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"}]}]}, 0x12a0}, 0x1, 0x0, 0x0, 0x4081}, 0x44000) r4 = fcntl$getown(0xffffffffffffffff, 0x9) waitid(0x0, r4, 0x0, 0x4, 0x0) r5 = dup3(r2, 0xffffffffffffffff, 0x80000) r6 = syz_open_procfs(r4, &(0x7f0000001680)='net/xfrm_stat\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000016c0)={0xffffffffffffffff}) r8 = openat$sequencer2(0xffffff9c, &(0x7f0000001700)='/dev/sequencer2\x00', 0x400000, 0x0) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f0000001800)={&(0x7f0000001640)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x4c, 0x0, 0x708, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8001}, @NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8, 0x1, r6}, {0x8, 0x1, r2}, {0x8, 0x1, r0}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x24000010}, 0x100040c0) r9 = openat$proc_capi20(0xffffff9c, &(0x7f0000001840)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$SIOCPNENABLEPIPE(r9, 0x89ed, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000001880)=@abs, &(0x7f0000001900)=0x6e) 14:20:08 executing program 3: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2000}, {}, {0x0, 0x2000000000000000}, 0x7}, {{@in6}, 0x0, @in6=@loopback}}, 0xe4) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x82, &(0x7f0000000000)={r3}, 0x8) readahead(r2, 0x3, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x6, 0x0, 0x4, 0x1, 0x21e0, 0x9, 0x4, {r3, @in={{0x2, 0x4e21, @multicast1}}, 0x0, 0x0, 0x0, 0x5, 0x7fffffff}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0)={r4, 0x7ff}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x7e}, [@ldst={0x0, 0x0, 0x1, 0x0, 0xb7f2ca0c1b94ebd3}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x74) [ 300.778911][ T32] audit: type=1800 audit(1595427608.609:108): pid=10775 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.0" name="cpuacct.usage_percpu_sys" dev="sda1" ino=15979 res=0 [ 300.851256][ T2965] blk_update_request: I/O error, dev loop0, sector 120 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 14:20:08 executing program 1: r0 = socket$inet6(0xa, 0x80000, 0x3) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000000)) 14:20:08 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000000c0)="11090a0200027400f80100"/23, 0x17, 0x6e}], 0x0, &(0x7f00000003c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) setresuid(0x0, r1, 0x0) syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file1\x00', 0x1, 0x1, &(0x7f0000000280)=[{&(0x7f0000000180)="6a0b2a34543653cf32c84fa949b94a71ead88bfba15b5d22f82adc4fa94c4b3d68aed75a961eb86dbcddbf5331902215a322db2426d0b3508c8662b2ea864d74b24e1ae26710b15de40894927209de017b3eab3d1e75f2d40578fd7698c4501813bdf5aa6274cc9d6b8c2aa5395016a8419b1cf8a12d59243cfc0e8ab3479803759d4687f1ee76e1beae8e93b17d590d2d27a415842a67c8d76671e1a4511e9583f5efffcf251d2d15b8265088a44e2171743fa5b8038afa49bd7bd58501bff30a2532f4967f6fb78c3eb0d893a37a", 0xcf, 0x3}], 0x41010, &(0x7f00000002c0)={[{@noikeep='noikeep'}, {@nogrpid='nogrpid'}, {@attr2='attr2'}, {@nobarrier='nobarrier'}, {@grpquota='grpquota'}, {@nogrpid='nogrpid'}, {@swidth={'swidth', 0x3d, 0x5}}], [{@smackfsdef={'smackfsdef'}}, {@seclabel='seclabel'}, {@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@subj_role={'subj_role', 0x3d, ')#]'}}, {@smackfsroot={'smackfsroot', 0x3d, '!:%}]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '^.'}}]}) r2 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r3 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r3, 0x40003) sendfile(r2, r3, 0x0, 0x2008000fffffffe) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$BLKTRACESTOP(r4, 0x1275, 0x0) 14:20:09 executing program 3: syz_read_part_table(0x7fffffff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000040)="0201a6ffffff0a000000ff45ac00000000000f00e931ef0500000000000080ffffffa9000000060000000000000000300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000000)={0x8000, 0x8000, 0x65, 0x6, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r3, 0x7f}, &(0x7f0000000100)=0x8) 14:20:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r4, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 301.499900][T10795] FAT-fs (loop0): bogus number of reserved sectors [ 301.506690][T10795] FAT-fs (loop0): Can't find a valid FAT filesystem [ 301.641059][ T32] audit: type=1800 audit(1595427609.469:109): pid=10800 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="cpuacct.usage_percpu_sys" dev="sda1" ino=15926 res=0 [ 301.714677][T10795] FAT-fs (loop0): bogus number of reserved sectors [ 301.721463][T10795] FAT-fs (loop0): Can't find a valid FAT filesystem [ 301.830684][T10806] loop3: p1 p4 [ 301.835432][T10806] loop3: p1 size 11290111 extends beyond EOD, truncated 14:20:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 301.888677][T10806] loop3: p4 size 3657465856 extends beyond EOD, truncated 14:20:09 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x1c}, 0x5}, 0x1c) [ 302.283535][T10806] loop3: p1 p4 [ 302.287865][T10806] loop3: p1 size 11290111 extends beyond EOD, truncated 14:20:10 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000100)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000200)="14c1c1d92401bcfe458d7fd5229e48541992393e676533f3331d5423671cac95b8ec810b51de9eebf4faa2c338e9fb672fd454baf0e4572cc170741d5e50223ea39a8b10e203006e9c241b327f7021a8f67430ff010000b446c303ead41ae03c0a25a44e8a7cc849a5f6cb6076835bd6a796813a828dd68213a7cfeda43b66dfda220e09c7d0dac04b4f17befeffffffe32f3d401700afce1d344d495b0568dcfbfebd6ed6dfb7bc07f2c99c747cff489429a67450af4d698d3a5ca000000045dbdeb2a694e126cdc4adbbcf3024cf7921f8128590e2b7b506119b87610dfd226afd0700"/256, 0x100, 0xfffffffffffffffd) keyctl$read(0xb, r1, &(0x7f0000000480)=""/40, 0x1001) keyctl$read(0xb, r1, &(0x7f00000013c0)=""/4096, 0x1000) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xc8k\xc0\xa5veli\x00'/29, 0x0) ftruncate(r2, 0x40003) sendfile(r0, r2, 0x0, 0x2008000fffffffe) [ 302.391183][T10806] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 302.515920][ T4885] loop3: p1 p4 [ 302.520163][ T4885] loop3: p1 size 11290111 extends beyond EOD, truncated 14:20:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 302.585911][ T4885] loop3: p4 size 3657465856 extends beyond EOD, truncated [ 302.621334][T10829] IPVS: ftp: loaded support on port[0] = 21 14:20:10 executing program 3: syz_emit_ethernet(0x25e, &(0x7f00000019c0)={@multicast, @empty=[0x5, 0xfc], @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x228, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81802"}, {0x0, 0x14, "ffffefffa0f8ca1cc8000800"}, {0x18, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92326a7051e460a13ddde25a5b85b9d93090d625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c61bc943afcb99e5ff38403946f5ab6560d2d0124624cc383bf15d4fe6b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d255518751501f4d980e61c2d908a95c5f4a1a2367bc591dd8b094822ff0642a18b79f7c5eba31fb68b2d734a6671e27182aee4de24a4a5c6186c0d3baa75af390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba423999086baa39eb8164e240069f656d3a057ecf894222a141123f5acaa556b9f30dcab2b90aa23e667016effc5dc49dfb58d8931"}]}}}}}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c}, {0x0, 0x7}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe4) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x6, 0x4) 14:20:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@req={0x20, &(0x7f0000000000)={'veth0\x00', @ifru_addrs=@l2={0x1f, 0xe6, @any, 0x2, 0x1}}}) [ 302.846146][ T32] audit: type=1800 audit(1595427610.679:110): pid=10856 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15982 res=0 [ 303.057136][ T32] audit: type=1800 audit(1595427610.769:111): pid=10856 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15982 res=0 [ 303.883163][T10829] chnl_net:caif_netlink_parms(): no params data found [ 304.458355][T10829] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.465871][T10829] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.475511][T10829] device bridge_slave_0 entered promiscuous mode [ 304.498095][T10829] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.506552][T10829] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.516196][T10829] device bridge_slave_1 entered promiscuous mode [ 304.577729][T10829] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.606149][T10829] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.671906][T10829] team0: Port device team_slave_0 added [ 304.684420][T10829] team0: Port device team_slave_1 added [ 304.741834][T10829] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 304.749079][T10829] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.775390][T10829] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 304.797568][T10829] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 304.804939][T10829] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 304.833822][T10829] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 304.951564][T10829] device hsr_slave_0 entered promiscuous mode [ 305.018610][T10829] device hsr_slave_1 entered promiscuous mode [ 305.059310][T10829] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 305.067044][T10829] Cannot create hsr debugfs directory [ 305.701373][T10829] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 305.763632][T10829] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 305.848789][T10829] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 305.915187][T10829] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 306.243033][T10829] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.283790][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.293213][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.316471][T10829] 8021q: adding VLAN 0 to HW filter on device team0 [ 306.349765][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 306.360437][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.370177][ T3057] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.377485][ T3057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.448262][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.458152][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 306.468344][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.477875][ T3057] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.485168][ T3057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.494190][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 306.505255][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 306.516386][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 306.527269][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 306.537748][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 306.548596][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 306.612519][T10829] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 306.623871][T10829] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 306.699142][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 306.708915][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 306.718522][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.729202][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 306.739232][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 306.749093][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 