0x7f0000000040)={0x0, 0x4, [0x4c4, 0x7f, 0x96e, 0xb73]}) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$swradio(0x0, 0x0, 0x2) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000003c0)={0x9, 0x6, {0x51, 0x9, 0x2, {0xaee, 0x708}, {0x9, 0x3}, @period={0x5c, 0xdd, 0x1, 0x2, 0x400, {0x7, 0x15, 0x101, 0x9}, 0x4, &(0x7f0000000300)=[0x2, 0x8001, 0x7, 0x8]}}, {0x54, 0xe5, 0xff7f, {0x1, 0x8d}, {0x1}, @rumble={0x8001, 0xbab8}}}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x20000000fb], 0x1f004, 0x485}) ioctl$KVM_RUN(r3, 0xae80, 0x0) msgget(0x2, 0x200) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b04, 0x0) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000100)) [ 261.285718][ T9681] QAT: failed to copy from user cfg_data. 04:43:30 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) fcntl$dupfd(r9, 0x0, r7) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x42, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000040)={r7, r10}) r11 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r11, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) r15 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r15, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r15, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r16, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) write$RDMA_USER_CM_CMD_SET_OPTION(r14, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r16, 0x0, 0x1, 0x4}}, 0x20) r17 = dup3(r2, r3, 0x0) dup2(r17, r11) [ 261.618186][ T9699] QAT: failed to copy from user cfg_data. 04:43:30 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40041, @perf_config_ext={0x6, 0xefc4}, 0xe345c3afc62c1a7c, 0x0, 0xda, 0x0, 0x7, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x7) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x400000, 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0xfea4) fallocate(r1, 0x11, 0x7ffd, 0x8000) fallocate(r1, 0x3, 0x0, 0xfff9) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000280)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @bcast, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$sock_proto_private(r2, 0x89e5, &(0x7f0000000180)="af3a632a71ba9f29b973415b5cb9b1fdddbf0b3ea6383d552f655dbe25b6716faa3930b577dc01b1c6ba0e5a6687f4227fb5484b7ce09ccc3a5a92f8ff5db491f64d4371717619643965f54428da4a3956") lstat(0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x4, 0x0) ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000240)={0x0, "ce8b44145e2f523de46b0d29d445033ac5d680b4725ea59bb955f594e34cfda8", 0x2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.n\xd3!\n\x82c~\x949', 0x1ff) socket$kcm(0x29, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)='^bdevwlan0procsecurity\x00') 04:43:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:30 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000001680)=ANY=[@ANYBLOB="9feb010018000000000000002ffffff317000000030000000a0000000000000b030000000f0000000000e20b05000000fcff00000000000901000000060000000000000700000000026100fbb594a904a36bbd8249f7f1b1de84c97c2e3484da2cb3a0d690f77e8d8886cc540a7de972a481def39dbb1399fc19b930b31d8df4e142375de22aaa3e5cc1daa48ee953e3f7c559f323e8"], &(0x7f0000000600)=""/181, 0x96, 0xb5, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffff9c, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000b40)={r2, 0xb, &(0x7f0000000ac0)={&(0x7f0000000900)=""/167, 0xa7, r3}}, 0x13a) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r3, 0x4) syz_open_dev$evdev(0x0, 0x101, 0x0) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "502b9fdf57dcfe21", "4efcf0cd78ac0fd9d43071201668cd682130965022e378a8a5a7f1e9e3f733bb", "cb5d5d48", "03c24f2867ca3439"}, 0x38) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0), 0xff65) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffff5d, 0x0, 0x0, 0x0) 04:43:30 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x10, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="04630440120000000663044000000000"], 0x0, 0x0, 0x0}) r1 = gettid() process_vm_readv(r1, &(0x7f0000002600), 0x6, &(0x7f0000002580)=[{&(0x7f0000001440)=""/4096, 0x1000}, {&(0x7f0000000340)=""/147, 0x93}, {&(0x7f0000002440)=""/18, 0x12}, {&(0x7f0000002480)=""/221, 0x2db}], 0x4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f00000025c0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x1000, 0x1}) [ 261.947471][ T9718] QAT: failed to copy from user cfg_data. 04:43:30 executing program 0: fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x4, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x2, 0xdd39, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) set_mempolicy(0x8003, &(0x7f0000000300)=0x75f, 0x9) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x22002, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000500)='security.SMACK64IPIN\x00', &(0x7f0000000540)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0xc2, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000400)) r2 = memfd_create(&(0x7f0000000200)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00'/203, 0x0) ftruncate(r2, 0x1000000) sendfile(r0, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x2802, 0x0) r5 = semget(0x3, 0x0, 0x584) semctl$SEM_STAT(r5, 0x1, 0x12, &(0x7f0000000340)=""/135) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000180)='caif0\x00') r6 = dup(r3) ioctl$VIDIOC_SUBSCRIBE_EVENT(r6, 0x4020565a, &(0x7f0000000640)={0x8001005, 0x0, 0x2}) 04:43:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 262.009981][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:43:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0x71, &(0x7f0000000400)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={r5, 0xe0, "bf58114fc57775bc5947b9ab64c51f528162eb73d37cbdcb2c1b3d1258d47ebc2e5bc8a2ce136568e7afcc179c2f3be190602acc7e6f1b81bc9b52cdd144eadd4bb826c06526f18725f819489f58c28a117086d9458e1b282b567984dc2d059fa9017984176818ca8fc9bd8270a7aafeed09e82d1780dfb82b9f03a92fa5e0cbd7544840e22b92856953908b0a0abfb4ae6e93cbd075c413e32565ac9bd655d7fc44dabb16e25f0c5dcf66b527954681263748159affad95f50729adafe40d7d57bdde2af78e592393f30899e2d0029506eb0b82957f5a561fc2a68f9be6a176"}, &(0x7f0000000280)=0xe8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000040)={r5, 0x40, 0x3}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r6, 0x0, 0x10, 0x0, &(0x7f0000000380)="d716b2a228947873cc6bf3d19cca2697", 0x0, 0xd41}, 0x28) 04:43:30 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) [ 262.178228][ T9736] QAT: failed to copy from user cfg_data. 04:43:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:31 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:31 executing program 4: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x42000, 0x0) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) [ 262.497110][ T9752] QAT: failed to copy from user cfg_data. [ 262.743213][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:43:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:31 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:31 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x18000000000000, 0xb2ed62f304fd5566) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x1, 0x0, @pic={0x33, 0x7, 0x3, 0x81, 0x9, 0x80, 0x9, 0x4, 0x7, 0x71, 0x93, 0x80, 0x3, 0x6, 0x4, 0x1}}) 04:43:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x3, 0x0, &(0x7f0000000080)={r3, r4+10000000}, &(0x7f00000000c0)) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000100)={0x7c, 0x0, [0x4b564d00, 0x0, 0x2ff]}) [ 262.911796][ T9761] QAT: failed to copy from user cfg_data. [ 262.937714][ T9765] QAT: failed to copy from user cfg_data. 04:43:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r1) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f00000000c0)={0x0, 0xff, 0x7a, [], &(0x7f0000000080)=0x73}) 04:43:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:31 executing program 3: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSRS485(r3, 0x542f, &(0x7f0000000040)={0x2, 0x81, 0x6}) r4 = gettid() timer_create(0x0, &(0x7f00000001c0)={0x0, 0x12, 0x4, @tid=r4}, &(0x7f0000044000)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x2, 0x0) timer_create(0x5, &(0x7f0000000080)={0x0, 0x12, 0x0, @tid=r4}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) preadv(r5, &(0x7f00000015c0)=[{&(0x7f0000000100)=""/4, 0x4}], 0x1, 0x0) close(r5) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") tkill(r0, 0x1000000000014) 04:43:31 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) [ 263.227732][ T9783] QAT: failed to copy from user cfg_data. [ 263.317410][ T9790] QAT: Invalid ioctl 04:43:32 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:32 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x6a, 0x20000) sendmsg$nfc_llcp(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x27, 0x0, 0x1, 0x3, 0xf6, 0x2, "76c2218c0208f7fcd7db1709c496ec7fa7a25392daf0d8442b6ea23fef24ec25dceb613a7e44ac284330c45b315c58597c70886e7af7345c490235fc16f274", 0x2c}, 0x60, &(0x7f0000000280)=[{&(0x7f0000000180)="c850a0c0b7baede9e0775aea2b9fe89b27f52ad3a637e2bcd896e0028ad18ca0534af10e4fc35a759c8e4dc49fb71901c661b9263f1062407129ebfbd87964", 0x3f}, {&(0x7f00000001c0)="d9e6e03df9eea2bede226b2a0764ed6316387b0d3ceeb15e46c52deb05be886f41ff7f251d47aedccd9388eb2bf5493602baeb1b855d4d669e1bab42d549a18d705c75b7167ec41cfc4e8a01b3661bb189b404e771967862048d19b2d8bf5985cc40393d4d691f19889cf407a06f4d6d8ee529cc0ab49d26d3071a44ae1f3a0d85fa12ef083820283fd6a02d23a7837dd6e7ede28ea6a12eafa2a9a7e81bbfadcf95e854", 0xa4}], 0x2, 0x0, 0x0, 0x44}, 0xdd975b3be1aac7d9) r1 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_NF_CALL_IPTABLES={0x8}]}}}]}, 0x3c}}, 0x0) 04:43:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x18000000000000, 0xb2ed62f304fd5566) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x1, 0x0, @pic={0x33, 0x7, 0x3, 0x81, 0x9, 0x80, 0x9, 0x4, 0x7, 0x71, 0x93, 0x80, 0x3, 0x6, 0x4, 0x1}}) [ 263.555722][ T9802] QAT: failed to copy from user cfg_data. 04:43:32 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000040)=0x9) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) sendmsg$inet(r2, &(0x7f00000007c0)={&(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000280)="73d07842a78b24b68e0bff9859488ff1aaf328404e33cbebaea1f832173479f98c81e8f7f6bc7de9685fcc820ccebefd0c2df5892a26f784670567d7fbd07d66237aab2b8d9827570a57cb82defc9b2c00f4e3ae66448bb03249d9db3852e3383e19689c467d32d22c578b92b213d57d968d667be62ff627ca57e8eb82cf8a3bb36549ea4280b623d97763c0380589cea4305c678cfe581c566ffbebdab0afb4b6247cee3974bc666e1479ed75e3e1f234c842c44986567e94914913", 0xbc}, {&(0x7f0000000340)="f3bb3b26c8ea8a185d638c8165d6df333e5522fe2365ab16191b26fb740e1fccb83b5a8f8b1e7fd601b7fd8e9f426f51400bfff0bd", 0x35}, {&(0x7f0000000500)="5f6b93990e38f8bd4db269b7e0dd40586e14c2ed6b52dbcfb3646a946e2192fa130ca252514a599db6f4140f9266f8eb8a290cf9b4b1c2f3791c4a6470ce342426f7513ee77bbedadcfecf6384d399ffbc8c14c28709fdb073458481e7d8845d0b487f16071c644634c7ab2fffeea0c2c3439645ce4f24c250ee475cd292c12ac9e3faaa7bb2b6a855142b1ed4a9c90d9100d23b74a8528a0d8d3f59e9e57d6c045da8c6192fbea46143c143df78aa1137b7e3ef768f", 0xb6}, {&(0x7f0000000380)="580b9b29b5ad02e928d7729acdf6cd962a73f268", 0x14}, {&(0x7f00000005c0)="78e1527ca1800d9f95f9c9435e88126385356a5da5e98b5216935f4f039b2a1bb2b4caed777ab93221de46c7ebf68b5bc81ca9b88067c4f6f24c5ea7aad6f2dc95c91dbae35c9d88d17f255d20655ec5293aa9bdcc8dcbf9c2cbe002a8432316d7c6a386d45476130a74178dda859bb9a4abd455", 0x74}, {&(0x7f0000000640)="1fde4bcd284d0fb4dc6510ccfcc21018ca3505c929146f3e4df0ab2580f0410dba2344bdc62873fc3bec1747186f50ab56f028f0ec7e32b98c70653cc95d02c91d4fd2d73f538f0fab9328af7db74a71b3b58309b449fba04e749767a9364525b9ad88396ae7810cd4775b282aa516caeaa5552670a924035a448091bf28c973cc532dc1a8e1a7e7802e40b36a24aea373632390efd99768c63ed0c93dfe700b4952fb42b386de3e353dfd982a96aa7359f747efc7dc01f3467222afb6c8282a6de8455a340060b2f1c9dd95972e6349b62bba8f22f0312d717026123161729290430da5ed47aa7ebc29b5bb0e94acc1094ee5ca04", 0xf5}], 0x6, &(0x7f00000003c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1ff}}], 0x18}, 0x4) sendto$rose(r1, &(0x7f0000000200)="dd44015eba1bffc921502c891a29aa9bf77b12948bbd48c0433e87a6c99fcf699cc06bc8d6f54310a2b8471417bff682a7c0d72757d120243c456e7e0371915b58cbc273fac5bf0150a7cd2a0d35046aa4a797ba0a14a3d1b984", 0x5a, 0x24014, &(0x7f0000000080)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$pppoe(0x18, 0x1, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000400)="b04e973f37b519b7486101a6c23e7e8ec1f9d61de3088bc3acdd53b64b24ff79938858ac9ed0d9983f7b3fa67d911bd65cb97fdf4334d31458ec97ecda569bc156d1b2dc3b10b35cc8164243b0ad6c1e1ab8b652309571b8e4842b7b62627f908e8b07ab82bf0f5c9683f721647e95e0bac61ed5cdec1c12571f739beeef938614428b3aceb1c9de629433bda52d95f8e1ee55348f0f9722924645d186143447c647cb904d65fef79c4447f549f8ec64b5fe8ebbbe46158049beb6ac87a30645da703de3adeb2571cf00e2a51b9948a30b90121ad3bc078453983b124f06fe7b88e964013d"}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SG_NEXT_CMD_LEN(r6, 0x2283, &(0x7f0000000000)=0x86) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) 04:43:32 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0xa, 0x5, 0x0) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r1, 0x0, 0x0) io_pgetevents(r1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080), 0x8}) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x2c0}}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000340)=ANY=[]}, 0xfc) 04:43:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x62, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:43:32 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) [ 263.804604][ T9818] QAT: failed to copy from user cfg_data. [ 264.003657][ T9830] QAT: failed to copy from user cfg_data. 04:43:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) connect$tipc(r0, &(0x7f0000000740)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x4}}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x18000000000000, 0xb2ed62f304fd5566) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000200)={0x1, 0x0, @pic={0x33, 0x7, 0x3, 0x81, 0x9, 0x80, 0x9, 0x4, 0x7, 0x71, 0x93, 0x80, 0x3, 0x6, 0x4, 0x1}}) 04:43:32 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000ffffff82000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffffffb, 0x2) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000180)) 04:43:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:32 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) r2 = socket$inet(0x10, 0x80003, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0x71, &(0x7f0000000400)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={r6, 0xe0, "bf58114fc57775bc5947b9ab64c51f528162eb73d37cbdcb2c1b3d1258d47ebc2e5bc8a2ce136568e7afcc179c2f3be190602acc7e6f1b81bc9b52cdd144eadd4bb826c06526f18725f819489f58c28a117086d9458e1b282b567984dc2d059fa9017984176818ca8fc9bd8270a7aafeed09e82d1780dfb82b9f03a92fa5e0cbd7544840e22b92856953908b0a0abfb4ae6e93cbd075c413e32565ac9bd655d7fc44dabb16e25f0c5dcf66b527954681263748159affad95f50729adafe40d7d57bdde2af78e592393f30899e2d0029506eb0b82957f5a561fc2a68f9be6a176"}, &(0x7f0000000280)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={r6, 0x47c2f769}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000140)={r7, @in={{0x2, 0x4e21, @multicast1}}}, &(0x7f0000000200)=0x84) dup3(r2, r1, 0x0) 04:43:32 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 264.244195][ T9845] QAT: failed to copy from user cfg_data. [ 264.290914][ T9840] loop0: p1 < > p2 p3 < p5 