306.757124][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 306.772159][ T3057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 306.793821][T10829] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 306.995119][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 307.006160][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 307.077090][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 307.088796][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.113382][T10829] device veth0_vlan entered promiscuous mode [ 307.133406][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.143325][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.161239][T10829] device veth1_vlan entered promiscuous mode [ 307.240816][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 307.250577][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 307.261115][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 307.271268][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 307.298157][T10829] device veth0_macvtap entered promiscuous mode [ 307.320038][T10829] device veth1_macvtap entered promiscuous mode [ 307.375653][T10829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 307.387336][T10829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.401062][T10829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 307.412874][T10829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.422860][T10829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 307.433416][T10829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.444086][T10829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 307.454684][T10829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.469155][T10829] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 307.477439][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 307.487233][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 307.496995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 307.507215][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 307.537729][T10829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 307.550571][T10829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.562152][T10829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 307.572820][T10829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.582842][T10829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 307.593452][T10829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.603501][T10829] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 307.614105][T10829] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 307.629008][T10829] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 307.641394][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 307.651798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 14:20:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x36c, 0x0, 0x228, 0x0, 0x2d8, 0x228, 0x2d8, 0x2d8, 0x2d8, 0x2d8, 0x2d8, 0x3, 0x0, {[{{@ip={@multicast1, @rand_addr, 0x0, 0x0, 'syzkaller0\x00', 'netpci0\x00'}, 0x0, 0x1c8, 0x228, 0x0, {}, [@common=@inet=@hashlimit3={{0x158, 'hashlimit\x00'}, {'ip6tnl0\x00', {0x2, 0x0, 0x64, 0x0, 0x0, 0x7ff, 0x5, 0x2}}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffff}, {0xffff, [0x6]}}}}, {{@ip={@remote, @empty, 0x0, 0x0, '\x00', 'ipvlan0\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x3c8) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) r2 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x2011, r2, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x401, 0x0) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000001040)="a4d168160e4c011d35f24e9ff28ae31cc9b37c7981cab7515d94f1b1c1d8f3e9a0f0f92e9104780a03df8a77f4a487cfbf70e0d309cfdf12f463d327e257dde0", 0x40}], 0x1) close(r1) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000400)={0x7f, {{0x2, 0x4e22, @empty}}}, 0x84) 14:20:17 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x100) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r2, 0x40003) sendfile(r0, r2, 0x0, 0x2008000fffffffe) 14:20:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_STEREODEVS(r2, 0x80044dfb, &(0x7f0000000280)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'blake2s-224\x00'}, 0x2e69772df770aeee) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000001c0)="6afaf8e67527ffbe2a8bae886e7f7b41b85186145df52f0e57b975b1f004e33ddb0b035edc1aa4c42c12c4", 0x2b}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x2, 0x200}, &(0x7f00000003c0)=0x88) r6 = openat$proc_capi20ncci(0xffffff9c, &(0x7f0000000580)='/proc/capi/capi20ncci\x00', 0x10800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000400)={0x2002, 0x8000, 0x1000, 0x325b, r5}, &(0x7f0000000540)=0x10) r7 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2c000000be0b6403b34668180fce7c90b3647b608493fdb44a2c091041ed3d3135bc0f1c5571cf30c99a8933f86b737f1dab5217722f24a5c2b915e0462a10226471cdfaf1e59bfb06fce3e2a41bc46ad1b1839d83935889898e335793a76c0dce6a8cf1bcbd4f577e5dd0e0d7b1bc7820c64c115309fc63899bab7d455bf44fa43ebf237200ecc632803107390e46a7e0c42c931446441d", @ANYRES16=r7, @ANYBLOB="040027bd7000fb46df25020000000c00060002000000000000000c0002e5c0083d24091f792eed3a1bdd7a2d21197eacb8db7977accc469325de4892c23fb840044aa6e82b470335a436d2a69645c1ef905723"], 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x20040000) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, r7, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x663}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xc4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x401}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_SIZE_BYTES={0x3, 0x2, 0xa2d}]}, 0x74}, 0x1, 0x0, 0x0, 0x48000}, 0x4) connect$vsock_stream(r1, &(0x7f0000000300)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r8 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_CTRL(r8, 0xc008561c, &(0x7f00000002c0)={0xf0f044}) 14:20:17 executing program 1: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6=@dev={0xfe, 0x80, [], 0x2d}}, 0x0, @in6=@loopback}}, 0xe4) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/123, 0x7b}, {&(0x7f0000000000)=""/50, 0x32}, {&(0x7f0000000100)=""/157, 0x9d}], 0x3, &(0x7f0000000200)=""/68, 0x44}, 0x14142) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000040)=@buf) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r3, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0086426, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x0}]}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000340)={r4, 0x10}) 14:20:17 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x20, &(0x7f0000000000)={'syzkaller0\x00', @ifru_ivalue=0x2}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$AUDIT_GET_FEATURE(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x3fb, 0x4, 0x70bd26, 0x25dfdbff, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x44044084}, 0x8000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r4, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x8, @loopback, 0x5}, r5}}, 0x30) [ 309.453188][ T32] audit: type=1800 audit(1595427617.289:112): pid=11104 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=35 res=0 14:20:17 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) modify_ldt$write2(0x11, &(0x7f0000000000)={0x95e}, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') recvmmsg(r3, &(0x7f0000002900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB='\x00'/11], 0x14}}, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000000), 0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={0x0, 0x0, 0x8}, &(0x7f00000001c0)=0xc) sendmsg$NL80211_CMD_SET_MPATH(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x80, r4, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0xffffffe0}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x4}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x800}}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @local}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xfffffffc, 0x1}}]}, 0x80}, 0x1, 0x0, 0x0, 0x90}, 0x4000000) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() clone(0x8003400, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) wait4(0x0, 0x0, 0x0, 0x0) [ 309.650243][ T32] audit: type=1800 audit(1595427617.329:113): pid=11104 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=35 res=0 14:20:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:17 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$nvram(0xffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x808101, 0x0) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000180)) r1 = open(&(0x7f0000001380)='./file0\x00', 0x20000, 0x16c) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r2, 0x40003) sendfile(r1, r2, 0x0, 0x2008000fffffffe) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000100)={0x2800000000000000, 0x100000, 0x2, 0x1, 0x1e}) 14:20:17 executing program 4: unshare(0x2a000400) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) sendfile(r2, r0, 0x0, 0x7ffff000) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x140e, 0x20, 0x70bd28, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x38}}, 0x4) 14:20:18 executing program 4: r0 = socket(0xa, 0x2, 0xffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x84) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x8c228, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff}, 0x42234, 0x0, 0x0, 0x0, 0x0, 0x3ffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vimc1(0xffffff9c, 0x0, 0x2, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x8) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x80, 0x0, 0x0, 0xfffffff6, 0x800000000000004, 0x200, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3ff, 0x1f}, 0x0, 0x0, 0x1, 0x5, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(0xffffffffffffffff, r2) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000000)={0x7, 0x7, 0x4}, &(0x7f0000000140)=0x28) ioctl$NBD_SET_TIMEOUT(r3, 0xab09, 0x10080000) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0xa4, 0x1, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0x2}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1000}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6002}, @CTA_TIMEOUT_DATA={0x54, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x692}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7e}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0xa4}, 0x1, 0x0, 0x0, 0x10000}, 0x10) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000180)) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 14:20:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:18 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='\x00', 0xfff, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000140)="3291535732dca361285e8c9dd681545490f3e8a5c92a90c6c2c79027768817e0b651d95ec226f4123b01335bffc39ef45d573dfd2ced985884dc4d1f77fd2317e08e5db91eb4587defd2d16f98a189a781543cfdd65b2a609e696b7f03fe2641dee33b198d6b4a9942384df7ec6b423fb3c7a3ccd9e69fd4a356229918a592", 0x7f, 0x1}], 0x800400, &(0x7f0000000200)={[{@dots='dots'}, {@dots='dots'}, {@fat=@tz_utc='tz=UTC'}, {@dots='dots'}], [{@subj_user={'subj_user'}}, {@measure='measure'}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@subj_type={'subj_type'}}, {@seclabel='seclabel'}, {@seclabel='seclabel'}]}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000002c0)=ANY=[@ANYBLOB="d00800002400000009000a000410ffff"], 0x8d0}}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000040)=@buf) [ 310.693298][ T32] audit: type=1800 audit(1595427618.519:114): pid=11133 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.0" name="cpuacct.usage_percpu_sys" dev="loop0" ino=36 res=0 14:20:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) socket$inet(0x2, 0x80001, 0x84) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 310.972888][T11140] IPVS: ftp: loaded support on port[0] = 21 14:20:19 executing program 3: ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, {0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, "8331489520e5717833a33cb3732ea44b0d27adbb71469f7113e9dbf11d14e817"}}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d2250000000206e73ba8f4952bedc6760253ef", 0x7ffff, 0x400}], 0x0, &(0x7f0000000240)={[{@commit={'commit'}}]}) [ 311.597047][T11171] IPVS: ftp: loaded support on port[0] = 21 14:20:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r4, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:19 executing program 4: r0 = socket(0xa, 0x2, 0xffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x84) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x8c228, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff}, 0x42234, 0x0, 0x0, 0x0, 0x0, 0x3ffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vimc1(0xffffff9c, 0x0, 0x2, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x8) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x80, 0x0, 0x0, 0xfffffff6, 0x800000000000004, 0x200, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3ff, 0x1f}, 0x0, 0x0, 0x1, 0x5, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup2(0xffffffffffffffff, r2) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000000)={0x7, 0x7, 0x4}, &(0x7f0000000140)=0x28) ioctl$NBD_SET_TIMEOUT(r3, 0xab09, 0x10080000) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0xa4, 0x1, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0x2}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1000}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6002}, @CTA_TIMEOUT_DATA={0x54, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7ff}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x692}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7fffffff}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7e}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x2f}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0xa4}, 0x1, 0x0, 0x0, 0x10000}, 0x10) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000180)) set_mempolicy(0x3, &(0x7f0000000200)=0x1, 0x3) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) [ 312.081680][T11198] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 312.090988][T11198] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (20) [ 312.238071][T11204] IPVS: ftp: loaded support on port[0] = 21 14:20:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r3, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0185649, &(0x7f00000000c0)={0x0, 0x2, 0x10000, r4, 0x0, &(0x7f0000000080)={0x9a0904, 0x4, [], @string=&(0x7f0000000040)=0x3}}) sendmsg$AUDIT_USER(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x3ed, 0x300, 0x70bd2d, 0x25dfdbfe, "c309cfd7fc96ebd6b16ea50b94306dca6d5de0fef19dd7985182d2510e5e33812347fec1587fcf1d25d18252bb3b1533171c7543dd2b91279e1578", ["", "", ""]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004040}, 0x40) sendfile(r4, r3, 0x0, 0x80000000) 14:20:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r3, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 312.983370][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:21 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000280)=[{{0x1, 0x1}, {0x3, 0x1, 0x1}}], 0x8) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x60, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}, @IPSET_ATTR_CIDR={0x5}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xf504, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@private0={0xfc, 0x0, [], 0x1}, 0x4e21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, {0x2000000}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x3}}, 0xe4) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000100ac1914aa000000ed0400003c0d"], 0x24) close(r3) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000240)={0x0, 'team0\x00'}, 0x18) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r4, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x98, 0x1, 0x9, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFCTH_TUPLE={0x58, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010101}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @remote}}}]}, @NFCTH_PRIV_DATA_LEN={0x8}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x13}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x5}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x98}, 0x1, 0x0, 0x0, 0x51}, 0x11) 14:20:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r3, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0185649, &(0x7f00000000c0)={0x0, 0x2, 0x10000, r4, 0x0, &(0x7f0000000080)={0x9a0904, 0x4, [], @string=&(0x7f0000000040)=0x3}}) sendmsg$AUDIT_USER(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x3ed, 0x300, 0x70bd2d, 0x25dfdbfe, "c309cfd7fc96ebd6b16ea50b94306dca6d5de0fef19dd7985182d2510e5e33812347fec1587fcf1d25d18252bb3b1533171c7543dd2b91279e1578", ["", "", ""]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004040}, 0x40) sendfile(r4, r3, 0x0, 0x80000000) 14:20:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r3, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 313.837730][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:21 executing program 4: r0 = socket(0x10, 0x80002, 0x0) r1 = gettid() sendmmsg$unix(r0, &(0x7f0000000a80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x18, 0x1, 0x2, {r1, 0xee00}}}], 0x18}], 0x1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = gettid() sendmmsg$unix(r2, &(0x7f0000000a80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x18, 0x1, 0x2, {r3, 0xee00}}}], 0x18}], 0x1, 0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='personality\x00') sendmsg$IPSET_CMD_GET_BYNAME(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, 0xe, 0x6, 0x801, 0x0, 0x0, {0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x24000000) r5 = socket$inet_tcp(0x2, 0x3, 0x6) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r6, 0x0) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000280)={{0x546, 0x1, 0x6, 0x100}, 'syz1\x00', 0x52}) bind$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r4, 0x0, 0xffffffffffffff4e, 0x8000, 0x0, 0x0) write$binfmt_script(r5, &(0x7f0000000240)=ANY=[], 0x24) r7 = openat$pfkey(0xffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x2101, 0x0) openat$bsg(0xffffff9c, &(0x7f0000000300)='/dev/bsg\x00', 0x105800, 0x0) openat$cgroup(r7, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) ioctl$TIOCGICOUNT(r4, 0x545d, 0x0) 14:20:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r3, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0185649, &(0x7f00000000c0)={0x0, 0x2, 0x10000, r4, 0x0, &(0x7f0000000080)={0x9a0904, 0x4, [], @string=&(0x7f0000000040)=0x3}}) sendmsg$AUDIT_USER(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x3ed, 0x300, 0x70bd2d, 0x25dfdbfe, "c309cfd7fc96ebd6b16ea50b94306dca6d5de0fef19dd7985182d2510e5e33812347fec1587fcf1d25d18252bb3b1533171c7543dd2b91279e1578", ["", "", ""]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004040}, 0x40) sendfile(r4, r3, 0x0, 0x80000000) 14:20:22 executing program 4: r0 = inotify_init1(0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000040)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x5}, 0x10, 0x0, r1}, 0x74) 14:20:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r3, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 314.712397][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0185649, &(0x7f00000000c0)={0x0, 0x2, 0x10000, r4, 0x0, &(0x7f0000000080)={0x9a0904, 0x4, [], @string=&(0x7f0000000040)=0x3}}) sendmsg$AUDIT_USER(r6, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, 0x3ed, 0x300, 0x70bd2d, 0x25dfdbfe, "c309cfd7fc96ebd6b16ea50b94306dca6d5de0fef19dd7985182d2510e5e33812347fec1587fcf1d25d18252bb3b1533171c7543dd2b91279e1578", ["", "", ""]}, 0x4c}, 0x1, 0x0, 0x0, 0x20004040}, 0x40) sendfile(r4, r3, 0x0, 0x80000000) 14:20:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 315.580641][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:23 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="850000000800000065000000000000000f0000000000000095000000000000006bfc4764b5831623e73137f693a017053a2bc29d9c4b0b85a06af042bd376f0d00d4e504bde8f58195eb719258fdec72c7406b480428815d69ef98bf85c47cd2229c75717b8813a987d06053b07f963bcf5eff32eea53b5fd9d2e198c4993110e63a157f87335d00"/147], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r2 = openat$hwrng(0xffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4a401, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r2, 0x80044dfd, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 14:20:23 executing program 2: socket$inet6(0xa, 0x2, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:24 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0185649, &(0x7f00000000c0)={0x0, 0x2, 0x10000, r4, 0x0, &(0x7f0000000080)={0x9a0904, 0x4, [], @string=&(0x7f0000000040)=0x3}}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0106434, &(0x7f00000000c0)={0x0, 0x0, 0x30001, 0x3}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40086439, &(0x7f0000000100)={0x96, r3}) ioctl$FS_IOC_SETVERSION(r2, 0x40047602, &(0x7f0000000140)=0x2) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x8c, 0x0, 0x1, 0x409, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_LABELS={0x10, 0x16, 0x1, 0x0, [0x0, 0x0, 0x2]}, @CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x8c}}, 0x0) [ 317.463488][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="91de48a845fbf3638f70eb6fa5ebc69427e44affb089378773bbbba010be13f2fc977f4d6b1a7cfb24dddb0a2ba90d39546acaa93b39cc71b6bb229fb6a427e0d082b4533d7256007c622a88638b6da5f09ca7c1ac7254fb56da1087928758b104d4a63ed0c6cace8670dd8f3a26dadfbcd30aee437922e96de02dee9021dff4c79b9f1064d6cd00093478837e63d712dee2d9a34aeb79caa36982ace66f7023767b698a611f094cd1313d61ac1353c4f06cba57f7038d5095cf326eb575997dbb1f73f66780fa9070b6f3a0862e6ef3a9fa25da6a74141478e0d337cd55ebb263ec2f8b8597cb74d0329d78c5a08aae69c66dd477a8b470c9d3e9", @ANYBLOB="f9ae37435158cf6bd985f3c27810f9c488551da33c6766521b60835bf86920e7f27dcf6359a8facb02b1685e6d66f8d08ce1045ed8e48a28194274f55aef15e1ff21aa029680a536888e6ea38fa2a1f72f10bea1672c29dbe3b6379680596bba992e4281c73b476fcc6512b61656b0d3684e45979ff7722b710c1f49bd61201cc7", @ANYRESOCT, @ANYRES64, @ANYRES64, @ANYRES64]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_ADD_ADDR(r4, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, r5, 0x1, 0x0, 0x0, {0x3}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5}]}]}, 0x20}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00', r8}) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000600)=@mpls_getnetconf={0x24, 0x52, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0xc12}, @NETCONFA_IFINDEX={0x8, 