p6 > p4 [ 264.329240][ T9840] loop0: partition table partially beyond EOD, truncated [ 264.423069][ T9840] loop0: p1 start 1 is beyond EOD, truncated [ 264.492838][ T9840] loop0: p2 size 1073741824 extends beyond EOD, truncated 04:43:33 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) 04:43:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x0, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:33 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) r2 = socket$inet(0x10, 0x80003, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r4, 0x84, 0x71, &(0x7f0000000400)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={r6, 0xe0, "bf58114fc57775bc5947b9ab64c51f528162eb73d37cbdcb2c1b3d1258d47ebc2e5bc8a2ce136568e7afcc179c2f3be190602acc7e6f1b81bc9b52cdd144eadd4bb826c06526f18725f819489f58c28a117086d9458e1b282b567984dc2d059fa9017984176818ca8fc9bd8270a7aafeed09e82d1780dfb82b9f03a92fa5e0cbd7544840e22b92856953908b0a0abfb4ae6e93cbd075c413e32565ac9bd655d7fc44dabb16e25f0c5dcf66b527954681263748159affad95f50729adafe40d7d57bdde2af78e592393f30899e2d0029506eb0b82957f5a561fc2a68f9be6a176"}, &(0x7f0000000280)=0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={r6, 0x47c2f769}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000140)={r7, @in={{0x2, 0x4e21, @multicast1}}}, &(0x7f0000000200)=0x84) dup3(r2, r1, 0x0) 04:43:33 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) [ 264.577514][ T9840] loop0: p3 size 2 extends beyond EOD, truncated [ 264.620867][ T9840] loop0: p4 size 32768 extends beyond EOD, truncated [ 264.621136][ T9864] QAT: failed to copy from user cfg_data. [ 264.643617][ T9866] QAT: failed to copy from user cfg_data. 04:43:33 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40096100, 0x0) [ 264.673180][ T9840] loop0: p5 size 1073741824 extends beyond EOD, truncated [ 264.710692][ T9840] loop0: p6 size 32768 extends beyond EOD, truncated 04:43:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x0, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:33 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x2, 0x10001, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x300, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x2040000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f000059aff8), &(0x7f000034f000)=0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') r7 = msgget(0x0, 0x786) msgctl$MSG_STAT(r7, 0xb, &(0x7f0000000200)=""/121) preadv(r6, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f00000001c0)=0x3fe, 0xff9f) [ 264.888075][ T9872] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 264.900103][ T9840] __loop_clr_fd: partition scan of loop0 failed (rc=-16) [ 264.901423][ T9873] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 265.017086][ T9840] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 04:43:33 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x14100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x7, 0x49542226, 0x2, 0x0, 0x54833130956dd0b0}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x20000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000200)=""/42, 0xa}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0x154}, {&(0x7f0000001380)=""/239, 0xfc36}], 0x9a, 0x0) 04:43:33 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40096100, 0x0) 04:43:33 executing program 1: syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r2, 0x0, 0x2) unshare(0x40400) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, 0x0) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="65953ed75f72da1bc5f814004d3726722b42f770862e5f75e866fc8708339f184321fb984d7558e4e70c695b1c0a03bf49704898b9e3bb6007645d2e2999c570f899e85b5b711bab5e5aa298a611b8806931bdb5c05cd4fa6ce71f5cb256c333973345d4754ca0d1572bf1e4a0fcf6346491e6433ecc28ba6e2b9322cc57c88cecfdf1000000000000000000"], 0x7) readv(r4, &(0x7f00000002c0), 0x0) getuid() pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, 0x0, 0x0, 0x1) close(0xffffffffffffffff) splice(r5, 0x0, r6, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)=0x200) io_setup(0x20000000001005, &(0x7f0000000880)=0x0) io_submit(r7, 0x0, 0x0) io_pgetevents(r7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080), 0x8}) r8 = fsopen(&(0x7f0000000180)='logfs\x00', 0xa28d4ef51bf90c7d) r9 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x6, 0x400000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) io_submit(r7, 0x4, &(0x7f00000005c0)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x7, r8, &(0x7f0000000200)="6a4b125b57e2e3c6c9ce6f5b20af0d36589bf4c305a5cdfaf23aa78425a5f0c56d9aef0cb26991fda32523a8f8d977e6dc4953e39baa2216bca2bffa42ab14b2ab085a7b3b37dfecfd267bcbf7a8ec154179cea54d7c23a3d7aa28f012dcd768fd581bce85aa68141c0fe17e35d9", 0x6e, 0x80000001, 0x0, 0x2, r9}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x2, 0xfd66, r4, &(0x7f0000000340)="7dc8067489788fdff70b3a513f2849fe00dc3a4e8b23b594f0439ed760360e643bd679ec6b759b0c2fe540353b43e25f5c9e258a2fbb52a139e5016537823cbc2be4fa5a0043928f78e1f20098be54ffce46bbb9d8095181cbc36dee7e1f3f04af89dbaae02a426d844d065fbbd1946b13108f3edf986b542977d0a5a247c3b02cc2839244ac393186da8a9f48940c4775674eaed148f89c78ed8f70111bd9ada5502dc1131d19f8e0dee3cfd585d2d1eb20190bbd6bed657d15405d66e8edeff67cfd055c94c436ca5c71a617dee48f964bbc1205fdff7558eec8dad5d6c077b9e7137a523d3eb65d172df1b5be095e", 0xf0, 0x790, 0x0, 0x1}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x9, r3, &(0x7f0000000480)="a0472295b488ad08bd568d6692b54dd237fcf63ceeb378a5f3ab13de3f7328917dfd5f7f705f8fd4b3d445fb97fd9cb3eaa3ce37949d5cdececefbffa783749a476fabf54a89", 0x46, 0x7, 0x0, 0x0, r12}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x2, r15, &(0x7f0000000540)="f9e2c32636e2bc9599690c1c06f94b2187bd879f433f6cba6d216fd95fb14b7e", 0x20, 0x7fff, 0x0, 0x0, r6}]) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, &(0x7f0000000000)=0x6, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r16, 0x0, 0x10000, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) 04:43:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xd}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x240840, 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000100)) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x10) sendto$inet6(r0, 0x0, 0x0, 0x200400cf, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) ioctl$sock_netdev_private(r4, 0x89f9, &(0x7f00000001c0)="948dbe82751e101b4c0705b992b859ef32ced65316ada9a20f940e7b5f21d446feeeb5cfee63603b2f9dc4d7f9f73b461a4d283540c482fbc3c26f24e6d5f96f217d0a4a55272ce82fc744cdea7562714f3d757a580f58394d39c316815ff5f830f7b9758cbcc3b7a61651055602e6106b43e5bc30ebfe9a0f6a49d8f82c9d53fd") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) ioctl$sock_SIOCOUTQ(r6, 0x5411, &(0x7f0000000280)) 04:43:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x0, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x2, 0x10001, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x300, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x2040000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f000059aff8), &(0x7f000034f000)=0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') r7 = msgget(0x0, 0x786) msgctl$MSG_STAT(r7, 0xb, &(0x7f0000000200)=""/121) preadv(r6, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f00000001c0)=0x3fe, 0xff9f) 04:43:34 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40096100, 0x0) 04:43:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x10000, 0xc48281) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x14, &(0x7f0000000000)) 04:43:34 executing program 2: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:34 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="00000017600104008e0900120000571d000000006af082f176878ec9572f358e14aa0e5f0a0900000003"], 0x2a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VFIO_GET_API_VERSION(r3, 0x3b64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/100, 0x23}], 0x1) 04:43:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x2, 0x10001, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x300, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x2040000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f000059aff8), &(0x7f000034f000)=0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') r7 = msgget(0x0, 0x786) msgctl$MSG_STAT(r7, 0xb, &(0x7f0000000200)=""/121) preadv(r6, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f00000001c0)=0x3fe, 0xff9f) [ 265.738604][ T9924] QAT: failed to copy from user cfg_data. 04:43:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x8200, 0x32, 0x0, 0x27) 04:43:34 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={[{@mft_zone_multiplier={'mft_zone_multiplier'}, 0x3d}]}) r0 = creat(&(0x7f0000000040)='./file0/file0\x00', 0xb2) ioctl$KDSETMODE(r0, 0x4b3a, 0xffffffff) 04:43:34 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x1f, 0x2, 0x10001, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x300, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x2040000) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f000059aff8), &(0x7f000034f000)=0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') preadv(r5, &(0x7f00000017c0), 0x199, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') r7 = msgget(0x0, 0x786) msgctl$MSG_STAT(r7, 0xb, &(0x7f0000000200)=""/121) preadv(r6, &(0x7f00000017c0), 0x199, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f00000001c0)=0x3fe, 0xff9f) 04:43:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x10000, 0xc48281) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000100)=""/4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x31, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x14, &(0x7f0000000000)) 04:43:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, 0x0, 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 266.168907][ T9959] QAT: failed to copy from user cfg_data. 04:43:35 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f00000002c0)={0x7, 0x1}) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x669, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080)=0xc, 0x4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) keyctl$invalidate(0x15, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x84020042}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000140)) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x8000000000001}, 0xc) write(0xffffffffffffffff, 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg(0xffffffffffffffff, &(0x7f000000c640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040), 0xc) getresuid(&(0x7f0000000180), &(0x7f0000000280), 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010000000000000002000600", @ANYRES32, @ANYBLOB="00000100", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0], 0xa, 0x1) fchown(0xffffffffffffffff, 0x0, 0x0) [ 266.235147][ T9966] ntfs: (device loop3): parse_options(): Invalid mft_zone_multiplier option argument: 0x0000000000000000= 04:43:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, 0x0, 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002a000000440000004ed49db98acf3f86135c3e3e19a15030652531e0e19eadf7948fa5a552c3a2b3b16f11278a0c500376590e03f1931360f820fed79dae35cd9f"], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 04:43:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000000)="2e00000021005b3f0016814879008cd900072400000000000f040008000000496167e17b38f51420b45b4ad7dc2a", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x400000) openat$cgroup_ro(r1, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) set_tid_address(&(0x7f0000000040)) 04:43:35 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:35 executing program 3: syz_mount_image$hfsplus(&(0x7f00000017c0)='hfsplus\x00', &(0x7f0000001800)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)={[{@creator={'creator', 0x3d, "b16d7a00"}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_sctp(0x2, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r5, 0x84, 0x71, &(0x7f0000000400)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={r7, 0xe0, "bf58114fc57775bc5947b9ab64c51f528162eb73d37cbdcb2c1b3d1258d47ebc2e5bc8a2ce136568e7afcc179c2f3be190602acc7e6f1b81bc9b52cdd144eadd4bb826c06526f18725f819489f58c28a117086d9458e1b282b567984dc2d059fa9017984176818ca8fc9bd8270a7aafeed09e82d1780dfb82b9f03a92fa5e0cbd7544840e22b92856953908b0a0abfb4ae6e93cbd075c413e32565ac9bd655d7fc44dabb16e25f0c5dcf66b527954681263748159affad95f50729adafe40d7d57bdde2af78e592393f30899e2d0029506eb0b82957f5a561fc2a68f9be6a176"}, &(0x7f0000000280)=0xe8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0x71, &(0x7f0000000400)={r4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x800, {r7, @in={{0x2, 0x0, @local}}, 0x20000, 0x0, 0x0, 0x0, 0x7fffffff}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={r4, 0xe0, "bf58114fc57775bc5947b9ab64c51f528162eb73d37cbdcb2c1b3d1258d47ebc2e5bc8a2ce136568e7afcc179c2f3be190602acc7e6f1b81bc9b52cdd144eadd4bb826c06526f18725f819489f58c28a117086d9458e1b282b567984dc2d059fa9017984176818ca8fc9bd8270a7aafeed09e82d1780dfb82b9f03a92fa5e0cbd7544840e22b92856953908b0a0abfb4ae6e93cbd075c413e32565ac9bd655d7fc44dabb16e25f0c5dcf66b527954681263748159affad95f50729adafe40d7d57bdde2af78e592393f30899e2d0029506eb0b82957f5a561fc2a68f9be6a176"}, &(0x7f0000000280)=0xe8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={r4, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2a}}}, [0x9, 0x5, 0x6, 0x2, 0x8, 0xffff000000000000, 0x1, 0x2092, 0x8, 0x7bf, 0x8, 0x10000, 0xa4, 0x9b2, 0x7fff]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r8, 0x8}, &(0x7f0000000180)=0x8) 04:43:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, 0x0, 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0000e47bf070") finit_module(r0, &(0x7f0000000100)='proc\x00', 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0xfffffffffffffffe) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$vsock_stream(r5, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x80000) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1b0a}, 0x8) mq_getsetattr(r5, &(0x7f0000000180)={0x40, 0x9, 0xae9, 0x8261, 0x0, 0x29f, 0x66, 0x6}, &(0x7f00000001c0)) write(r2, &(0x7f0000000100), 0x1ede5) r6 = accept(r1, 0x0, 0x0) shutdown(r6, 0x1) 04:43:35 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000140)='ntfs\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x5d8400a, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000040)='./file1/file0\x00', 0x10) [ 266.693672][ T9996] hfsplus: creator requires a 4 character value [ 266.764040][ T9996] hfsplus: unable to parse mount options 04:43:35 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:35 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f00000002c0)={0x7, 0x1}) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x669, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080)=0xc, 0x4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) keyctl$invalidate(0x15, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x84020042}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000140)) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x8000000000001}, 0xc) write(0xffffffffffffffff, 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg(0xffffffffffffffff, &(0x7f000000c640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040), 0xc) getresuid(&(0x7f0000000180), &(0x7f0000000280), 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010000000000000002000600", @ANYRES32, @ANYBLOB="00000100", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0], 