0x1, r9}]}, 0x24}, 0x1, 0xa000000}, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x2c, r5, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24008042}, 0x80) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:20:25 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 317.729961][T11300] FAT-fs (loop0): Unrecognized mount option "‘ÞH¨Eûócpëo¥ëÆ”'äJÿ°‰7‡s»» ¾òü—Mk|û$ÝÛ [ 317.729961][T11300] +© 9TjÊ©;9Ìq¶»"Ÿ¶¤'àЂ´S=rV" or missing value [ 317.785621][ T32] audit: type=1800 audit(1595427625.619:115): pid=11298 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.4" name="cpuacct.usage_percpu_sys" dev="sda1" ino=16011 res=0 14:20:25 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xffff0001, 0x0, 0x0, 0x9, 0x5}, 0x20) r1 = socket(0x10, 0x80002, 0x0) r2 = gettid() sendmmsg$unix(r1, &(0x7f0000000a80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x18, 0x1, 0x2, {r2, 0xee00}}}], 0x18}], 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$BLKRAGET(r3, 0x1263, &(0x7f0000000000)) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x18848, 0x0, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB="18000000230047faffffff00000000000400000204001000b115f8b9307ac3d78578fcd292a8fcd277cb57f5650731dfaf12ea77ad43cb08000000a9fdd6c1610c621c85fe3e3485460af173b9bede5105e65b5328de821ef57e8d4306f47f6ea4a656379a221558fa14efaf3bbee029931fbc632ddc0548f9f44600ac8213ab718c023043c03a6fb4862e0353"], 0x18}}, 0x0) pipe(0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) [ 317.973132][T11300] FAT-fs (loop0): Unrecognized mount option "‘ÞH¨Eûócpëo¥ëÆ”'äJÿ°‰7‡s»» ¾òü—Mk|û$ÝÛ [ 317.973132][T11300] +© 9TjÊ©;9Ìq¶»"Ÿ¶¤'àЂ´S=rV" or missing value 14:20:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) sendfile(r4, r3, 0x0, 0x80000000) 14:20:26 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:26 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000480)=ANY=[@ANYBLOB="e000ff010000000000ff00006443b0296b55eba31956fb8f1a898e278c808f77fca4e50feec365eab366ba103688f17b5641df7da5e9a93740a78175040314d2e0e04b8c2fbc1f60aec1826692f3ac3c2bb3c64f4089bc0d2ce60930b18f9cc6545b649228ebc863c3629701ec3a6807401b12545413398ca82f11d5764b6605a544a731598b9f2fcb1525dcb55fe6b4122cff0a5d294435d78358cb7e934d6f3994de59821f9ef9ca14f76dc01686da34841f6c18f74eb91c683cd88f945983db2d26354d8763c8c403de091e20c7b6acd0fbf91e29bdf81841495af473543ea6f32cb033fc098f7590b2dfc209ed407074f28791067c47c92525c3d9d9999bdecb1e84f0a6505da933b715a847a92a2bc94aa3dafd7a827a43781d533f1f7c253c"], 0x24) close(r2) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100), 0x10) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) ioctl$SIOCX25GDTEFACILITIES(r4, 0x89ea, &(0x7f0000000200)) [ 318.431869][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r1, 0xc00464c9, &(0x7f0000000000)) [ 318.994110][ T32] audit: type=1800 audit(1595427626.829:116): pid=11348 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=37 res=0 14:20:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) sendfile(r4, r3, 0x0, 0x80000000) 14:20:26 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 319.359470][ T32] audit: type=1800 audit(1595427627.189:117): pid=11350 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=37 res=0 14:20:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) timer_create(0x3, 0x0, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) timer_settime(0x0, 0x0, &(0x7f000004a000)={{0x77359400}, {0x77359400}}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:20:27 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) r2 = openat$nvram(0xffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x4200, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000180)={0xd4, "825bc360806775e2b9df6ac4e4c9c8f612ca51231aba8133cae34d0da5c9c3d70f36ecddbffa64a5368eeb8c61b078489f805657c02f342ab8490a6323a659b9aa9e625b802cc050559876a869c491d6a70c3aee0d691ad7ac0e0e23ac75adaf9c9ae229818e51dd98ea54aab0ed88d35a3a12793b73087b037a80730ec9a32839252f0549efd73ced2db8cadd54868531534d245b6127af23d0036b3ba107df3715afba865676463dd7f88b24600ed03135b8593df427d2e64a195c011e082e6edfaf03476356833a708fcd3724e5cb541bbb91"}) [ 319.711072][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 319.830079][ T32] audit: type=1326 audit(1595427627.659:118): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11389 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=40000003 syscall=265 compat=1 ip=0xf7f38549 code=0x0 14:20:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) sendfile(r4, r3, 0x0, 0x80000000) 14:20:27 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 320.133359][ T32] audit: type=1800 audit(1595427627.969:119): pid=11394 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=38 res=0 14:20:28 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) [ 320.308645][ T32] audit: type=1800 audit(1595427628.139:120): pid=11398 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=38 res=0 [ 320.397543][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:28 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x12300, 0x4) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c000900000085060000100000000000000000ec", @ANYRES32=r4, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) r5 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r6 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x9, 0x0, 0x0, r7}}, 0x20}, 0x1, 0xa000000}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f00000013c0)=ANY=[@ANYBLOB="380700002c00000126bd7000fbdbdf2500000000", @ANYRES32=r7, @ANYBLOB="f0ff0d000f00266f09000280060005007f1f000008000b0003000000090001007273767000000000b806020008000300ac1414aa740606009000080007000100637400001400028006000e004e200000080005000700000055000600d2a30450a72363fd7d981f1d7a64c249c3096a972a47cb16970119058f629bc7d8c43993e2ee1a3eb32fc03f9efa4df072fdb0ee706ec6a73e4f804ba62fc49291137da7cd2664baebe6a88b3eac320f370000000c00070000000000010000000c0008000000000000000000580102000b00010073696d706c65000068000280060003002e000000050003000000000018000200050000005f08000002000000ddde00001a0000001800020002000000000000000500000081ffffff010400000c0003002f2129272b2f24001800020004000000ff0f00004d582f080300000006000000c50006007285e6d8cc1d1ed9b57624fb9c40489e58e19a7eb73d1f6a7c3bad0153b7a24b724ef3974be19a630665dd800a10bfac6a07e20f9273d17c8a00637dac74572afa0b090f62da03036b780edc05d2165e1d908e01abc28e087c55042bee5066733bd26c71d3619fa263ccc69e815c7630148033430ae9352e63912f92afd221eaf3fdba3aa2771c859712c8712a294ba9ae746eb4fafb817b332334ae837e3b39cb6abe3962456bead350ace0664e711499bbb3d74caf8d82f7a988a4692da3a1f50000000c00070001000000000000000c0008000100000002000000bc0100000800010169707400fc0002800800020003000000240001006d616e676c6500000000000000000000000000000000000000000000000000005c000600030072617700000000000000000000000000000000000000000000000000000000001f004905d736f7e010d1e72ed2b612dd946d28997ea3f72693dbfd4446fd2ed8761baec4b4f2fe295bad25f7bac774b259d00a6619380800020024b54f4108000200020000002400010073656375726974790000000000000000000000000000000000000000000000000800020003000000240001007261770000000000000000000000000000000000000000000000000000000000080002000300000008000200010000009a000600a752c2abf4af6baea4e7b02c6fe46835cb4ada0fb10ccf0bc947186cb166e79036976244de4c2ceaef0651787a64d4fa8d21ac6192fc5b71978ba7b2f4a2e4cad6e089c273c475d208c4f2abd922c368061c1cc08a874764a8c0bdd5ad406ac858baa8a3adb273a2b2f350c2d50527cd99975dce34c3bc8e6569fcb0b1b5226f33c6ffeba4fd4024a8bf7cff895444fa3676ea32044500000c00070000000000010000000c0008000100000000000000d00012000f00010074756e6e656c5f6b657900004800028008000300ffffffff140005000000000000000000000000000000000005000a000100000005000a0001000000060009004e22000008000300ac14144108000400ac1414aa5c000600df7d4695fdee5e7f0b9ebeb7242e8dbbd55b54f847f42678bb4dec0b1a17c5aca328721e00783da1e09f7eddeb310c6a6ca08908531cf956a7be57133ab0ffede918cff50f9ce085c7aadef0d2c5721cb2db460f42cb5d130c00070000000000010000000c00080000000000020000001001180008000100696665001c000280060005000010000010000600080003000900000004000100d000060040a5be87c306f7157c4e21d2e4983b9bba973a27a1c7da5d103e743dbe4db9b09a27a6723a3d57540a1f50f514ae673e8f2a540f227700291eb94e698ca297e6c2f1611bfd1af2d21b4ca5bd8ddcfde2d12521d1c7879215864874625c856af5eec1e1775ddc4820d636ca1f0dd17b6ff1aa13563ad3127010f539f3d40ee3bf5b009c19a71eb3462cc9dabb1bf1aa3037f5e63f2d5d22a0adbd0a6fd6ec826acff1ed379834c2145003017b87bc86b5d839a353542e699941ba2e5b9d488398d2eebf0c7ece49c3d1a748700c00070001000000010000000c0008000200000001000000ec0014000b000100736b626d6f6400002400028020000200c0000000010000000400000004000000ff0f00000a000000000000009f000600447acdadd21479658ce6500d685b692ec8a2c151bad1051784e12e3d7bce514f4620bfa51e42a2ad87d80dd0f4f6a6c0a62cf2a457d9973b2884961229fcf8c3488d7eb48d3c83d4a84680f5371302b6401abf96a434136279019903c894e64e4853296fdc1437f13a28058dc51f218de091d94db78080c11db3fd6bdaebb7bf654ffdec779bece2a448674e0207cd52e094dd2fab5ce1f8ce5183000c00070001000000000000000c000800030000000100000008000200ac1e010108000300ac1e000120000400f7ffffff06000000010400004a00000006000000f8ffffff11fcef0008000100070077fd060005000200000008000b0002000000060005000181000006000500fb0800000b000100666c6f776572000004000200060005000309000008000b00d400000031723275b145cef595ef5a96d7774dc798d7f3a6ca62fc51017a642f1c509a6957d8ed10faab9baf07ca0f1e04ae30f361739db6385b6d8f15d5fd558060b86a210405"], 0x738}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) ftruncate(r6, 0x40003) sendfile(r5, r6, 0x0, 0x2008000fffffffe) 14:20:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0185649, &(0x7f00000000c0)={0x0, 0x2, 0x10000, r4, 0x0, &(0x7f0000000080)={0x9a0904, 0x4, [], @string=&(0x7f0000000040)=0x3}}) sendfile(r4, r3, 0x0, 0x80000000) [ 320.659320][ T32] audit: type=1326 audit(1595427628.489:121): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11389 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=40000003 syscall=265 compat=1 ip=0xf7f38549 code=0x0 [ 320.732111][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:28 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x8}) r2 = openat$sequencer(0xffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f00000000c0)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:20:28 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 321.086126][ T32] audit: type=1800 audit(1595427628.919:122): pid=11416 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16011 res=0 14:20:29 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) sendfile(r4, r3, 0x0, 0x80000000) 14:20:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$autofs(0xffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x130, 0x2, 0x2, 0x201, 0x0, 0x0, {0xc, 0x0, 0x7}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @empty}}, {0x14, 0x4, @loopback}}}]}, @CTA_EXPECT_TUPLE={0x8c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x19}}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0xa9}}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x9}, @CTA_EXPECT_TUPLE={0x48, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2d}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'netbios-ns\x00'}]}, 0x130}}, 0x24000004) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) [ 321.340860][ T32] audit: type=1800 audit(1595427629.019:123): pid=11416 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16011 