0xa, 0x1) fchown(0xffffffffffffffff, 0x0, 0x0) 04:43:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000000c0)={0x9, 0x0, 0x40, 0x6}, 0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="400100001a0001080000000000000000000000000000000000000000eaffffff0000000001000100000000000000b629985ef1745616dd50e9f33c00000000000000000000000000000000231a566e47737ec7d868a99c17bc2c4c62510e6f850544b94cebd32b4f6ca42d1c5a19a3325e3e4df12e1efbc2b514a904836f2499f54471467dedeb5e1129cb43686ac58843fc75008bf82196baa3f2119f398d873936317c450000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000006c000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480003006465666c6174650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000b0000000000"], 0x4}}, 0x20000000) 04:43:35 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) [ 267.078164][ T9996] hfsplus: creator requires a 4 character value [ 267.089360][ T9996] hfsplus: unable to parse mount options [ 267.219019][T10041] QAT: failed to copy from user cfg_data. 04:43:36 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f00000002c0)={0x7, 0x1}) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x669, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080)=0xc, 0x4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) keyctl$invalidate(0x15, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x84020042}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000140)) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x8000000000001}, 0xc) write(0xffffffffffffffff, 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg(0xffffffffffffffff, &(0x7f000000c640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040), 0xc) getresuid(&(0x7f0000000180), &(0x7f0000000280), 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010000000000000002000600", @ANYRES32, @ANYBLOB="00000100", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0], 0xa, 0x1) fchown(0xffffffffffffffff, 0x0, 0x0) 04:43:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:36 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) [ 267.549274][T10058] QAT: failed to copy from user cfg_data. 04:43:36 executing program 0: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) lseek(r1, 0x0, 0x2) syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x1200000000000003, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, 0x0, &(0x7f0000000040)) fcntl$getflags(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0xe80b7c0c38e3a48, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000bc0)='./bus\x00', 0x400, 0x4) r4 = geteuid() r5 = socket$inet(0x2, 0x1, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setregid(0x0, r6) fchownat(r3, &(0x7f0000000c00)='./bus\x00', r4, r6, 0x1000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r9, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f0000000280)) r10 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup2(r10, r0) 04:43:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0100000000000000280012000c0001007665746800000000180002001400000000001a7dcf3fa7f5bedbc2b851a6306438f370fe3cd3f34e0453ed9e56df53204d4e4843bc9ea5c9da37495e00c29c571b5edb21786c00dd0b5ae974fde8ba3273130200000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9, 0x1, 'hfsc\x00'}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x2, 'htb\x00'}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0100000000000000280012000c0001007665746800000000180002001400000000001a7dcf3fa7f5bedbc2b851a6306438f370fe3cd3f34e0453ed9e56df53204d4e4843bc9ea5c9da37495e00c29c571b5edb21786c00dd0b5ae974fde8ba3273130200000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r11, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9, 0x1, 'hfsc\x00'}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r11, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x2, 'htb\x00'}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8004000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=@mpls_newroute={0x68, 0x18, 0x522, 0x70bd25, 0x25dfdbff, {0x1c, 0x14, 0x0, 0x1, 0xbe276a61f1e2fe7, 0x4, 0x705827ffee8a931b, 0xb, 0x1600}, [@RTA_VIA={0x14, 0x12, {0x9, "11dd2bdf910525c69329236eee25"}}, @RTA_OIF={0x8, 0x4, r6}, @RTA_MULTIPATH={0xc, 0x9, {0x1, 0x7f, 0x8, r11}}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x5}, @RTA_DST={0x8, 0x1, {0xd0}}, @RTA_VIA={0x14, 0x12, {0x8, "12078fc3c58e61f3a0be8283141f"}}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x80) r12 = socket$inet6(0x10, 0x100000002, 0x0) sendmsg(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="5500000018007fd508fe01b2a4a280930a06000000a84308910000003900080008000a0000dc13382d0010009b84136ef75afb83de448daa72540d816ed2c55327c43ab8220000060cec4fab91d400000000000000", 0x55}], 0x1}, 0x0) 04:43:36 executing program 4: mkdir(&(0x7f00000018c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000001c80)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r3) r4 = geteuid() syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x2, &(0x7f00000003c0)=[{&(0x7f00000001c0)="50ed01194331ade56c02657a5cb7c04fe4d37384ce23ed2da63d6deb9446", 0x1e, 0x40}, {&(0x7f0000000380)="503a0fdc6017ffe75f9163973f786644e6fc3c11aeb2123c7ae6784f353392ba2142a36eac", 0x25, 0x84d}], 0x1020001, &(0x7f0000000400)={[{@fault_injection={'fault_injection', 0x3d, 0xa9ae}}, {@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x6}}, {@acl='acl'}], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@uid_gt={'uid>', r1}}, {@smackfsdef={'smackfsdef', 0x3d, 'mem\x00\x00\x00\x00\x00\x00\a\x13'}}, {@uid_lt={'uid<', r3}}, {@smackfsdef={'smackfsdef', 0x3d, 'bdevppp0/'}}, {@dont_hash='dont_hash'}, {@fowner_gt={'fowner>', r4}}]}) getresuid(&(0x7f0000000000), &(0x7f0000000180), &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x8000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) fchdir(r7) 04:43:36 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:36 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f00000002c0)={0x7, 0x1}) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x669, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080)=0xc, 0x4) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) keyctl$invalidate(0x15, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x84020042}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f0000000140)) bind$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x0, 0x8000000000001}, 0xc) write(0xffffffffffffffff, 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000100)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg(0xffffffffffffffff, &(0x7f000000c640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040), 0xc) getresuid(&(0x7f0000000180), &(0x7f0000000280), 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010000000000000002000600", @ANYRES32, @ANYBLOB="00000100", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0], 0xa, 0x1) fchown(0xffffffffffffffff, 0x0, 0x0) [ 267.808208][T10075] QAT: failed to copy from user cfg_data. 04:43:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:36 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'gre0\x00', 0x0}) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000100)=0x54) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) connect$rose(r8, &(0x7f00000000c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0xc) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00', 0x6}], 0x1) 04:43:36 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:36 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_sctp(0x2, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r6, 0x84, 0x71, &(0x7f0000000400)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @local}}}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={r8, 0xe0, "bf58114fc57775bc5947b9ab64c51f528162eb73d37cbdcb2c1b3d1258d47ebc2e5bc8a2ce136568e7afcc179c2f3be190602acc7e6f1b81bc9b52cdd144eadd4bb826c06526f18725f819489f58c28a117086d9458e1b282b567984dc2d059fa9017984176818ca8fc9bd8270a7aafeed09e82d1780dfb82b9f03a92fa5e0cbd7544840e22b92856953908b0a0abfb4ae6e93cbd075c413e32565ac9bd655d7fc44dabb16e25f0c5dcf66b527954681263748159affad95f50729adafe40d7d57bdde2af78e592393f30899e2d0029506eb0b82957f5a561fc2a68f9be6a176"}, &(0x7f0000000280)=0xe8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000100)={r8, 0x25eb}, &(0x7f0000000140)=0x8) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x4) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r9, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x1}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) statfs(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=""/126) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 268.057068][T10090] QAT: failed to copy from user cfg_data. 04:43:37 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:37 executing program 3: pipe2$9p(0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8447, 0x0) preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000200)=""/202, 0xca}, {0x0}, {&(0x7f00000000c0)=""/66, 0x42}, {&(0x7f0000000480)=""/215, 0xd7}, {&(0x7f0000000580)=""/155, 0x9b}, {&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/219, 0xdb}], 0x7, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) symlink(0x0, &(0x7f0000000200)='./file0\x00') 04:43:37 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=ANY=[], &(0x7f0000000400)) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xffffffffffffffff, 0xa}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$autofs(0xffffffffffffff9c, 0x0, 0x800, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$BLKALIGNOFF(r6, 0x127a, &(0x7f0000000040)) 04:43:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000039000503d25a80648c63940d0224fc000e0002400a000000053582c137153e370900018002000000d1bd", 0x2e}], 0x1}, 0x0) ioctl$sock_ifreq(r0, 0x8925, &(0x7f0000000040)={'veth0_to_hsr\x00', @ifru_hwaddr=@broadcast}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000100)=0x1200, 0x4) [ 268.280633][T10105] QAT: failed to copy from user cfg_data. 04:43:37 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) [ 268.438511][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 268.446218][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:43:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_uring_register$IORING_UNREGISTER_BUFFERS(r2, 0x1, 0x0, 0x0) mbind(&(0x7f00009d8000/0x2000)=nil, 0x2000, 0x2, &(0x7f00000000c0)=0x7, 0x60, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 04:43:37 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) ioctl(r3, 0x1000008912, &(0x7f0000000300)="11dca50d5e0bcfe47bf070") r5 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, &(0x7f0000000040)=0x13, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r8, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r9, 0x400, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x0, 0xfffffffa, 0x80000001}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20}, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000001f80)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000002080)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002100)={'t\xd3\xac\x00\x00\x00\x00\x00\x1e\x00\x00\x00\x00\x00\x11 ', 0x0}) r17 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x90, r17, 0x21, 0x0, 0x0, {}, [{{0x8, 0x1, r16}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @activeport={{0x1e, 0x1, 'activeport\x00'}, {0x8}, {0x8}}}]}}]}, 0x90}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc0}, 0xc, &(0x7f0000000140)={&(0x7f0000000940)={0x1388, 0x12, 0x10, 0x70bd28, 0x25dfdbfe, {0x11}, [@nested={0x374, 0x89, [@generic="4b148b77bd698d567d4ffdb710356a9e2fd50947f87721139fbcd0288f1e03df42054807aee1a5dade780ecf264881f15063b90d3bf1a4f128aa0d4bde2032a822b71af69ec74fa78c93193c07dfe0bae969904fd6987ef600a4066d1081827e46a913a7ce6dd3b6a4801a82135cbe8599a4e759bddeb4883c1fccff212fba161ddfe6b337016b48d312ca624df66d136e9ddc2dc0adf63181bd6f42bef4751a9b59a20db702ffa63ff15b4664bcf54cd9006af75aeceab14ec9c3890d62a8e3b1ede4526546bbc7246db475aefcab", @generic="a5feceb83f47195ca5562e5a2d1b2a6d42402c01679e98d52ff13b6d03c7071d0deefb0f22f8f4fe99794e75a93f582f80660cd8850290f60f72e66cb81bd2c314de403eee34e07d15394df11d535c5d5a6d47ba8a69fb70dd799643d761b06b8d6c65e2e64b89f4913056532b1ea92b3ea29ba13b7a700e3d", @generic="fab3438c1d45484c6ba708ea774121a3102e2987fd509eff34c4c840fe265a87ec55aaf17e32b8b7eb4e8e0de24bfa1e5e301a9e9488bdab8cb903058270dcb2c9298e6a3787a85d8625e62999b4c68f19654dcab709045d4e44934a4833df47da6568dbde0a8dbee7aef67c70aaeefc3879102ffdc9500413aab9bb2951657c60135474fa8d91ba5d4558217903101f964fadf6f95c2a6d4be0c54d3d3096ff3384fcd461c93ad869d238ea93601d9e8b8579ac034b7235822eb57b24b23aaa68c9798f9dbee6028f", @generic="9c6ed42e7017736105e9487f7b4b703177de48f5c9d284101baeb32ea306d9a6ef7171c1370ece5c2d04b46c6c7b2deba6b2da6ecbff787535fe44335cea0d0fa741ec419845c8cf03daafd5a2e8f706a288778b413f04", @generic="c7bf12d38198698d445d672f5af2f92c145d92cac69cdc09947b0faf93d4abd07a619db464105060910f5bebe0a861d54ff80412b90066a194a74a03cfde1a8ea182544fe89ab759b462c6210e7b82ac7860748c2e11ff8307ad82d11ef788baa8058d4fca85ba4a8020927ef23a27318efc0230582284c6f97e3304ed8a23b90a219ecc9e3490fb240b1acedd9ee219cc397fa8c49331f81c12ea6586e3a35e375de7d0f879043115e38e1ab65de10204a2c9b33b0ccc4a6a7f6c57911860d3a188c695a81588a6397511f340c75148b01acc3cdc09982ade74883f2cdc4a2913d665617ac664f52783ad242ef8dc42d6ca35ece1", @typed={0x10, 