res=0 14:20:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x80000000) 14:20:29 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xdfffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000100)={0xb04a, 0x8, [{0xf, 0x1}, {0xc, 0x1}, {0x6}, {0x7}, {0x5, 0x1}, {0xf}, {0x8, 0x1}, {0xb}]}) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:20:29 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 321.615426][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:29 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x71, 0x101101) fcntl$setsig(r0, 0xa, 0x8) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = inotify_init1(0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, 0x0) fcntl$addseals(r2, 0x409, 0x1) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@req={0x20, &(0x7f0000000040)={'\x00', @ifru_hwaddr=@broadcast}}) [ 321.859375][ T32] audit: type=1800 audit(1595427629.689:124): pid=11439 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=39 res=0 14:20:29 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 322.078556][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x80000000) [ 322.721849][T11454] IPVS: ftp: loaded support on port[0] = 21 [ 322.930360][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 323.330404][T11454] chnl_net:caif_netlink_parms(): no params data found [ 323.588544][T11454] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.596775][T11454] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.606655][T11454] device bridge_slave_0 entered promiscuous mode [ 323.659606][T11454] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.667680][T11454] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.677435][T11454] device bridge_slave_1 entered promiscuous mode [ 323.722230][T11454] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 323.738081][T11454] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 323.781164][T11454] team0: Port device team_slave_0 added [ 323.790915][T11454] team0: Port device team_slave_1 added [ 323.831036][T11454] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 323.838224][T11454] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 323.864622][T11454] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 323.879237][T11454] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 323.886447][T11454] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 323.913348][T11454] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 323.998777][T11454] device hsr_slave_0 entered promiscuous mode [ 324.043212][T11454] device hsr_slave_1 entered promiscuous mode [ 324.082306][T11454] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 324.090009][T11454] Cannot create hsr debugfs directory [ 324.333015][T11454] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 324.378380][T11454] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 324.440217][T11454] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 324.488083][T11454] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 324.705713][T11454] 8021q: adding VLAN 0 to HW filter on device bond0 [ 324.734823][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 324.745129][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 324.763050][T11454] 8021q: adding VLAN 0 to HW filter on device team0 [ 324.780643][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 324.792120][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 324.801974][ T3395] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.809356][ T3395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 324.835915][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 324.846141][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 324.857133][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 324.868105][ T3395] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.876886][ T3395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 324.886778][ T3395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 324.915302][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 324.947595][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 324.958724][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 324.970012][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 324.980898][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 325.014292][T11454] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 325.025071][T11454] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 325.041600][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 325.052140][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 325.061285][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.072112][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 325.081916][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 325.108891][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 325.138535][ T9496] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 325.146529][ T9496] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 325.171472][T11454] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 325.279120][ T9496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 325.290775][ T9496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 325.340684][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 325.350544][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 325.368438][T11454] device veth0_vlan entered promiscuous mode [ 325.378337][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 325.389277][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 325.413800][T11454] device veth1_vlan entered promiscuous mode [ 325.472678][ T9496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 325.483216][ T9496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 325.498894][T11454] device veth0_macvtap entered promiscuous mode [ 325.515105][T11454] device veth1_macvtap entered promiscuous mode [ 325.564483][T11454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.576496][T11454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.586560][T11454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.597236][T11454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.607329][T11454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.618490][T11454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.628536][T11454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.639167][T11454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.649256][T11454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 325.659874][T11454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.674999][T11454] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 325.683904][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 325.693640][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 325.703404][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 325.713769][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 325.740907][T11454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.752219][T11454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.762293][T11454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.772939][T11454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.782982][T11454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.793609][T11454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.803731][T11454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.814574][T11454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.825308][T11454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 325.835990][T11454] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 325.849746][T11454] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 325.858361][ T9496] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 325.868615][ T9496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 326.247523][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0185649, &(0x7f00000000c0)={0x0, 0x2, 0x10000, r4, 0x0, &(0x7f0000000080)={0x9a0904, 0x4, [], @string=&(0x7f0000000040)=0x3}}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:34 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x81) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) socketpair(0x1d, 0x4, 0x80000001, &(0x7f0000000100)) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:20:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) sendfile(r4, r3, 0x0, 0x80000000) 14:20:34 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x80000000) 14:20:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe20000000850000000d000000b7000000000000009500000000000000e36fe530cb7d7f933eda02baad181867514fe60077d4dd90123d3ee7cf43548ee8582ef11dcfe80b21a029a4ce6be614c2c794f72ebf5fe5178947df499a7ae31702c9c2d5a9db90c8c48258f8d702ec1d16dbe82e16cf8db95f5b068a9e0000e4ffffff0000000000000000000000000000000000000000000000000018287ba7d8807c0ee93ea1bb7f00a15deb269d0a91985602763e4d70d404da006a3d6eef8fb7fcdd82eb1e48410d30c03e8f8808a3d32e488c90f3c3e459663575afe03e5593bf2b070053bb29a521b993504cdfacd8215fb7a1dd3dbd500fac5cbf4362655484b4f36998690bb70c377421654ea5ea9e8b2593eca3be6d1fd9167c2167d681226c903fdb7f9576d4621f682695b5d66ceab5ee2e9280548c6f1d621222de8af0aeba09c7a7a803fcd96c2212197752d9caaf1d567b2be5322746c96b03144aff5a76eee81ef590959f3c3778f0208ea4831d980f75fc5366dd002122a38542a8e5e158fff3007a767d194dc5cfb64ccf45f6f35e519ea72251c0ebc6f0f1d7ae8b841137f87aa3169e62be6f27ed5fc1f1355943ed35135fd9ced30472cc4cbaccc865d32941ba271ea3dee3bfecca2e2f871db20fc9394440a467de41da88c0b0635c93454a462cd94f9e30324f7570637b46a1fb9d6f7e3a40407400"/604], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f000000ad00)={0x0, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0xf, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f000000ac80)={0xa, 0x4}, 0x8, 0x10, &(0x7f000000acc0)={0x0, 0x0, 0x8, 0x7fff}, 0x10, r1, r2}, 0x78) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0xffffb805, r1}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) [ 326.566927][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 326.654221][ T32] kauditd_printk_skb: 1 callbacks suppressed [ 326.654267][ T32] audit: type=1800 audit(1595427634.489:126): pid=11713 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=40 res=0 14:20:34 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 326.708830][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r1) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x82, &(0x7f0000000000)={r4}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={r4, 0x3, 0x10}, &(0x7f0000000080)=0xc) 14:20:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000000) 14:20:34 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 327.105607][ T32] audit: type=1800 audit(1595427634.939:127): pid=11717 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=40 res=0 [ 327.238951][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:35 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) syz_genetlink_get_family_id$wireguard(&(0x7f0000000100)='wireguard\x00') 14:20:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) sendfile(r4, r3, 0x0, 0x80000000) [ 327.611702][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 327.758868][ T32] audit: type=1800 audit(1595427635.589:128): pid=11736 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=41 