0x5c, @str=')@,&&:proc+\x00'}]}, @generic="58cd325cbf9ab9dad1774771b5dc0ec3a2e306298bc39f77feeea922baa00dfd31418745a4d5738acc2fb98dd6471c8fe7c111e0a1b770128cae3a6463af0399115df9a266de9c70b380466634bf90554cf697fd4a4921e829c2d08e1522e95af1d74a5513e381cfa493281758653216e7676f42ff7183aabba96fd7b3e77625343e1ff4558cfb9583adf3634a08a08b21ca6aad75f6e28eb1ea72bd61e722d5b410dd6901ce1a4e8a748b41ec698ce2e6461ea56cf90dc8a2908b2019ed04266f6ab5c96afa02eb3027bd5f95051bdd9e799fa0904c27b3ccb7c34565988d447d8b56bc1ebccfcc0dc6f6c395e97bb4ddec88e5436664afb90d5345535903b433d083c1082a8d74c8ec13cb7c76d707650aa7a128be122f10d0bc7ace9fea1e6ae4cf48c2d18b6f7bd89d7fc4a397139fb9b91387e4d9a559c1f779a0a9c8b5f874056e47d012620bb9c298f62d76a0761af175b21672711c83faa803e923a1a6ad88a658362ac949ff12c99228dceac0936bf2a016b25fe93335ab6ba84eccce401cd208207ffe2c6821d04c40168724b845cd7627aaf21e3d55f8f09ad226466b4b8a40f4e91db6e2796fc0923f45597b0a5b9d05bca571447eacdfb907c072e16b2ac03bd7abaabb5dc4a0c2b198576787c7b3cf80e58f8e5e1a4665fd94e1cf8e822eaa038495cfbb650e19d39910c8f6d529754de82ce1677f892a92913d8325fef636a72b0001bd6d118f350c4c5eaff84a485769bef2ffea31ddf09e6b5b322b4e4ced0b0b52a686b0ba8107a1f89274a52dd9681dbff23b894708a4538f334df2258137456f7249a2aeee26c8f845222d5f6afac26ac8bc4212ecce6da977b10f6bf144e863f5b08412acc684acd7136af8ae28b7f321cc69a0250d2b48d90fc713a17f8fa3c00bf28837358de021bd8978330cad67cc857f4fd927e41e5bacab13975d7364a38ab781ef1f1cdd6896d461dc13e086718f92a9ec311ca4d11d3e1ed460389a5bd71212cfee28e2246b9b43e59354199311ac16e7e6d6775cdc53ae64039382f1a922e7f11e5e4c7c04791139b56f078c1d4d31ef88aaee32f7a444c3d75cb72254e8150c78d85b2992f803fe49bb8c22d75a16b6a476022719f34c3487907c5195ef4cba8e170afbc2787500b9c2ce970b1e3dffff93f7b4b03074f9e72e1382872505fce590dc7477b456d43a4598b4c5a2a56222f64cba4e4dbad333e7d5364433191951d9154aa070229a0114a5dec3506f3117aa54f59ae4f5672a015572e66f01b3c5c6e45b60f3a0b8fa40861c61b5ba3e30aa934f698d9bdb3ec56f00c2b3f5f05042d6930dc21d84b4e06e0ca774db2295cca484c1ccfe2b2612f25004b76e93adc587967134f17ebe936e46c77f60de9e2e45b42d8c1b4212fb76eadf51c39d0b9f1c44d304fda18241e87be244f40d378aaad7bdf8632fef98e9774caf8d764804b449cffc60e9351cdb64020defd67f5a4386e9cdcfafa8041951c2990caf0d0cfecadbe97432c315ef9698fbece09c5da68d2a6d7cfa95887e34a624f2d70fc78acdde267e5d26c896930cb1b8963969b6da6bad5b82d53c0206c655d8b2af81a5440497a4249225e6bf672223b784ac0b4199ed5e2ea554ba2b8e7ed176d20f3dc99ac7be5e84e9f391fc2d78a60754fa324e8575d8fe69b3d0bf10a3e10629f0b67dc9f8969da98e2c43d49fc45df9ba88a379b3626d17d61e91ba21a1a742a4b8eeb97b27e31a34bfbaa4dc7bbff59e965e84d5700d615479384fb7956c7f50023ea5bf27ef7ac7fb692f2beb812afac9f0e69c5b14e7e573336333142a14f240ab1ed5760f7609780af69bbf92edd5d288edd1c022d077b37614ddddff627eaf222db36204c2982afdd881f3858469db1e8a4e78c5460799b97fec0b3fe9daab073ba6326a9d159b81d7137b81fdf9817122ea56b9ddebeb7b22be316e959249d26faba53e615ed961dd0b7d29b1a9bf3851cb2bb40f767cafb3dcb1cf8fa7ceba0eed18f074ecc64acc7dd00ac9c4edfa0fc1a58d986c7ab6012a5e37e3c871e6a55aaf1d971e78726573c5d852e33e03389d2b7d73dfd25f5cedf09d73435bf8c513b57612f5996f00eb384cfc383e9de420a528388c1a2fbb57a142a450ff8aff3dcfb1947db62ef38de73fffceb990da81feed5e7a8aae5f1f7b2e58bd088c0e6b503b83f38de80e86c9e1ce99b30daa4afc8902c60d2f788a4884198446067a6c8f5490163e32d6f37c0b4416ac3b3d6fc55e7aac777bc1768d92a2c93cdf1c2bd0b9aec2e9ddae8c2495eac097a46a6a95ca5315614a0e4d5c7f3647c87ed10c1f729541eef86af93e8cb21b7b16a21e53a957b221736d8c1989277c84a8ac838f41a3a50e779c94790f751dd13b360982a16fa893ea3da38d989496a213786ce76e232b792c6f9864c7edbd341f42272fec209de5ce4b1722467e97e7d6a85c2f50643346f58213729ca9b4dc4857f3b90a313e83184077be4889c5d2055b42a48f1cca8848a7615ff63dd69e8400d83b3964643cc6d1d494102fb54b8288701fa77b8bbd5e4e237d74e9e060814070d96812a2854709b02e0b8587876c89d22d16bec280b10cf4493d23b0e3cbdcea79f0a90a4f8ee96c5ffb5c475551fb655e3f257615a7a7acf8b78d6bb9237c7740b89e22f54d10c2b639882a6cb679e07a0bd3cc1f58e6cee04a5508cfb64f922ef0e948b702d647f8a00a623da9ca0523164181b0faf460129ef3029a0ff62448d6493d5f8e64a7d362ea20240de2697420b60a296bfeb8258b911608c5fdcf26c5590ea69ceba007f9593690a3cae765904bfafec2dac840d4ef3dd039a2d4103ec7e0e2fad234e20144776eeb356fe42ef6f78850961181870c77bfe2c701cf3dfc96818a73069842bfafbd43deb0f6d258ddd7a23997ace7f46eb9841fb3ed92864eea1a4c3ec1f0b844d92695f5e6ec5dab11853341fd2a44c3246b8c2ffa66a3d8f13b09ae37ee8e223be208ab9c0e6e5f38421cd1ab5fc915d72fd3f953bdbab02575c622db507496f8c78fccb3c4ab2b0a03d3daa385d23b381700766a7dd2e1fc98e22e52f9cf9c0f4922dfe7bf06287b8ef552533db7b69d7b188f639dc2b9fd717181f3b4672fe1b63bc7def798331a0d1a883dbd2382c48e787833c735185538b85b385cd25a95d9d11d41bc0747071095292cba15d54d33c21e91bc426c6e6c4ef451675074e67cbc3115b4e4d6577e8e4b43581f16b3a5f5b81053d68ae1c5f323a9161eaf8b384fae6ff36875c3f022d7ce8600f3ceff6a0e9c16703dac22b95cdd2a7fdc4561e04f0452c5cd446d2ebedb6aa4948c301a4fff182ae1c451fdf18987f016c980ae31be16302b21999d69a475c52ca73bba44e50172ab250a16b1e2db1515985f9ff2a0cf48780e73994396c431d51738386934c566317313b402e6290c5aa8c2e92e8d283f5293088d2c6c76a9b267eb349ccf90c955b765fa554daf840c0899e077cf8913d860a41e6938812021535d2d7c7f7c198d802bd0d1c1c5e88f383e6ff284069454703b0698a58e64a210e46c000d2b05bf4add588ec9371c537e1738e534d33ef26762cd60924569ea83dca105085ff14464bb2562ae2d794324960e69d9c75e00f5e07e19af3b2c267589077574c9020e11ae9129d128bd909699e7cf9ee7116e0087eaf930cd684f15e735f18ecb32a8c816a110c020e11380c2a0fe7df60fb3315a637f7996feb0f891817d6ebbadb1b6949f36ab6324827086ebb0173ddf494d5fa1c398d64ace99b7138d85271e33925bb25a344e080afbad2d1f55927177b6a655b22c2aec31c634f1e4943000308e9db6c41afa99e5946f97d1aa3df00298d336a6b417c55b3bdc9233358939384d27c7f9baad1818e9e22ae0402ba8239154057357940021a739b5d97056e790ed536a5992742a73eb33c453bf1454804d402fabcc81eebace97a79c82f68c3b64d8e4c015f9754ba0bfa47ffca0920c527f446220d1af3dd19c0e41310ee0b339ae3bb7768195c10046a649317b10091fa7d8bee3e7fd0bc458b8788ce1547fda4f7b3c6181414eccd1194ba573a18a265661e469df3795b8767ab1525380f179257e0d9597468ae8473ff170d73071a2d86b6dbdab56f382db9487c7877b8b6b06bb7fee17b28f307a0717e04bf462a0c01a8dc4d8e3953a15fc2d37807335c9b497df391d40b6b17466b0fbc45c22ca2c065a39e02741204eb47cd21de8160caf841982c92d5dbbdbcf33037d0148ace66b5dbdeb822f50214b5fa5a75c1c374656eb9c63eea8e390674201afa97b987a7fd7d03c26915f1fd093e4896a0be548957d5b508df753af0e762596cfede082421d42351bc8a9ce3b24fc152d1337225105270860e87c418e9248c56350ef3f47e145da24a6a66c47b475363a5be77835a1f6ff3a7c22fc3dec4bcad4bbe2a7af0d81cb6cc52b6dd721ab97b706464bb80f12e2235b2bc7df5378b15475d1f83f2d48c1bebb13f0bdb3ba72e6422033023d957a3cec8c69aa336fd8f57b125500ec4c5767c776656b95e312f3bc7841d1dbaea6ec6457da1479244634a5902d33117538cd394733f1d56ba97612b66a63b1be5e6298c70cfecbbab1663575ae721defcd98c615ce69555a21b193a35e419facc6f57edd7e41a1f1161f13c28cf883158995b4ddd475fb7302e038184f3e99d26a21ba01f6f17bd1d48b02df1cee499421acc9d4e5e343ff5fcf1c15a77bfcca5a4e04abd4ae7b4fa439bf673c96a89a28290721321afee9305550a35999d9556f4e0fd96ac006c9c9b7879b16230123e5ba0914ca99c0e3d8063894c668c507f6170d84cfedd3c13da309858aaed9e0c220f4f73a09106258658d240dafb5afde83bf02ba3aef2fcb7c06e9f8f2e5249385004545e13714c358d0ca8e92616d8ea533998fb11009849d1a13da263abbe53ba4dad28c66cda437aeca0e3ac8a8bcc2b581872462ad9c1a19eb22d8205d1452e5735c93c652363dd23c312d6135a25dc8401ce649a04f835154beec0578905b3093d9ac7821654ce8c75a6b31a056404728448570c0d024aa641ea97879f9ab4209b573c398b9eb98b164357113c17e67a5a319e6c101a77c03800539e84d8a9f25f7335423acc07005be28330b88d10d9889741cae92abedcb223169157c01ad2faafea49033d59dd030947f52b0dc0db82340bf57b2c6e7bbd6e3abfa22bec0dbc0f3e9e9ef50da2cd690d6e141ab9c3686cc51d6c6a954cd6beef490d3842a2c496faf266926637e1f99e8e55e10a8fd83312d02e97e3a787a9b132dd954d0a170b15ca8c08be366ccea391cde41676cba260418211a09a60a3c838a6777d5a63f3bdfd593df3a4ded5f6e9b9901df4f1e8f029e48b250283d1d79b89c69d42eacb2ca5c940cfc9325999aac64f5b30ba853d0bf560adc16fa6be16a6d90887a1a19f11937e3db15c7d067d7dc91724e08812d75feef61462481253fab8894360ff8740772954bda441fb2ffdecb671d6798246b42c083fdfd423dbda13caee20d85e81f8ecac43c0abc03d3373702a32025cf791b35b5b9bf7a28a0fe7ab1f39c66401e27cfdb8e36d3ae0649276a948a3b438e22aeb817c27e2aff0b49cdce5085b6822b174dae66444464dee35e94ec503879ddf1c17aa221bccda06725739643150508221200e13fa30a44e7d99f8e43729a4bca106e14a5cbfc3dd338a175ca895d7dae3f1755bfeb610d26798fe12e6aaa5199c8323fd3830121"]}, 0x1388}, 0x1, 0x0, 0x0, 0x8800}, 0x80000c0) [ 268.554687][T10120] QAT: failed to copy from user cfg_data. 04:43:37 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:37 executing program 3: getpid() socket(0x1e, 0x5, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f00000002c0)={0x0, 0xffffffff}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="2a000000030000000000000000000000050000000000002f2700"/38], 0x26) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) [ 268.676097][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 268.681999][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 268.774507][T10144] mmap: syz-executor.0 (10144) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 268.877121][T10147] QAT: failed to copy from user cfg_data. 04:43:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:37 executing program 4: mlockall(0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000001a40)="1468c24cb24c266187218be7e377bfa4332dc4ec5bb3593b90ce44c77187041b6fb28aee5425687df92713a759bf270e33a15c7eb803b55afccdc1fac332d16726d2f0a15702a1e6345b2cdfd43d65a2f930284edc2b56e6400598b1f13b2bf90671eb58f12bce8c063c630058419804d491ea5800", 0x75, 0x2004, &(0x7f0000001b40)={0x9, @remote={[], 0x2}}, 0x12) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000001e40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00007a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f00004f4000/0x4000)=nil) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x81, 0x0) r10 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r15, 0x0, r14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = fcntl$dupfd(r17, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000080)="c717aab4f9b23fbc4a1b544848bab83cb559ef8990a05ef4a6ea34e45f9aa4cfc0dbeb76ae00ab0cfdbe802a33574fb5c0491920bb2092cde7deefcd43a51ee76985a75bfd7104d8a9c30c6bc14f1f1cbaa16840ca1f0a386d12a57a2fa37e24d3a5be9f312a64cdb324b43e40b06a694b18d465d41b9e03b14624c3466ca8e73fbbd86d1e40a09b040134b209fb4ea714324d2111524d1e264cf5545a3b25aa0b2c0f81bfc0548dbdc8acfd0a73d87dd736c68fbcb6c5901d5741529ed1806dd6f769190159a9c742efdbb040237be83f20c9d97da7767b27", 0xd9}, {&(0x7f0000000180)="ff8cb53323ea899d49772d012343161afba6079d9eb710166292ef54f58564ec0ca4295a540b4a9c69fd7ae70614ee0a9f6dd7372d6dc3e0cc22b88d80e22f9509c680a7e58040202823d3e0", 0x4c}], 0x2, &(0x7f00000005c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r4, r5}}}, @rights={{0x24, 0x1, 0x1, [r8, 0xffffffffffffffff, r9, r10, r0]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r13, r0, r15, r18]}}], 0x70, 0x884}, 0xfb566f18a59504fe) setxattr$trusted_overlay_origin(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)='trusted.overlay.origin\x00', &(0x7f0000001c00)='y\x00', 0x2, 0x1) connect$inet6(r1, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r19 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r20 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r20, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r21 = dup(r20) write$eventfd(r21, &(0x7f0000604000), 0x2e8) r22 = accept$packet(r21, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg(r19, &(0x7f00000019c0)={&(0x7f0000001dc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r22, 0x3, 0x4, 0x1, 0x2, {0xa, 0x4e23, 0x6, @mcast1, 0x6}}}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000700)="e1138a3a52a48f060766b60d650c0b50d60172d6af663745226f282d43d34772fbdecf0e049e4367a6724c91437582da5f1c7d5a3ca2e0f05db64d634245a5ad7cc64906edf84e687a9d59ab39b7d569c704e6e86bf1dcd73c9d1319f31a047fc564acedc0cde9ba232a742a20eab070b082b264e4effb24527a3ad5c194acc5baee5e2759240fa31222e9de084e9f89186eaa6381e9d1f67124e026ab2ef1d8c42e203dbb90dc04f0a5a5493012d8e154b2532f9809c91e14e248a71251feed2c225bf1a4ba914be9a661dfc59f512a5f40faeb9118e0f98a4144c0ea05e266b7b73174ea60f7a14f1c12ec2d323735f0277125f9f13b83e7cabe2785de6232c953a25aa4bb548fe9b2eb83ea10435a8785beb1f323b6f4b9629c735d3429ac2054df4ad6679b6ec855082e3bc0f05ccf9e54747d317c82d2eec56082274d020271cb6de1474a16c5deda3426cd8e69571d0eace9de6928323cb6d6a27256ed053b", 0x57}, {&(0x7f0000000480)="16fcfbac89c2b8fcd12f8ef6747f63cd78ad", 0x12}, {&(0x7f00000004c0)="8f7abb3ce3db8ba75a780e6df9fc493e46120f704671a3dd03c4284aa63dbf9acb4b74a58af82c662e34fcdf449ecf4435919e3cf2dc37238a37b11d9bf08659fcc28d26b2e3de57", 0x48}, {&(0x7f0000000540)="50f5f9bf7da956c6ac81dd773a89815a8a1c9ba330e584b29ccb076a5663c06a8f550319754dfa40cb6e100a82bf26644ae4b392e21c62a866265e38752f01bcdb4f2fc440a253d3e398c1cd9b782144ef1fc937e49a9b043494c46f7edac3f354e19dd0e2c179c715831fce4ed5fc", 0x6f}, {&(0x7f00000005c0)}, {&(0x7f00000015c0)="7d279fb1e68d6b06d7d2daa2153041c772c106016f83b0e90b2b95dad80273deeb05ed9425f7cc9b2f8d532e9fe37cc2dd1ce3486df56cdfc9512d9ecceacdc1a183a95804bd096bc5e33676a85697834c3e80bf7f4c5ead949ee2d6f7820e6843ba0c6c1d4524bd40281c9fbc", 0x6d}, {&(0x7f0000001680)="c35ca89e9a57093e2b7c68011976a6295fd0702376e4cb4c46a98a23131d17efe79d447f58669b67595d47a47b9139292085a02ac6d03c33eb97d11dc299ea37b63e5de2d02844a3ba08d42b23961fbee55ecba6c18bb4bb9d1573a3f5f974ad530a6297f34bcf2cee44f28a057439cdeb53b481d0762636964a71141db24fee8c1a19309c21e5314e16a283e59f1a9e3fc8b5491e36a17f03e29beb4eb96a2dde20e594bae8e6193dcb75d6089137fcc2f85ac71fdde8d7", 0xb8}, {&(0x7f0000001740)="6790d03f011c8c0bb1cc17d36470b1e8d9cac2677e48a29d63139e45438bfb93ea938c83dee47e453c1f860851ca6403d835b0872622c92cf166ef2097e21c41c5262a99a145db215c7a4cdea325fcb4878864f57c6dae7614d8476075d74f21fa31602171e6043863e688104d83fc90983dead3857f1403e1898da04618df3253c30c9e02726d34a587859f6c0fb31a9774bf8466b6bf2a9552752ebe27cd2b51ca5da54aff8f130989d821", 0xac}, {0x0}], 0x9}, 0x914) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80)={0x0}, &(0x7f0000001cc0)=0xc) sched_setscheduler(r23, 0x1, &(0x7f0000001d00)=0x3f) dup(r1) 04:43:37 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:37 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) [ 269.009031][T10143] IPVS: ftp: loaded support on port[0] = 21 [ 269.129457][T10158] QAT: failed to copy from user cfg_data. 04:43:38 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) [ 269.190500][T10161] QAT: failed to copy from user cfg_data. 04:43:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:38 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a00100000c}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 04:43:38 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) [ 269.505239][T10175] QAT: failed to copy from user cfg_data. 04:43:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:38 executing program 0: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000300)=@dstopts, 0x8) sendfile(r0, r1, 0x0, 0x88001) [ 269.651953][T10181] QAT: failed to copy from user cfg_data. [ 269.700163][T10178] IPVS: ftp: loaded support on port[0] = 21 04:43:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000480)={0x1, 0x0, [{}]}) 04:43:41 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000380)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb9) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KDSKBMETA(r1, 0x4b63, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) 04:43:41 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:41 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 04:43:41 executing program 4: write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) open(0x0, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 04:43:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 272.268308][T10208] QAT: failed to copy from user cfg_data. 04:43:41 executing program 4: r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f00000000c0)={0x1749f992e95b09cd, 0x0, [], @p_u8=0x0}}) 04:43:41 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:41 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000480)) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000140)) [ 272.511602][T10226] QAT: failed to copy from user cfg_data. 04:43:41 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net////\x00', 0x0, 0x0) close(r1) 04:43:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xa, 0xa, 0x100000000000913, 0x1}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x2, [0x0, 0x0, 0x8000000000000000]}, 0x2c) 04:43:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$negate(0xd, 0x0, 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000e40)=0xe8) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000940)={{}, {0x1, 0x1}, [{}]}, 0x2c, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) r2 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) r4 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000340)={{}, {}, [{0x2, 0x2, r1}, {0x2, 0x4, r3}, {0x2, 0x0, r5}, {0x2, 0x6, r1}, {0x2, 0x51baf43fdb59d945}], {0x4, 0x4}, [{}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x5c, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x4) keyctl$join(0x1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000000)='uxer}eth\x1c\x83v\x15\xbd1\x8e$0\x9f\x01\xc1\x03\xf21\x00', 0x0) 04:43:41 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:41 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@ipv4={[0x0, 0x0, 0x8f30000000000000], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 04:43:41 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 04:43:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880)={0xa, 0x0, 0x2}, 0x715000) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) [ 273.088985][T10257] QAT: failed to copy from user cfg_data. 04:43:42 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x408c4) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000282, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r1 = gettid() futex(&(0x7f0000000640), 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x2, 0x2) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000100)={'#! ', './file0'}, 0xb) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') write$P9_RATTACH(r2, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0x40}}, 0x14) close(r2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r4 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mknodat(r4, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) linkat(r4, &(0x7f00000001c0)='./file0\x00', r4, &(0x7f0000000200)='./file2\x00', 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000740)=""/4096, 0x1000, 0x0, &(0x7f0000001740)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$trusted_overlay_upper(r3, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fbca02e1a50c40cfb0f5c7904d73fb6d5b68208ded97454881e3f36df56d6c809273b679a4887ce116b500199deafb96378f04eaa51574a58225e1e252b4e0b697c1e997b23bb31832f23b84cf1c13199c391e16aa28f386e96210824bf72846e7e90ab41501564df319cdbab4bc3732cc757d9f5f305a6ef178d231dc88a437ca746222d6113cbd2d79db0aaa6e75ff67c3fed5312c7323fc08e80d0bc9c7a4a43776b6428fd7a16963a9efeec1fad63168e6ee8b97ef7e1ea45cc86af8a3abecc498d70f24112ce4cfce034f8e3b0bd96a201e6840dc"], 0xca, 0x3) prctl$PR_SET_TSC(0x1a, 0x2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) [ 273.236316][T10274] QAT: failed to copy from user cfg_data. 04:43:42 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) 04:43:42 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in, @in6=@ipv4={[0x0, 0x0, 0x8f30000000000000], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 04:43:42 executing program 3: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0xfffffffffffff001) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x14) ptrace$cont(0x18, r0, 0x0, 0x0) 04:43:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 273.499181][T10294] QAT: failed to copy from user cfg_data. 04:43:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00009f1000)='G', 0x38d, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) socket(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x103}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025e0046bbc04fef7001c02", 0x11) writev(0xffffffffffffffff, 0x0, 0x0) shutdown(r0, 0x1) 04:43:42 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:42 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) [ 273.697520][T10298] ptrace attach of "/root/syz-executor.1"[10287] was attempted by "/root/syz-executor.1"[10298] [ 273.732799][T10311] QAT: failed to copy from user cfg_data. 04:43:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:42 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0xff}, 0x0) openat$usbmon(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/usbmon0\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x18) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000240)) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 273.906536][T10319] QAT: failed to copy from user cfg_data. 04:43:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x408c4) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000282, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r1 = gettid() futex(&(0x7f0000000640), 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x2, 0x2) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000100)={'#! ', './file0'}, 0xb) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') write$P9_RATTACH(r2, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0x40}}, 0x14) close(r2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r4 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mknodat(r4, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) linkat(r4, &(0x7f00000001c0)='./file0\x00', r4, &(0x7f0000000200)='./file2\x00', 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000740)=""/4096, 0x1000, 0x0, &(0x7f0000001740)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$trusted_overlay_upper(r3, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fbca02e1a50c40cfb0f5c7904d73fb6d5b68208ded97454881e3f36df56d6c809273b679a4887ce116b500199deafb96378f04eaa51574a58225e1e252b4e0b697c1e997b23bb31832f23b84cf1c13199c391e16aa28f386e96210824bf72846e7e90ab41501564df319cdbab4bc3732cc757d9f5f305a6ef178d231dc88a437ca746222d6113cbd2d79db0aaa6e75ff67c3fed5312c7323fc08e80d0bc9c7a4a43776b6428fd7a16963a9efeec1fad63168e6ee8b97ef7e1ea45cc86af8a3abecc498d70f24112ce4cfce034f8e3b0bd96a201e6840dc"], 0xca, 0x3) prctl$PR_SET_TSC(0x1a, 0x2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 04:43:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:42 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:43:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000000000000000000007797dcfae358e001", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0000000001000000000000000080000020269a5cdc291e96e7167dd549815de91787d15a77da5302fd46b9f55c044ab05dc005efe703f176"], 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f0000001500)=ANY=[@ANYBLOB="050000000100"/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="3f420f000100000000000054f2"], 0x48}}, 0x0) [ 274.136787][T10336] QAT: failed to copy from user cfg_data. 04:43:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f00000003c0)) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 04:43:43 executing program 2: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40096100, 0x0) 04:43:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_FWMARK={0x8}]]}}}]}, 0x38}}, 0x0) 04:43:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 274.504940][T10351] ptrace attach of "/root/syz-executor.1"[10343] was attempted by "/root/syz-executor.1"[10351] 04:43:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:43 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:43 executing program 2: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40096100, 0x0) [ 274.757936][ T26] audit: type=1804 audit(1569645823.601:42): pid=10369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/34/bus" dev="sda1" ino=16755 res=1 04:43:43 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x4}], 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040)={0x3, 0x0, 0x7, 0xffff7c73, 0xff}, 0x14) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x3a8, 0x7a) 04:43:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x408c4) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000282, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="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") r1 = gettid() futex(&(0x7f0000000640), 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x2, 0x2) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000100)={'#! ', './file0'}, 0xb) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') write$P9_RATTACH(r2, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0x40}}, 0x14) close(r2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r4 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mknodat(r4, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) linkat(r4, &(0x7f00000001c0)='./file0\x00', r4, &(0x7f0000000200)='./file2\x00', 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000740)=""/4096, 0x1000, 0x0, &(0x7f0000001740)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$trusted_overlay_upper(r3, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fbca02e1a50c40cfb0f5c7904d73fb6d5b68208ded97454881e3f36df56d6c809273b679a4887ce116b500199deafb96378f04eaa51574a58225e1e252b4e0b697c1e997b23bb31832f23b84cf1c13199c391e16aa28f386e96210824bf72846e7e90ab41501564df319cdbab4bc3732cc757d9f5f305a6ef178d231dc88a437ca746222d6113cbd2d79db0aaa6e75ff67c3fed5312c7323fc08e80d0bc9c7a4a43776b6428fd7a16963a9efeec1fad63168e6ee8b97ef7e1ea45cc86af8a3abecc498d70f24112ce4cfce034f8e3b0bd96a201e6840dc"], 0xca, 0x3) prctl$PR_SET_TSC(0x1a, 0x2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 04:43:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:43 executing program 2: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40096100, 0x0) [ 274.946607][ T26] audit: type=1804 audit(1569645823.781:43): pid=10369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/34/bus" dev="sda1" ino=16755 res=1 04:43:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a48b12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb15322e2df00000000000000960f53691a655eb6999d32772cf2eebb1f6c9ad54ac45a333c28785d6382fa7776ea267d32109a5633657b52873b9924f15a5b587e", 0x5c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 275.040705][ T26] audit: type=1804 audit(1569645823.851:44): pid=10372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/34/bus" dev="sda1" ino=16755 res=1 [ 275.259747][T10394] ptrace attach of "/root/syz-executor.1"[10387] was attempted by "/root/syz-executor.1"[10394] 04:43:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x8500000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) shutdown(r1, 0x1) 04:43:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:44 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800a1695e1dcfe87b1071") r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f0000000180)="6a08da0b", 0x4) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r1, &(0x7f00000003c0)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e225e412a93ffde44006284418dcd9bc1875e6f8c0810e8824591f3064f53560d549cc59f64f7771c5e006e116015eee9913669ccaabee5f0ce3dc19bad70307", 0x100b1, 0x0, 0x0, 0xfffffffffffffed2) 04:43:44 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r0, 0x0, 0x4000810) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) setuid(0x0) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', 0x0, 0x7f, 0x1, &(0x7f0000000580)=[{0x0}], 0x1400, 0x0) r3 = getpgrp(0x0) setpriority(0x0, r3, 0xffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 04:43:44 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f00000013c0)='/proc/self\x00', 0x141840, 0x0) [ 275.468422][ T26] audit: type=1804 audit(1569645824.311:45): pid=10408 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/35/bus" dev="sda1" ino=16751 res=1 04:43:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:44 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000080)="1f0000000102ff05fd4354c007f37ffff20501000800010004000100ffdf00", 0x160) 04:43:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$negate(0xd, 0x0, 0x2, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in6=@empty, @in=@remote}}, {{@in=@local}}}, &(0x7f0000000e40)=0xe8) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000940)={{}, {0x1, 0x1}, [{}]}, 0x2c, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) r1 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x5) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x4) keyctl$join(0x1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000000)='uxer}eth\x1c\x83v\x15\xbd1\x8e$0\x9f\x01\xc1\x03\xf21\x00', 0x0) 04:43:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x2, 0x300) bind$packet(r3, &(0x7f0000000080)={0x11, 0x5, 0x0, 0x1, 0x0, 0x6, @random="a1e000e33a02"}, 0x14) 04:43:44 executing program 2: mlock(&(0x7f0000ff8000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) [ 275.697854][T10424] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 04:43:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x408c4) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400000000000282, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.events\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000340)="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") r2 = gettid() futex(&(0x7f0000000640), 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0)=0x2, 0x2) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0'}, 0xb) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') write$P9_RATTACH(r3, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0x40}}, 0x14) close(r3) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r5 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) linkat(r5, &(0x7f00000001c0)='./file0\x00', r5, &(0x7f0000000200)='./file2\x00', 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000740)=""/4096, 0x1000, 0x0, &(0x7f0000001740)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FIDEDUPERANGE(r4, 0xc0189436, 0x0) fsetxattr$trusted_overlay_upper(r4, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[@ANYBLOB="00fbca02e1a50c40cfb0f5c7904d73fb6d5b68208ded97454881e3f36df56d6c809273b679a4887ce116b500199deafb96378f04eaa51574a58225e1e252b4e0b697c1e997b23bb31832f23b84cf1c13199c391e16aa28f386e96210824bf72846e7e90ab41501564df319cdbab4bc3732cc757d9f5f305a6ef178d231dc88a437ca746222d6113cbd2d79db0aaa6e75ff67c3fed5312c7323fc08e80d0bc9c7a4a43776b6428fd7a16963a9efeec1fad63168e6ee8b97ef7e1ea45cc86af8a3abecc498d70f24112ce4cfce034f8e3b0bd96a201e6840dc"], 0xca, 0x3) prctl$PR_SET_TSC(0x1a, 0x2) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 04:43:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:44 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:44 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) 04:43:44 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 04:43:44 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) close(0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init() geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000300)) fchdir(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getresuid(0x0, &(0x7f00000004c0), &(0x7f0000000500)) lstat(0x0, &(0x7f0000000640)) lstat(&(0x7f0000000040)='./file0\x00', 0x0) getgid() openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xffffffffffffffff) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 276.034371][T10455] ptrace attach of "/root/syz-executor.1"[10445] was attempted by "/root/syz-executor.1"[10455] 04:43:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 276.077891][ T26] audit: type=1804 audit(1569645824.921:46): pid=10453 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/36/bus" dev="sda1" ino=16754 res=1 04:43:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001140)="8b", 0x1}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0x7ffff000}], 0x1, 0x0, 0x13b}}], 0x1, 0x0, 0x0) 04:43:45 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f0000000080)=0x1, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffe5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa4756f}, 0x100) 04:43:45 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000480)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000140)) 04:43:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:43:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000380)=ANY=[@ANYBLOB="2c00000002030501ff0080ffbdffff2e0a0000000c000100010000007d0a00010c000200fe42ac0000220004"], 0x2c}}, 0x0) 04:43:45 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:45 executing program 2: r0 = memfd_create(&(0x7f0000000400)='\x00\x00\x00\x00\x00\t\x00\x00\x00\x8as\xaa\xfe\xfa\x1bf\a^\"9\xdd\x8bTi\xe8\xc9\xfe8\xcf)\xff1\xdf5\xa80B\xb0\xda\x83\xf8\x10M\xab\xe1\x9c}i\xc2\xda\xdb\xf0\x97\xaf,}i{t\x904;_\x91_\xfd\x90\"\xff/`\x19q\xf4c5JC\xb0\xe2\x8c\x8a\xd3\xe3C\x02\x12\xf7+\x18\xb7\n\xa3K+\x98u#L\x92\xa0Hj\v\xaa(h\xe4\"\xeb\xc5Kv\xca4\xd1S\xe3\xe2\xa8\xafk\xfb\x11\x8f \xca\xb4\x88\",F/w\xd7\xffC\a.