res=0 [ 327.840352][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0185649, &(0x7f00000000c0)={0x0, 0x2, 0x10000, r4, 0x0, &(0x7f0000000080)={0x9a0904, 0x4, [], @string=&(0x7f0000000040)=0x3}}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) getsockopt$ax25_int(r1, 0x101, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000040)=@buf) 14:20:35 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000000) 14:20:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) [ 328.208526][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 328.222285][ T32] audit: type=1800 audit(1595427636.049:129): pid=11742 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=41 res=0 14:20:36 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) [ 328.354127][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 328.555147][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:36 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x80000000) 14:20:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000000) 14:20:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$inet(0x2, 0x3, 0x19) r4 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8000}, {}, {0x8}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}}, 0xe4) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r3) r5 = socket$inet6(0xa, 0x5, 0x0) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x82, &(0x7f0000000000)={r7}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000080)={r7, @in6={{0xa, 0x4e23, 0xa7ee, @private2, 0x5}}, 0x3df2, 0x7, 0x7, 0xfff, 0x14, 0x2, 0x3}, &(0x7f0000000000)=0x9c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r8, @in6={{0xa, 0x4e20, 0x7, @ipv4={[], [], @multicast2}, 0x6}}}, &(0x7f0000000200)=0x84) [ 329.370586][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) sendfile(r4, r3, 0x0, 0x80000000) 14:20:37 executing program 2: socket$inet6(0xa, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x80000000) 14:20:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:37 executing program 2: socket$inet6(0xa, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x80000000) 14:20:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) sendfile(r4, r3, 0x0, 0x80000000) 14:20:38 executing program 2: socket$inet6(0xa, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000000), 0x8) 14:20:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000000) 14:20:39 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, 0x0, 0x0) [ 331.268514][ C1] net_ratelimit: 5 callbacks suppressed [ 331.268548][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:39 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000000) 14:20:39 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xfeffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="6f1fb10063cb2fe05b39ea723e498711da31dc500e5874ba808ec97a365fc71f125bb546592204924b88f70a216b469258f1c2928559ae500df62e39995b5e7fa35c8326d1eae3df8a4699216d9804c42be8ed4181ef4914561c474f9388c884f2ae2e00f04245462ee3abcf3abef70fca76d765eaed750a0e904502d1", @ANYRESHEX, @ANYRES16, @ANYRESHEX, @ANYRES32, @ANYRESOCT, @ANYRESDEC, @ANYBLOB="3be1b4544922470500000000000000893ec5dd3c18e539858e187f5843c82f2d0198ac0dc5c3e51938d1a549f9c097217241c29b35ae9f8da4e32185d170d215f83e5cbdf7cc55a3a3c8f0398d037f991f514bf0def0147f9a50e8dcd8b33210ac66c046986abb303e63497aa062e85844138125cf7dfdedd29d66366f426c3e3dd6c6f053abb1631556a2b7f23a48a3b216d9", @ANYRES16]) r0 = openat$dlm_control(0xffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x400, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000180)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x2000, 0x1}) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r3 = inotify_init1(0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) r4 = inotify_init1(0x0) r5 = inotify_add_watch(r4, &(0x7f00000000c0)='.\x00', 0x20000000) readv(r4, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/176, 0x10}], 0x1) inotify_rm_watch(r4, r5) inotify_add_watch(r0, &(0x7f00000001c0)='./file0/file0\x00', 0x3300010a) r6 = inotify_init1(0x0) readv(r6, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r6, 0x0) inotify_rm_watch(r0, 0x0) dup3(r3, r2, 0x0) ftruncate(r2, 0x40003) sendfile(r1, r2, 0x0, 0x2008000fffffffe) [ 331.720113][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:39 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, 0x0, 0x0) [ 331.890898][T11818] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿo±" or missing value 14:20:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 331.988402][ T32] audit: type=1800 audit(1595427639.819:130): pid=11821 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16079 res=0 [ 332.049360][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000000) 14:20:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x80000000) 14:20:40 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x82, 0x0, 0x0) [ 332.584088][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 332.649437][T11822] FAT-fs (loop0): Unrecognized mount option "ÿÿÿÿo±" or missing value [ 332.763769][ T32] audit: type=1800 audit(1595427640.599:131): pid=11837 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16128 res=0 [ 332.863722][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:40 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r1, 0xffffffffffffffff, 0x0, 0xb987) sendfile(r0, r1, 0x0, 0x2008000fffffffe) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0405405, &(0x7f0000000100)={{0x3, 0x3, 0x0, 0x3, 0x400}, 0x8, 0x4, 0x9}) 14:20:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x80000000) 14:20:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYBLOB, @ANYBLOB]) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) [ 333.439716][ T32] audit: type=1800 audit(1595427641.269:132): pid=11852 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=42 res=0 [ 333.652495][ T32] audit: type=1800 audit(1595427641.469:133): pid=11855 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=42 res=0 [ 333.657348][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x80000000) 14:20:41 executing program 0: r0 = dup(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r2, 0x40003) sendfile(r1, r2, 0x0, 0x2008000fffffffe) r3 = openat$proc_capi20ncci(0xffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x4100, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, 0x1404, 0x800, 0x70bd29, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x8008010}, 0x4) 14:20:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000140)={0x0, 'vlan0\x00', {}, 0x81e}) socket$can_raw(0x1d, 0x3, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000040)={0x980000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) mkdirat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x1ff) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f0000000100)=0x7) [ 334.445192][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 334.551198][ T32] audit: type=1800 audit(1595427642.379:134): pid=11875 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=43 res=0 14:20:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) [ 334.661771][ T32] audit: type=1800 audit(1595427642.489:135): pid=11878 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=43 res=0 14:20:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000000) 14:20:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:42 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f00000006c0)={0x0, 0xfffffffffffffffb, 0x68, 0x40, @scatter={0x7, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/83, 0x53}, {&(0x7f0000000180)=""/81, 0x51}, {&(0x7f0000000200)=""/121, 0x79}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=""/108, 0x6c}, {&(0x7f0000000340)=""/49, 0x31}, {&(0x7f0000000400)=""/251, 0xfb}]}, &(0x7f0000000500)="fe02f5d163acefe38b52cbd70af831865a357847522a8cb9d42b5279da082d24c7aee110058a818e5df4638b404689ca83a96f0783c2e1de0df1604c5ad4fab06e87131dc4a3e6c2e6d91649fa340cec175f207c9aaf55e5aba566041e5158a7bc8d77b3341098db", &(0x7f0000000580)=""/195, 0x10001, 0x4, 0x0, &(0x7f0000000680)}) 14:20:43 executing program 2: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2}, 0x80) [ 335.602216][ T32] audit: type=1800 audit(1595427643.429:136): pid=11898 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16166 res=0 [ 335.625566][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:43 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = inotify_init1(0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40246608, &(0x7f0000000100)={0x100, 0x10001, 0xfffffffffffffffe, 0x6, 0x6, 0x4}) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r2, 0x40003) sendfile(r0, r2, 0x0, 0x2008000fffffffe) 14:20:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000000) 14:20:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:44 executing program 2: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) [ 336.426636][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 336.500446][ T32] audit: type=1800 audit(1595427644.329:137): pid=11915 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16171 res=0 14:20:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80000000) 14:20:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 337.115969][ T32] audit: type=1800 audit(1595427644.949:138): pid=11915 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=44 res=0 14:20:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) accept4$rose(r3, 0x0, &(0x7f0000000100), 0x80000) sendfile(r0, r1, 0x0, 0x2008000fffffffe) [ 337.421451][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 337.491367][T11932] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 14:20:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:45 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3010, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:20:45 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0}]}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000100)={r2, 0x2}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) [ 338.021865][ T32] audit: type=1800 audit(1595427645.849:139): pid=11943 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=45 res=0 [ 338.151586][ T32] audit: type=1400 audit(1595427645.979:140): avc: denied { create } for pid=11948 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 338.186081][ T32] audit: type=1400 audit(1595427646.019:141): avc: denied { ioctl } for pid=11948 comm="syz-executor.1" path="socket:[36612]" dev="sockfs" ino=36612 ioctlcmd=0x6421 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 338.228330][T11950] xfs: Unknown parameter 'smackfsroot' [ 338.250684][ T32] audit: type=1800 audit(1595427646.069:142): pid=11947 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=45 res=0 14:20:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:46 executing program 1: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf) r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000480)="fc0000004900071f8a092504091007090aab93210001c00000000000000000090000000000000000001ec649857f33735ddef9f0c28656aaa79bb94b46fe000000bc000200000300f92fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57e69a938bcf13ddd874c6a55e00000100d073e2ade01720d7fc83ab820f06e500000000000000e58839971592064e763b6f380f5bac2883170e5bba4a463afd00566f91cf94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6ce67b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e0cf19a494c8cf00"/252, 0xfc) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x2}, 0xc) connect$netlink(r0, &(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x200}, 0xc) 14:20:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) openat$nvram(0xffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x600940, 0x0) sendfile(r0, r1, 0x0, 0x2008000fffffffe) r2 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000180)='yeah\x00', 0x5) [ 338.448143][T11960] xfs: Unknown parameter 'smackfsroot' 14:20:46 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3010, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:20:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 338.804439][T11971] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.1'. 