\x00\xe5\xa0MJ%\x15\xf2\xe5\xad\xe1\xa0[PB\xdb\xcc\xa5\x00\x00\x00\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x12, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='maps\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) clone(0x4000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_aout(r1, 0x0, 0x0) socket(0xa, 0x1, 0x1) syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') 04:43:45 executing program 1: write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001a005f0214f9f40700090401800000000000000200000000", 0x1c) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) dup(0xffffffffffffffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x10001) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000002440)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x0) creat(&(0x7f0000002440)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfb3f) 04:43:45 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r0 = open(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000100)="7d9cd82505e0306bfad98a07a40b5dd1f4ff8029e29ff7689157cd4e4aef31fa74285c79afc932955e2942131492295176697e30183eb3eaf250bca8190d54abd0f3343cf85232aae3177357c348ce", 0x0}, 0x20) [ 276.789432][ T26] audit: type=1804 audit(1569645825.631:47): pid=10498 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/37/bus" dev="sda1" ino=16777 res=1 04:43:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a48b12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb15322e2df00000000000000960f53691a655eb6999d", 0x31}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:43:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:46 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:46 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) renameat2(r2, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x1) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000300)=0x30) 04:43:46 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x400000036) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xd, 0x0, 0x1f}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:43:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:46 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r0 = open(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000100)="7d9cd82505e0306bfad98a07a40b5dd1f4ff8029e29ff7689157cd4e4aef31fa74285c79afc932955e2942131492295176697e30183eb3eaf250bca8190d54abd0f3343cf85232aae3177357c348ce", 0x0}, 0x20) [ 277.372100][ T26] audit: type=1804 audit(1569645826.211:48): pid=10545 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/38/bus" dev="sda1" ino=16790 res=1 04:43:46 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r0 = open(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000100)="7d9cd82505e0306bfad98a07a40b5dd1f4ff8029e29ff7689157cd4e4aef31fa74285c79afc932955e2942131492295176697e30183eb3eaf250bca8190d54abd0f3343cf85232aae3177357c348ce", 0x0}, 0x20) 04:43:46 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:43:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:43:46 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:46 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r0 = open(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000100)="7d9cd82505e0306bfad98a07a40b5dd1f4ff8029e29ff7689157cd4e4aef31fa74285c79afc932955e2942131492295176697e30183eb3eaf250bca8190d54abd0f3343cf85232aae3177357c348ce", 0x0}, 0x20) [ 277.769436][T10566] IPVS: ftp: loaded support on port[0] = 21 [ 277.792513][ T26] audit: type=1804 audit(1569645826.631:49): pid=10564 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/39/bus" dev="sda1" ino=16790 res=1 [ 278.031282][T10576] IPVS: ftp: loaded support on port[0] = 21 04:43:48 executing program 3: ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, r1) keyctl$get_persistent(0x16, 0x0, 0x0) pipe(0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0) 04:43:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, 0x0, 0x1) 04:43:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) socket$inet6(0xa, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) r0 = open(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000100)="7d9cd82505e0306bfad98a07a40b5dd1f4ff8029e29ff7689157cd4e4aef31fa74285c79afc932955e2942131492295176697e30183eb3eaf250bca8190d54abd0f3343cf85232aae3177357c348ce", 0x0}, 0x20) 04:43:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x6) setreuid(0x0, r2) shmget$private(0x0, 0x1000, 0x1f91, &(0x7f0000ffc000/0x1000)=nil) 04:43:48 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:48 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:43:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, 0x0, 0x0) 04:43:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x806) ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) [ 280.004268][ T26] audit: type=1804 audit(1569645828.841:50): pid=10589 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/40/bus" dev="sda1" ino=16806 res=1 [ 280.043610][T10590] IPVS: ftp: loaded support on port[0] = 21 04:43:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) iopl(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') socket$inet6_tcp(0xa, 0x1, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:43:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, 0x0, 0x1) 04:43:49 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, 0x0, 0x1) [ 280.372043][ T26] audit: type=1804 audit(1569645829.211:51): pid=10613 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/41/bus" dev="sda1" ino=16819 res=1 04:43:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x68042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x1, 0x0, 0x10000e0}, 0x6e) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0xffffffff, @dev={0xfe, 0x80, [], 0x19}, 0x9b1}, 0x1c) clock_settime(0x1, &(0x7f0000000240)) 04:43:49 executing program 2: mknod(&(0x7f0000000280)='./file0\x00', 0x1042, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) open$dir(&(0x7f0000001700)='./file0\x00', 0x101001, 0x0) 04:43:49 executing program 3: prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) socket$kcm(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 04:43:49 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:49 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) 04:43:49 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000240)="a6", 0x1}], 0x1, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x28}}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 04:43:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x1) [ 280.788291][ T26] audit: type=1804 audit(1569645829.631:52): pid=10633 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/42/bus" dev="sda1" ino=16797 res=1 04:43:49 executing program 1: 04:43:49 executing program 4: 04:43:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:43:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x1) 04:43:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x0, 0x4012, r1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) sendto(r0, &(0x7f0000001140)="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", 0xfffffffffffffdf0, 0x0, 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f00001ee000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) 04:43:50 executing program 4: clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() creat(&(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',defcontext=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) [ 281.240432][T10654] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 283.574627][T10669] IPVS: ftp: loaded support on port[0] = 21 [ 283.646767][T10669] chnl_net:caif_netlink_parms(): no params data found [ 283.675542][T10669] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.683832][T10669] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.691769][T10669] device bridge_slave_0 entered promiscuous mode [ 283.700277][T10669] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.707811][T10669] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.715672][T10669] device bridge_slave_1 entered promiscuous mode [ 283.740363][T10669] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 283.751253][T10669] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 283.912012][T10669] team0: Port device team_slave_0 added [ 283.920005][T10669] team0: Port device team_slave_1 added [ 283.978131][T10669] device hsr_slave_0 entered promiscuous mode [ 284.026701][T10669] device hsr_slave_1 entered promiscuous mode [ 284.066253][T10669] debugfs: Directory 'hsr0' with parent '/' already present! [ 284.174427][T10669] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.181598][T10669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.189049][T10669] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.196369][T10669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.295480][T10673] IPVS: ftp: loaded support on port[0] = 21 [ 284.561170][T10673] chnl_net:caif_netlink_parms(): no params data found [ 284.577273][T10669] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.683528][T10673] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.695108][T10673] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.705617][T10673] device bridge_slave_0 entered promiscuous mode [ 284.715010][T10667] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.723311][T10667] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.732566][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 284.742761][T10673] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.750176][T10673] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.761539][T10673] device bridge_slave_1 entered promiscuous mode [ 284.782410][T10673] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 284.871118][T10669] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.879318][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.887354][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.897501][T10673] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 284.919809][T10673] team0: Port device team_slave_0 added [ 285.000337][ T8924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.013447][ T8924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.022100][ T8924] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.029306][ T8924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.038763][T10673] team0: Port device team_slave_1 added [ 285.063277][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.073026][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.081761][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.089155][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.098402][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 285.107336][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 285.115868][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 285.124527][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 285.168038][T10673] device hsr_slave_0 entered promiscuous mode [ 285.216637][T10673] device hsr_slave_1 entered promiscuous mode [ 285.256221][T10673] debugfs: Directory 'hsr0' with parent '/' already present! [ 285.344938][T10669] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 285.356264][T10669] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 285.369114][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 285.377962][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.386996][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 285.395402][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.405532][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.414578][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.423096][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.432630][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 285.444399][T10529] device bridge_slave_1 left promiscuous mode [ 285.451813][T10529] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.507370][T10529] device bridge_slave_0 left promiscuous mode [ 285.513625][T10529] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.716845][T10529] device hsr_slave_0 left promiscuous mode [ 287.766366][T10529] device hsr_slave_1 left promiscuous mode [ 287.828641][T10529] team0 (unregistering): Port device team_slave_1 removed [ 287.842906][T10529] team0 (unregistering): Port device team_slave_0 removed [ 287.854832][T10529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 287.881672][T10529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 287.974878][T10529] bond0 (unregistering): Released all slaves [ 288.103345][T10669] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 288.182086][T10673] 8021q: adding VLAN 0 to HW filter on device bond0 [ 288.194493][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.204148][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.215869][T10673] 8021q: adding VLAN 0 to HW filter on device team0 [ 288.249171][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.258586][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.283081][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.290502][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.386997][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 288.395113][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.403891][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.412547][T10667] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.419672][T10667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.428769][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 288.438245][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 288.447310][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 288.456305][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 288.496903][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 288.505067][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 288.514443][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 288.523807][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 288.533377][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.543292][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 288.552035][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.561878][T10673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 288.590265][T10673] 8021q: adding VLAN 0 to HW filter on device batadv0 04:43:58 executing program 2: 04:43:58 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x1) 04:43:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) 04:43:58 executing program 1: 04:43:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) [ 289.220044][ T26] audit: type=1804 audit(1569645838.061:53): pid=10697 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/43/bus" dev="sda1" ino=16828 res=1 04:43:58 executing program 1: 04:43:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)}, 0x1) 04:43:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:43:58 executing program 2: 04:43:58 executing program 1: 04:43:58 executing program 2: 04:43:58 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:58 executing program 4: 04:43:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)}, 0x1) 04:43:58 executing program 1: 04:43:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:43:59 executing program 2: [ 290.143321][ T26] audit: type=1804 audit(1569645838.981:54): pid=10732 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/44/bus" dev="sda1" ino=16840 res=1 04:43:59 executing program 4: 04:43:59 executing program 1: 04:43:59 executing program 4: 04:43:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a48b12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb15322e2df00000000000000960f53691a655eb6999d32772cf2eebb1f6c9ad54ac45a333c28785d6382fa7776ea267d32109a5633657b52873b9924f15a5b58", 0x5b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 04:43:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)}, 0x1) 04:43:59 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:43:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:43:59 executing program 1: 04:43:59 executing program 4: 04:43:59 executing program 1: 04:43:59 executing program 4: [ 290.797437][ T26] audit: type=1804 audit(1569645839.641:55): pid=10773 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/45/bus" dev="sda1" ino=16842 res=1 04:43:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1}, 0x1) 04:43:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:43:59 executing program 1: 04:43:59 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 291.309992][ T26] audit: type=1804 audit(1569645840.151:56): pid=10794 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/46/bus" dev="sda1" ino=16828 res=1 [ 293.357390][T10529] device bridge_slave_1 left promiscuous mode [ 293.363635][T10529] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.407032][T10529] device bridge_slave_0 left promiscuous mode [ 293.413382][T10529] bridge0: port 1(bridge_slave_0) entered disabled state 04:44:02 executing program 2: 04:44:02 executing program 4: 04:44:02 executing program 1: 04:44:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1}, 0x1) 04:44:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:02 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:44:02 executing program 4: 04:44:02 executing program 1: 04:44:02 executing program 2: 04:44:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{0x0}], 0x1}, 0x1) 04:44:02 executing program 1: 04:44:02 executing program 4: 04:44:02 executing program 2: 04:44:02 executing program 4: 04:44:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)}], 0x1}, 0x1) 04:44:03 executing program 1: [ 296.216763][T10529] device hsr_slave_0 left promiscuous mode [ 296.256190][T10529] device hsr_slave_1 left promiscuous mode [ 296.304947][T10529] team0 (unregistering): Port device team_slave_1 removed [ 296.319109][T10529] team0 (unregistering): Port device team_slave_0 removed [ 296.332945][T10529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 296.423200][T10529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 296.639788][T10529] bond0 (unregistering): Released all slaves 04:44:05 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:44:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:05 executing program 2: 04:44:05 executing program 4: 04:44:05 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x6}}, 0xe) 04:44:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)}], 0x1}, 0x1) 04:44:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setreuid(0x0, 0x0) mount$9p_tcp(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f0000000400)='./bus\x00', &(0x7f0000000440)='9p\x00', 0x0, &(0x7f0000000540)={'trans=tcp,', {'port'}, 0x2c, {[{@version_L='version=9p2000.L'}]}}) 04:44:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xf) 04:44:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)}], 0x1}, 0x1) 04:44:06 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x0, 0x2, 0x0, 0x0, 0x6}}, 0xe) [ 297.232344][T10860] 9pnet: p9_fd_create_tcp (10860): problem connecting socket to 127.0.0.1 04:44:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000040)) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='veth1_to_hsr\x00', 0x10) exit(0x1) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) r6 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r7, 0x0) [ 297.343082][T10870] 9pnet: p9_fd_create_tcp (10870): problem connecting socket to 127.0.0.1 04:44:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x0) 04:44:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:06 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:44:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) 04:44:06 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) fcntl$setstatus(r0, 0x4, 0x6000) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 297.661761][ T26] audit: type=1804 audit(1569645846.501:57): pid=10883 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir708178258/syzkaller.tvLjtl/73/bus" dev="sda1" ino=16878 res=1 04:44:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) [ 297.775173][T10888] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 297.796303][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 297.802157][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:44:06 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:07 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:07 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:07 executing program 2 (fault-call:4 fault-nth:0): r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) [ 298.787000][T10917] FAULT_INJECTION: forcing a failure. [ 298.787000][T10917] name failslab, interval 1, probability 0, space 0, times 1 [ 298.806754][T10917] CPU: 1 PID: 10917 Comm: syz-executor.2 Not tainted 5.3.0-next-20190926 #0 [ 298.815481][T10917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.825547][T10917] Call Trace: [ 298.828862][T10917] dump_stack+0x172/0x1f0 [ 298.833213][T10917] should_fail.cold+0xa/0x15 [ 298.837829][T10917] ? fault_create_debugfs_attr+0x180/0x180 [ 298.843784][T10917] ? ___might_sleep+0x163/0x2c0 [ 298.848696][T10917] __should_failslab+0x121/0x190 [ 298.853651][T10917] should_failslab+0x9/0x14 [ 298.858165][T10917] __kmalloc+0x2e0/0x770 [ 298.862416][T10917] ? mark_held_locks+0xf0/0xf0 [ 298.867190][T10917] ? mark_lock+0xc2/0x1220 [ 298.871619][T10917] ? _parse_integer+0x190/0x190 [ 298.876481][T10917] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 298.882223][T10917] tomoyo_realpath_from_path+0xcd/0x7b0 [ 298.887790][T10917] ? tomoyo_path_number_perm+0x193/0x520 [ 298.893444][T10917] tomoyo_path_number_perm+0x1dd/0x520 [ 298.898930][T10917] ? tomoyo_path_number_perm+0x193/0x520 [ 298.904585][T10917] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 298.910403][T10917] ? __f_unlock_pos+0x19/0x20 [ 298.915221][T10917] ? __fget+0x384/0x560 [ 298.919482][T10917] ? ksys_dup3+0x3e0/0x3e0 [ 298.923924][T10917] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 298.930182][T10917] ? fput_many+0x12c/0x1a0 [ 298.934650][T10917] tomoyo_file_ioctl+0x23/0x30 [ 298.939521][T10917] security_file_ioctl+0x77/0xc0 [ 298.944480][T10917] ksys_ioctl+0x57/0xd0 [ 298.948662][T10917] __x64_sys_ioctl+0x73/0xb0 [ 298.953272][T10917] do_syscall_64+0xfa/0x760 [ 298.957796][T10917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.963696][T10917] RIP: 0033:0x459a29 [ 298.967771][T10917] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.987571][T10917] RSP: 002b:00007f2f4a380c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 298.995995][T10917] RAX: ffffffffffffffda RBX: 00007f2f4a380c90 RCX: 0000000000459a29 [ 299.003980][T10917] RDX: 0000000000000000 RSI: 0000000040096100 RDI: 0000000000000003 [ 299.011968][T10917] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 299.020040][T10917] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f4a3816d4 [ 299.028030][T10917] R13: 00000000004cd6d0 R14: 00000000004d6d68 R15: 0000000000000007 [ 299.052325][T10917] ERROR: Out of memory at tomoyo_realpath_from_path. [ 299.061240][T10917] QAT: failed to copy from user cfg_data. [ 300.513461][T10921] IPVS: ftp: loaded support on port[0] = 21 [ 300.649841][T10921] chnl_net:caif_netlink_parms(): no params data found [ 300.744847][T10921] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.752394][T10921] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.761942][T10921] device bridge_slave_0 entered promiscuous mode [ 300.838655][T10921] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.845922][T10921] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.854483][T10921] device bridge_slave_1 entered promiscuous mode [ 300.872367][T10921] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.883796][T10921] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.979156][T10921] team0: Port device team_slave_0 added [ 300.985895][T10921] team0: Port device team_slave_1 added [ 301.048172][T10921] device hsr_slave_0 entered promiscuous mode [ 301.096620][T10921] device hsr_slave_1 entered promiscuous mode [ 301.136308][T10921] debugfs: Directory 'hsr0' with parent '/' already present! [ 301.220228][T10921] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.227825][T10921] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.235311][T10921] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.242462][T10921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.352672][T10921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.364457][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.375315][T10667] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.384349][T10667] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.392798][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 301.407075][T10921] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.486367][T10667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.494915][T10667] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.502169][T10667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.517377][ T3570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.525757][ T3570] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.532867][ T3570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.622807][T10670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.631714][T10670] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 301.653466][T10921] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 301.664438][T10921] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 301.677612][T10670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 301.687147][T10670] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.695615][T10670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 301.704443][T10670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.713067][T10670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.722520][T10670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.731323][T10670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.740210][T10529] device bridge_slave_1 left promiscuous mode [ 301.747540][T10529] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.787443][T10529] device bridge_slave_0 left promiscuous mode [ 301.793875][T10529] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.736831][T10529] device hsr_slave_0 left promiscuous mode [ 303.776314][T10529] device hsr_slave_1 left promiscuous mode [ 303.854777][T10529] team0 (unregistering): Port device team_slave_1 removed [ 303.868819][T10529] team0 (unregistering): Port device team_slave_0 removed [ 303.880958][T10529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 303.921005][T10529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 304.005910][T10529] bond0 (unregistering): Released all slaves [ 304.143696][T10921] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 304.251788][T10929] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 304.394452][ T26] audit: type=1804 audit(1569645853.231:58): pid=10938 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/50/bus" dev="sda1" ino=16912 res=1 [ 304.431901][T10941] FAULT_INJECTION: forcing a failure. [ 304.431901][T10941] name failslab, interval 1, probability 0, space 0, times 0 04:44:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x0) 04:44:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:13 executing program 4: mlockall(0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000001a40)="1468c24cb24c266187218be7e377bfa4332dc4ec5bb3593b90ce44c77187041b6fb28aee5425687df92713a759bf270e33a15c7eb803b55afccdc1fac332d16726d2f0a15702a1e6345b2cdfd43d65a2f930284edc2b56e6400598b1f13b2bf90671eb58f12bce8c063c630058419804d491ea5800", 0x75, 0x2004, &(0x7f0000001b40)={0x9, @remote={[], 0x2}}, 0x12) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000001e40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f00007a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f00004f4000/0x4000)=nil) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x7) setreuid(0x0, r4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x81, 0x0) r10 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r15, 0x0, r14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = fcntl$dupfd(r17, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000080)="c717aab4f9b23fbc4a1b544848bab83cb559ef8990a05ef4a6ea34e45f9aa4cfc0dbeb76ae00ab0cfdbe802a33574fb5c0491920bb2092cde7deefcd43a51ee76985a75bfd7104d8a9c30c6bc14f1f1cbaa16840ca1f0a386d12a57a2fa37e24d3a5be9f312a64cdb324b43e40b06a694b18d465d41b9e03b14624c3466ca8e73fbbd86d1e40a09b040134b209fb4ea714324d2111524d1e264cf5545a3b25aa0b2c0f81bfc0548dbdc8acfd0a73d87dd736c68fbcb6c5901d5741529ed1806dd6f769190159a9c742efdbb040237be83f20c9d97da7767b27", 0xd9}, {&(0x7f0000000180)="ff8cb53323ea899d49772d012343161afba6079d9eb710166292ef54f58564ec0ca4295a540b4a9c69fd7ae70614ee0a9f6dd7372d6dc3e0cc22b88d80e22f9509c680a7e58040202823d3e0", 0x4c}], 0x2, &(0x7f00000005c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r4, r5}}}, @rights={{0x24, 0x1, 0x1, [r8, 0xffffffffffffffff, r9, r10, r0]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r13, r0, r15, r18]}}], 0x70, 0x884}, 0xfb566f18a59504fe) setxattr$trusted_overlay_origin(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)='trusted.overlay.origin\x00', &(0x7f0000001c00)='y\x00', 0x2, 0x1) connect$inet6(r1, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r19 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r20 = socket$inet6_sctp(0xa, 0x1, 0x84) connect$inet6(r20, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r21 = dup(r20) write$eventfd(r21, &(0x7f0000604000), 0x2e8) r22 = accept$packet(r21, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) sendmsg(r19, &(0x7f00000019c0)={&(0x7f0000001dc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r22, 0x3, 0x4, 0x1, 0x2, {0xa, 0x4e23, 0x6, @mcast1, 0x6}}}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000700)="e1138a3a52a48f060766b60d650c0b50d60172d6af663745226f282d43d34772fbdecf0e049e4367a6724c91437582da5f1c7d5a3ca2e0f05db64d634245a5ad7cc64906edf84e687a9d59ab39b7d569c704e6e86bf1dcd73c9d1319f31a047fc564acedc0cde9ba232a742a20eab070b082b264e4effb24527a3ad5c194acc5baee5e2759240fa31222e9de084e9f89186eaa6381e9d1f67124e026ab2ef1d8c42e203dbb90dc04f0a5a5493012d8e154b2532f9809c91e14e248a71251feed2c225bf1a4ba914be9a661dfc59f512a5f40faeb9118e0f98a4144c0ea05e266b7b73174ea60f7a14f1c12ec2d323735f0277125f9f13b83e7cabe2785de6232c953a25aa4bb548fe9b2eb83ea10435a8785beb1f323b6f4b9629c735d3429ac2054df4ad6679b6ec855082e3bc0f05ccf9e54747d317c82d2eec56082274d020271cb6de1474a16c5deda3426cd8e69571d0eace9de6928323cb6d6a27256ed053b", 0x57}, {&(0x7f0000000480)="16fcfbac89c2b8fcd12f8ef6747f63cd78ad", 0x12}, {&(0x7f00000004c0)="8f7abb3ce3db8ba75a780e6df9fc493e46120f704671a3dd03c4284aa63dbf9acb4b74a58af82c662e34fcdf449ecf4435919e3cf2dc37238a37b11d9bf08659fcc28d26b2e3de57", 