14:20:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) [ 338.890894][T11972] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.1'. [ 339.040663][T11976] xfs: Unknown parameter 'smackfsroot' 14:20:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) r2 = openat2(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x2000, 0x1a0, 0x18}, 0x18) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@private1, 0x6, 0x0, 0x1, 0x5, 0xd1}, 0x20) [ 339.144605][ T32] audit: type=1800 audit(1595427646.979:143): pid=11978 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=46 res=0 [ 339.364094][ T32] audit: type=1800 audit(1595427647.189:144): pid=11982 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=46 res=0 14:20:47 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3010, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:20:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:47 executing program 0: r0 = inotify_init1(0x0) readv(r0, &(0x7f0000000180), 0x0) inotify_rm_watch(r0, 0x0) r1 = inotify_init1(0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r1, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000100)=ANY=[@ANYRES16=r0, @ANYRES32, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRESOCT=r1]) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r3 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r3, 0x40003) sendfile(r2, r3, 0x0, 0x2008000fffffffe) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000180)={0x0, 0x0, 0xd9}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'sha224-arm64\x00'}}, &(0x7f0000000240), &(0x7f0000000280)=""/217) 14:20:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 339.712826][ T32] audit: type=1800 audit(1595427647.539:145): pid=11993 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="cpuacct.usage_percpu_sys" dev="sda1" ino=16108 res=0 14:20:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e000000aac14148a0000800001080000ac2d38bc015712e379e07129f5225e3e5d071277ff223669451b402801f37127f158e163e65b7946ea80f074f3966ff2bed4f6e0ce6c2d69b67544e8dbd3913b47c828ff33e95a189d7c8bfdacfa6f2cd0fce4430ba44e4f3ae47ac0ff10434f9a9070fab99b405589"], 0x24) close(r1) r2 = openat$ipvs(0xffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) socket$inet6(0xa, 0x1, 0x9) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000080)={{{@in=@remote, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) [ 339.921555][T11996] xfs: Unknown parameter 'smackfsroot' [ 340.032152][T12005] FAT-fs (loop0): Unrecognized mount option "" or missing value 14:20:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:48 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3010, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:20:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) [ 340.597385][T12023] xfs: Unknown parameter 'smackfsroot' 14:20:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 340.822805][T12029] FAT-fs (loop0): Unrecognized mount option "" or missing value 14:20:48 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) ioctl$int_out(0xffffffffffffffff, 0x5460, &(0x7f0000000100)) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x10, r0, 0x8000) sendfile(r0, r1, 0x0, 0x2008000fffffffe) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) r3 = gettid() r4 = geteuid() ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0186405, &(0x7f0000000140)={0x3ff, 0x8a0, {r3}, {r4}, 0x7d, 0x8fcd}) 14:20:48 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3010, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:20:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) r2 = openat$misdntimer(0xffffff9c, &(0x7f00000001c0)='/dev/mISDNtimer\x00', 0x98000, 0x0) lseek(r2, 0xffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c00000010008506000010000000000000000000", @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) bind$xdp(0xffffffffffffffff, &(0x7f0000000040)={0x2c, 0x0, r3, 0x25, r5}, 0x10) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000140)) r6 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x400400) ioctl$SNDCTL_DSP_GETTRIGGER(r6, 0x80045010, &(0x7f0000000080)) openat$sequencer(0xffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x60000, 0x0) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000180)='wg1\x00', 0x4) [ 341.388623][T12043] xfs: Unknown parameter 'smackfsroot' [ 341.409531][ T32] audit: type=1800 audit(1595427649.239:146): pid=12042 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=47 res=0 14:20:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:49 executing program 2: dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3010, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:20:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:49 executing program 1: r0 = socket$inet6(0xa, 0x6, 0xfffffffd) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf={0x9c, &(0x7f0000000140)="d01c7de0e84d2e0d999a278726312f6fa9c088de11a094907feadfee52c1a3e088b956904f56c2cd1f4b3dce680728c8ca2ac4875166ee59d21bf21ba126fae2995f3802fb37346ba1fc81a9f8d24dfe2657a299c85d1de21cdb98e3b31e973772f957ee770565da2296bb9f248afe8af8beadbc1c4faf19f3b610ab90c361ab057b7dcbd3e5b153533fc7da70e22788cecd1a268b3b24e26544d7a9"}) 14:20:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') open(&(0x7f0000000300)='./file1\x00', 0x1ada42, 0x117) r0 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r0, 0x40003) r1 = inotify_init1(0x800) readv(r1, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) r3 = syz_open_dev$vivid(&(0x7f0000000240)='/dev/video#\x00', 0x2, 0x2) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2080000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@msize={'msize', 0x3d, 0xfff}}, {@version_L='version=9p2000.L'}], [{@pcr={'pcr', 0x3d, 0x14}}]}}) inotify_rm_watch(r1, 0x0) r4 = inotify_init1(0x0) readv(r4, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r4, 0x0) sendfile(r0, r4, 0x0, 0x102) r5 = inotify_init1(0x0) readv(r5, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r5, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r5, 0xc0506617, &(0x7f0000000100)={{0x0, 0x0, @descriptor="fa3225a156acce2e"}, 0x5c, 0x0, [], "f3d0790be1a00eee1daba79bd71c35578e8709c74c2f043fb229dfb0f5fabac8af34746d936c1a1c6fc8c4285d3103c5da84896518e674be44b065a3888ba23ef343367c2812ad2cb662081cae34fe6ba86b726ab916edf7ba8e1aea"}) [ 342.309453][T12072] xfs: Unknown parameter 'smackfsroot' 14:20:50 executing program 2: dup(0xffffffffffffffff) syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:20:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000040)={0x2c, r2, 0x1, 0x0, 0x0, {0xa}, [@ETHTOOL_A_STRSET_HEADER={0x5, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x2c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c0000001000850600c110000000000000000000", @ANYRES32=r5, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x9, 0x0, 0x0, r8}}, 0x20}, 0x1, 0xa000000}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x9, 0x0, 0x0, r11}}, 0x20}, 0x1, 0xa000000}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000080)={0x304, r2, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1a0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xd8, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-*\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%-\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa2f}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']}[\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '{\xa9,:-.%+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '-\xcd$\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xac98}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '}[):{:{[\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x15, 0x5, "9c6279a91ad4ba5e985d146366adca8b79"}, @ETHTOOL_A_BITSET_BITS={0xac, 0x3, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '$^\'+!\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '{/\\\xf0\'.$%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x14b}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, ':{&%$=\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '.{(]{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '*\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, '!\x11%\xfc)-%\'/$)\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xabc}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x8c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x88, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '$::!\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\\^\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, ',}F]\\f#/:(-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '-!).\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '[+--{%%\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffb80000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}]}]}]}, 0x304}, 0x1, 0x0, 0x0, 0x8000}, 0x4040000) 14:20:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) [ 342.756074][T12082] xfs: Unknown parameter 'smackfsroot' [ 342.786070][ T32] kauditd_printk_skb: 1 callbacks suppressed [ 342.786222][ T32] audit: type=1800 audit(1595427650.619:148): pid=12079 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=49 res=0 [ 342.993883][T12091] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 343.074149][T12091] 8021q: adding VLAN 0 to HW filter on device bond2 14:20:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:51 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) [ 343.440575][ T32] audit: type=1800 audit(1595427651.269:149): pid=12132 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=49 res=0 14:20:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) [ 343.550855][ T32] audit: type=1800 audit(1595427651.359:150): pid=12093 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.0" name="cpuacct.usage_percpu_sys" dev="loop0" ino=50 res=0 14:20:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) [ 343.675210][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 343.703464][T12136] xfs: Unknown parameter 'smackfsroot' 14:20:51 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) r2 = openat$vsock(0xffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x28000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r3, 0x0) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000180)={0x8000, 0x812, 0x1000, 0x7fffffff, 0xa6, "6c8b6cea565faf2293414e4b1b0bc7e365a22b", 0xfff, 