0x48}, {&(0x7f0000000540)="50f5f9bf7da956c6ac81dd773a89815a8a1c9ba330e584b29ccb076a5663c06a8f550319754dfa40cb6e100a82bf26644ae4b392e21c62a866265e38752f01bcdb4f2fc440a253d3e398c1cd9b782144ef1fc937e49a9b043494c46f7edac3f354e19dd0e2c179c715831fce4ed5fc", 0x6f}, {&(0x7f00000005c0)}, {&(0x7f00000015c0)="7d279fb1e68d6b06d7d2daa2153041c772c106016f83b0e90b2b95dad80273deeb05ed9425f7cc9b2f8d532e9fe37cc2dd1ce3486df56cdfc9512d9ecceacdc1a183a95804bd096bc5e33676a85697834c3e80bf7f4c5ead949ee2d6f7820e6843ba0c6c1d4524bd40281c9fbc", 0x6d}, {&(0x7f0000001680)="c35ca89e9a57093e2b7c68011976a6295fd0702376e4cb4c46a98a23131d17efe79d447f58669b67595d47a47b9139292085a02ac6d03c33eb97d11dc299ea37b63e5de2d02844a3ba08d42b23961fbee55ecba6c18bb4bb9d1573a3f5f974ad530a6297f34bcf2cee44f28a057439cdeb53b481d0762636964a71141db24fee8c1a19309c21e5314e16a283e59f1a9e3fc8b5491e36a17f03e29beb4eb96a2dde20e594bae8e6193dcb75d6089137fcc2f85ac71fdde8d7", 0xb8}, {&(0x7f0000001740)="6790d03f011c8c0bb1cc17d36470b1e8d9cac2677e48a29d63139e45438bfb93ea938c83dee47e453c1f860851ca6403d835b0872622c92cf166ef2097e21c41c5262a99a145db215c7a4cdea325fcb4878864f57c6dae7614d8476075d74f21fa31602171e6043863e688104d83fc90983dead3857f1403e1898da04618df3253c30c9e02726d34a587859f6c0fb31a9774bf8466b6bf2a9552752ebe27cd2b51ca5da54aff8f130989d821", 0xac}, {0x0}], 0x9}, 0x914) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80)={0x0}, &(0x7f0000001cc0)=0xc) sched_setscheduler(r23, 0x1, &(0x7f0000001d00)=0x3f) dup(r1) 04:44:13 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 04:44:13 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x20) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000001c0)=0x5, 0x7) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) socket$packet(0x11, 0x3, 0x300) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000200)=0x7, 0x8) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000012c0)={@llc={0x1a, 0x17, 0x5, 0x1, 0x9, 0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, {&(0x7f00000002c0)=""/4096, 0x1000}, &(0x7f0000000100), 0x20}, 0xa0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:44:13 executing program 2 (fault-call:4 fault-nth:1): r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:44:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) [ 304.497499][T10941] CPU: 0 PID: 10941 Comm: syz-executor.2 Not tainted 5.3.0-next-20190926 #0 [ 304.506403][T10941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.516490][T10941] Call Trace: [ 304.520168][T10941] dump_stack+0x172/0x1f0 [ 304.524545][T10941] should_fail.cold+0xa/0x15 [ 304.529242][T10941] ? fault_create_debugfs_attr+0x180/0x180 [ 304.535078][T10941] ? ___might_sleep+0x163/0x2c0 [ 304.539948][T10941] __should_failslab+0x121/0x190 [ 304.545076][T10941] should_failslab+0x9/0x14 [ 304.549818][T10941] __kmalloc+0x2e0/0x770 [ 304.554085][T10941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.560336][T10941] ? d_absolute_path+0x11b/0x170 [ 304.565287][T10941] ? __d_path+0x140/0x140 [ 304.569628][T10941] ? tomoyo_encode2.part.0+0xf5/0x400 [ 304.575107][T10941] tomoyo_encode2.part.0+0xf5/0x400 [ 304.580324][T10941] tomoyo_encode+0x2b/0x50 [ 304.584755][T10941] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 304.590420][T10941] tomoyo_path_number_perm+0x1dd/0x520 [ 304.595986][T10941] ? tomoyo_path_number_perm+0x193/0x520 [ 304.601653][T10941] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 304.607474][T10941] ? __f_unlock_pos+0x19/0x20 [ 304.612392][T10941] ? __fget+0x384/0x560 [ 304.616750][T10941] ? ksys_dup3+0x3e0/0x3e0 [ 304.621179][T10941] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.627563][T10941] ? fput_many+0x12c/0x1a0 [ 304.631997][T10941] tomoyo_file_ioctl+0x23/0x30 [ 304.636784][T10941] security_file_ioctl+0x77/0xc0 [ 304.641744][T10941] ksys_ioctl+0x57/0xd0 [ 304.645915][T10941] __x64_sys_ioctl+0x73/0xb0 [ 304.650520][T10941] do_syscall_64+0xfa/0x760 [ 304.655038][T10941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.661026][T10941] RIP: 0033:0x459a29 [ 304.664925][T10941] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.684691][T10941] RSP: 002b:00007f2f4a380c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 304.693204][T10941] RAX: ffffffffffffffda RBX: 00007f2f4a380c90 RCX: 0000000000459a29 [ 304.701193][T10941] RDX: 0000000000000000 RSI: 0000000040096100 RDI: 0000000000000003 [ 304.709276][T10941] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 304.717262][T10941] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f4a3816d4 [ 304.725241][T10941] R13: 00000000004cd6d0 R14: 00000000004d6d68 R15: 0000000000000007 [ 304.736112][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 304.741919][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 304.778452][ T2793] BUG: assuming atomic context at net/kcm/kcmsock.c:382 [ 304.788434][ T2793] in_atomic(): 0, irqs_disabled(): 0, pid: 2793, name: kworker/u4:5 [ 304.801216][ T2793] 3 locks held by kworker/u4:5/2793: [ 304.808501][ T2793] #0: ffff88809bcbad28 ((wq_completion)kstrp){+.+.}, at: process_one_work+0x88b/0x1740 [ 304.852127][ T2793] #1: ffff8880a04ffdc0 ((work_completion)(&strp->work)){+.+.}, at: process_one_work+0x8c1/0x1740 04:44:13 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 304.899981][ T2793] #2: ffff8880978b2350 (sk_lock-AF_INET){+.+.}, at: strp_sock_lock+0x2e/0x40 [ 304.960076][ T2793] CPU: 0 PID: 2793 Comm: kworker/u4:5 Not tainted 5.3.0-next-20190926 #0 [ 304.968545][ T2793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.978619][ T2793] Workqueue: kstrp strp_work [ 304.983237][ T2793] Call Trace: [ 304.986694][ T2793] dump_stack+0x172/0x1f0 [ 304.991038][ T2793] __cant_sleep.cold+0xa4/0xbc [ 304.995838][ T2793] kcm_parse_func_strparser+0x54/0x200 [ 305.001303][ T2793] ? memset+0x32/0x40 [ 305.005381][ T2793] __strp_recv+0x5dc/0x1b80 [ 305.009898][ T2793] ? __kasan_check_read+0x11/0x20 [ 305.015030][ T2793] strp_recv+0xcf/0x110 [ 305.019216][ T2793] tcp_read_sock+0x285/0xa00 [ 305.023917][ T2793] ? strp_process+0xf0/0xf0 [ 305.028437][ T2793] ? compat_tcp_getsockopt+0x80/0x80 [ 305.033735][ T2793] ? mark_held_locks+0xa4/0xf0 [ 305.038504][ T2793] ? __local_bh_enable_ip+0x15a/0x270 [ 305.043886][ T2793] ? lock_sock_nested+0xe2/0x120 [ 305.048839][ T2793] ? compat_tcp_getsockopt+0x80/0x80 [ 305.054126][ T2793] strp_read_sock+0x14d/0x200 [ 305.058805][ T2793] ? strp_stop+0x40/0x40 [ 305.063064][ T2793] ? lock_sock_nested+0xe2/0x120 [ 305.068185][ T2793] strp_work+0xe3/0x130 [ 305.072435][ T2793] process_one_work+0x9af/0x1740 [ 305.077596][ T2793] ? pwq_dec_nr_in_flight+0x320/0x320 [ 305.083156][ T2793] ? lock_acquire+0x190/0x410 [ 305.087856][ T2793] worker_thread+0x98/0xe40 [ 305.092376][ T2793] ? trace_hardirqs_on+0x67/0x240 [ 305.097453][ T2793] kthread+0x361/0x430 [ 305.101609][ T2793] ? process_one_work+0x1740/0x1740 04:44:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) [ 305.106922][ T2793] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 305.113264][ T2793] ret_from_fork+0x24/0x30 [ 305.136144][T10941] ERROR: Out of memory at tomoyo_realpath_from_path. [ 305.153373][T10941] QAT: failed to copy from user cfg_data. [ 305.156305][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 305.165155][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:44:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) [ 305.220121][ T26] audit: type=1804 audit(1569645854.061:59): pid=10955 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/51/bus" dev="sda1" ino=16922 res=1 04:44:14 executing program 4: getpriority(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) r1 = accept(r0, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80) getsockopt$inet6_tcp_buf(r1, 0x6, 0xe, &(0x7f00000001c0)=""/189, &(0x7f0000000100)=0xbd) r2 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') syz_open_dev$amidi(0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') 04:44:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = memfd_create(&(0x7f0000000100)='/dev/uinput\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0xfffffffffffffd65, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4(r3, 0x0, &(0x7f0000000000), 0x100000) 04:44:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x0) 04:44:14 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40096100, 0x0) 04:44:14 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_INIT(r0, &(0x7f0000000140)={0x50}, 0x50) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 305.475107][T10966] QAT: failed to copy from user cfg_data. 04:44:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:14 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x2, 0x0) 04:44:14 executing program 5 (fault-call:6 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1}, 0x1) [ 305.709376][ T26] audit: type=1804 audit(1569645854.551:60): pid=10973 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/52/bus" dev="sda1" ino=16486 res=1 04:44:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) 04:44:14 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x10, 0x0) [ 305.909898][T10982] FAULT_INJECTION: forcing a failure. [ 305.909898][T10982] name failslab, interval 1, probability 0, space 0, times 0 [ 306.019597][T10982] CPU: 0 PID: 10982 Comm: syz-executor.5 Tainted: G W 5.3.0-next-20190926 #0 [ 306.029840][T10982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.039910][T10982] Call Trace: [ 306.043251][T10982] dump_stack+0x172/0x1f0 [ 306.047781][T10982] should_fail.cold+0xa/0x15 [ 306.052541][T10982] ? fault_create_debugfs_attr+0x180/0x180 [ 306.058486][T10982] ? ___might_sleep+0x163/0x2c0 [ 306.063360][T10982] __should_failslab+0x121/0x190 [ 306.068314][T10982] should_failslab+0x9/0x14 [ 306.072836][T10982] kmem_cache_alloc_node+0x268/0x740 [ 306.078141][T10982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.084394][T10982] ? tcp_established_options+0x29d/0x4d0 [ 306.090341][T10982] __alloc_skb+0xd5/0x5e0 [ 306.095727][T10982] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 306.101318][T10982] ? __kasan_check_read+0x11/0x20 [ 306.106343][T10982] ? mark_lock+0xc2/0x1220 [ 306.110865][T10982] sk_stream_alloc_skb+0x113/0xc50 [ 306.116904][T10982] tcp_sendmsg_locked+0xc70/0x3220 [ 306.122228][T10982] ? mark_lock+0xc2/0x1220 [ 306.126919][T10982] ? tcp_sendpage+0x60/0x60 [ 306.131435][T10982] ? trace_hardirqs_on+0x67/0x240 [ 306.136460][T10982] ? lock_sock_nested+0x9a/0x120 [ 306.141405][T10982] ? __local_bh_enable_ip+0x15a/0x270 [ 306.147174][T10982] tcp_sendmsg+0x30/0x50 [ 306.151529][T10982] inet_sendmsg+0x9e/0xe0 [ 306.155865][T10982] ? inet_send_prepare+0x4f0/0x4f0 [ 306.162108][T10982] sock_sendmsg+0xd7/0x130 [ 306.166727][T10982] ___sys_sendmsg+0x803/0x920 [ 306.171412][T10982] ? copy_msghdr_from_user+0x440/0x440 [ 306.176908][T10982] ? __kasan_check_read+0x11/0x20 [ 306.182199][T10982] ? __fget+0x384/0x560 [ 306.186690][T10982] ? ksys_dup3+0x3e0/0x3e0 [ 306.191130][T10982] ? __fget_light+0x1a9/0x230 [ 306.195817][T10982] ? __fdget+0x1b/0x20 [ 306.200085][T10982] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 306.206883][T10982] __sys_sendmsg+0x105/0x1d0 [ 306.211572][T10982] ? __sys_sendmsg_sock+0xd0/0xd0 [ 306.216726][T10982] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 306.224466][T10982] ? do_syscall_64+0x26/0x760 [ 306.229644][T10982] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.235825][T10982] ? do_syscall_64+0x26/0x760 [ 306.240801][T10982] __x64_sys_sendmsg+0x78/0xb0 [ 306.245697][T10982] do_syscall_64+0xfa/0x760 [ 306.250298][T10982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.256365][T10982] RIP: 0033:0x459a29 [ 306.260439][T10982] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.280828][T10982] RSP: 002b:00007f80717f0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 306.289497][T10982] RAX: ffffffffffffffda RBX: 00007f80717f0c90 RCX: 0000000000459a29 [ 306.298059][T10982] RDX: 0000000000000001 RSI: 0000000020000040 RDI: 0000000000000003 [ 306.306653][T10982] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:44:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') preadv(r0, &(0x7f0000000480), 0x10000000000000f2, 0x0) [ 306.314647][T10982] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f80717f16d4 [ 306.322745][T10982] R13: 00000000004c7299 R14: 00000000004dcb28 R15: 0000000000000006 [ 306.344490][T10989] QAT: Invalid ioctl 04:44:15 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fcntl$setstatus(r0, 0x4, 0x6000) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x200000fffd}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) [ 306.664467][ T26] audit: type=1804 audit(1569645855.501:61): pid=10992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir674914069/syzkaller.6Eadws/53/bus" dev="sda1" ino=16845 res=1 [ 306.709388][T10989] QAT: Invalid ioctl [ 309.151591][T11000] IPVS: ftp: loaded support on port[0] = 21 [ 309.527449][T11000] chnl_net:caif_netlink_parms(): no params data found [ 309.557942][T11003] IPVS: ftp: loaded support on port[0] = 21 [ 309.576973][T11000] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.585026][T11000] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.597739][T11000] device bridge_slave_0 entered promiscuous mode [ 309.619943][T11000] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.628362][T11000] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.636307][T11000] device bridge_slave_1 entered promiscuous mode [ 309.798877][T11000] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 309.811995][T11000] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 309.835031][T11000] team0: Port device team_slave_0 added [ 309.981676][T11000] team0: Port device team_slave_1 added [ 310.238229][T11000] device hsr_slave_0 entered promiscuous mode [ 310.286758][T11000] device hsr_slave_1 entered promiscuous mode [ 310.326300][T11000] debugfs: Directory 'hsr0' with parent '/' already present! [ 310.474589][T11003] chnl_net:caif_netlink_parms(): no params data found [ 310.658773][T11003] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.667627][T11003] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.675533][T11003] device bridge_slave_0 entered promiscuous mode [ 310.684058][T11003] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.692370][T11003] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.701056][T11003] device bridge_slave_1 entered promiscuous mode [ 310.865905][T11003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.878725][T11003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.901407][T11003] team0: Port device team_slave_0 added [ 310.909031][T11003] team0: Port device team_slave_1 added [ 311.038873][T11003] device hsr_slave_0 entered promiscuous mode [ 311.076529][T11003] device hsr_slave_1 entered promiscuous mode [ 311.116290][T11003] debugfs: Directory 'hsr0' with parent '/' already present! [ 311.181443][T10529] device bridge_slave_1 left promiscuous mode [ 311.189734][T10529] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.246930][T10529] device bridge_slave_0 left promiscuous mode [ 311.253362][T10529] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.327523][T10529] device bridge_slave_1 left promiscuous mode [ 311.333730][T10529] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.397345][T10529] device bridge_slave_0 left promiscuous mode [ 311.404171][T10529] bridge0: port 1(bridge_slave_0) entered disabled state