0x6}) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000140)) epoll_create1(0x0) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:20:51 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:51 executing program 2: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) [ 343.951715][T12095] bond2 (unregistering): Released all slaves [ 344.223979][T12141] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 344.287760][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x10000000) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:20:52 executing program 2: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) [ 344.597131][ T32] audit: type=1800 audit(1595427652.429:151): pid=12192 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=51 res=0 [ 344.616234][T12192] Unknown ioctl -2144833520 14:20:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)={0x0, {{0xa, 0xffff, 0x6, @local, 0x1ff}}, 0x1, 0x4, [{{0xa, 0x4e23, 0xaf, @mcast1, 0x9}}, {{0xa, 0x4e23, 0x687d, @mcast2}}, {{0xa, 0x4e24, 0xc8, @remote, 0x1}}, {{0xa, 0x4e21, 0x100, @private1={0xfc, 0x1, [], 0x1}, 0xa54}}]}, 0x28c) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) 14:20:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000100)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000228bd7000fddbdf25010000000900010073797a30000000000100000000000000052889c616e7ff2e2ced29ab9156424900040002000000"], 0x3c}, 0x1, 0x0, 0x0, 0x8d52761926623afe}, 0x20040045) r4 = openat$vga_arbiter(0xffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80800, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f0000000080)) [ 345.252550][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:53 executing program 2: syz_mount_image$xfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:20:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:53 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x8) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf={0x62, &(0x7f00000000c0)="58e0c71e78cebfb5f4f51483fd188b27292a1ebfb7817fa0a04d8f2e6f8d785a1c8b04be9973d0d634fcd94330ca684dd6a51f2d66ff294de84e3f0558406a52e0cd568342059066beb314b03218857b52d3453ac8f6827e41a90fd959bd5cc3c37a"}) 14:20:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:54 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:20:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) 14:20:54 executing program 0: r0 = inotify_init1(0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) r1 = inotify_init1(0x0) r2 = inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x20000000) readv(r1, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/176, 0x10}], 0x1) inotify_rm_watch(r1, r2) r3 = inotify_init1(0x0) inotify_rm_watch(r3, r2) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000001c0)='./file1\x00', 0xfffffff6, 0x0, &(0x7f0000000080), 0x204028, &(0x7f0000000200)=ANY=[@ANYRES64, @ANYRES16=r0]) chdir(&(0x7f0000000000)='./file1\x00') r4 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000009, 0x10, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_OUTPUT(r5, 0x8004562e, &(0x7f0000000240)) ftruncate(r4, 0x40003) sendfile(r4, r4, 0x0, 0xfffffffd) setxattr(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)=@known='trusted.overlay.redirect\x00', &(0x7f0000000180)='!{\xd7&\x00', 0x5, 0x2) r6 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1000, 0x281) ioctl$BLKDISCARD(r6, 0x1277, &(0x7f00000000c0)=0x4) ioctl$RTC_VL_CLR(r6, 0x7014) 14:20:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x82, &(0x7f0000000000)={r3}, 0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={r3, 0x8000, 0x2, [0xfff, 0x1]}, &(0x7f0000000080)=0xc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:20:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:20:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:55 executing program 1: r0 = openat$sequencer2(0xffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) write$ppp(r0, &(0x7f0000000080)="2671343826b6014580c8537488d8f873230cfb986a1d3b", 0x17) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c00000010008506000010000000000000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) setresuid(0x0, r8, r8) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@empty, 0x4e23, 0x8, 0x4e21, 0x0, 0x2, 0x80, 0x80, 0x67, r6, r8}, {0x2f, 0x8, 0xffff, 0x2, 0x5, 0x7a, 0x2, 0x1}, {0x7, 0xffffffffffff0000, 0xeed8, 0x1}, 0x2007, 0x6e6bba, 0x1, 0x1}, {{@in=@multicast1, 0x4d6, 0xff}, 0x2, @in6=@mcast1, 0x3506, 0x1, 0x2, 0x2, 0x1f, 0x3, 0x1e25}}, 0xe4) 14:20:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:55 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', 0x0, 0x80000001, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:20:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:20:55 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) bind(r0, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x1, @empty, 'bridge_slave_0\x00'}}, 0x80) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) [ 348.699834][T12293] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 348.770325][T12293] 8021q: adding VLAN 0 to HW filter on device bond2 [ 348.828308][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 348.879524][ T32] audit: type=1800 audit(1595427656.709:152): pid=12336 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16259 res=0 14:20:56 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) [ 349.108525][ T32] audit: type=1800 audit(1595427656.939:153): pid=12336 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16259 res=0 14:20:57 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x4080, 0x0) fspick(r0, &(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r2, 0x40003) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 14:20:57 executing program 1: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'veth0_to_team\x00', {0x2, 0x4e24, @multicast2}}) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000040)=@buf) 14:20:57 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) [ 349.672753][T12346] xfs: Unknown parameter 'smackfsroot' 14:20:57 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 350.024219][ T32] audit: type=1800 audit(1595427657.859:154): pid=12359 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16245 res=0 [ 350.058626][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 350.113815][ T32] audit: type=1800 audit(1595427657.929:155): pid=12359 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16245 res=0 14:20:58 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) rt_sigsuspend(&(0x7f0000000400)={[0x93, 0xaf]}, 0x8) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, &(0x7f0000000380)={0x7, &(0x7f0000000700)=[{@fixed}, {@fixed}, {}, {}, {}, {@none}, {@none}]}) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:20:58 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:20:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 350.676939][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:20:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:58 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 351.042467][ T32] audit: type=1800 audit(1595427658.869:156): pid=12381 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=53 res=0 14:20:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:20:59 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 351.721355][ T32] audit: type=1800 audit(1595427659.539:157): pid=12388 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=53 res=0 14:20:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x9, 0x0, 0x0, r1}}, 0x20}, 0x1, 0xa000000}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c00000010008506000010000000000000000000", @ANYRES32=r4, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c00000010008506000010000000000000000000", @ANYRES32=r7, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x44) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c00000010008506000010000000000000000000", @ANYRES32=r10, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x198, 0x0, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2140ddf64581538c}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x80, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x4000010}, 0x4008044) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:20:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 351.979290][T12410] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 14:20:59 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) syz_mount_image$jfs(&(0x7f00000006c0)='jfs\x00', &(0x7f0000000140)='./file1\x00', 0x1f, 0x7, &(0x7f0000000640)=[{&(0x7f0000000180)="1dcb9e7ed40939024dc568a643a7895f777110058d53987aa1add2dd118d1932d482ae8d938ff560672d54335f778b0a4d1968c4a32416a6460cb2bbafe1f1b2c6d2cde7b2101af8c1f2f62471ee59b18ca3d8333eb01edc7186d9535fff287008ce91d374a49e87126de0e787818d6559e65f78096c401051aeb6f83e1926def4c96c4fd0469b8a1d5790afdbe19aa21e612a3c2a767660ad01b005b49cf3d7d594e28df96e70fe1165bdde52650e5e", 0xb0, 0x7}, {&(0x7f0000000240)="3e2dcfe35fbc5f55f97c31cb1b213880828b03698b5f10259642648dbdde230dae985a27d71b93ec2e9e3b9f2440d522586325f7ed14689de0b52ce7bca254dfb7f34bc20f6eb4", 0x47, 0x1}, {&(0x7f00000002c0)="a1e0d5042080cd1d3f6b8760ee134afef905eb1221d52d545d6fa9335d22b2ae9dd00f61904984733a44f421d292a69ca4db68004c7a6b530d33b4971ce60d9b9d53764f51382b3fe23afba6ae408e04941c10", 0x53, 0x6a1}, {&(0x7f0000000400)="fbde4fe396fd5d02bb667af8d414c2045ebe269638daefa021f5d61793a2953607292ff45ad4b918d155c5bd93fc583bf4d366cdc88cb7c5b4cf6ef6cff2980a5179ab516da367753adab12216a6a28ac5d8d20e2e2576482fe0ff68e68a4b1820713b26449b768d0ddd7317b1dca7fbf19caf9cbf573c46ec4b34e5d9670b306b38ba8cfcccfd233cf96746be93d86bab1235e6f007b7544da91daf5041a62815ff16a2776a5738a4d384b4c77b8efcbf01d399ea8eccd999025da61a915dcc7d9e4231c3da404b9b132097b64e893f92a6fb22aa19f6f83e6e863638a5c4c814cd2adb14426f", 0xe7, 0xfffffffe}, {&(0x7f0000000500)="9357c6452d14983e966ad53d48cfe88e156f6dee5571ea95d8a46939570a612df5d8e06cb429c8cf50074f490a770b2da0842191f4987eea5f5fdd08806d74ee0a02c6a14d80d9a6b087a6c69368bd4c4a96f552de8f1ec143e7c1b3058215cf1393936aa682d3c3fe5a9cc1e6f04718b07206d1b32fb0dc92debb936b55ca0286efbb09ff6c05f2c66443dbe3c1bb01ad4fcc62f7b773435dd13daa6cfa5a87b0403ff4c2e05e77b566b266fb", 0xad, 0x5}, {&(0x7f0000000340)="332bf9b2966574b7e37026d18879f1cceeba230e4f659d6be8052ab7f40ee12cff0fe7e7eee3f53bf8b34a3bb7ddcd461f627f3c4f5b6466744ba143a47d40b5e67dd96c274918ab48298742d9a4bf31eafcb522441442acb00d28c834f346da8f2c0d9e2aa98cab6b9c2c583748cd8fa0030ebaa53935b3bd", 0x79, 0x1f}, {&(0x7f00000005c0)="cea3385153c9b45d843ee137a0079e8f35d260afb01634c04fafeab0b006305214f6b785293207971eb54828e6d8e8dbec217daa61ba871945192dd1ba29a3807273e5f331b45488867d1fdaa2fb2b87", 0x50, 0x5}], 0x40c1, &(0x7f0000000740)={[{@discard='discard'}, {@resize='resize'}, {@resize='resize'}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}]}) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 352.166891][T12410] 8021q: adding VLAN 0 to HW filter on device bond3 [ 352.185374][T12415] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 352.275269][T12415] 8021q: adding VLAN 0 to HW filter on device bond4 [ 352.286098][T12443] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 14:21:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@uquota='uquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) [ 352.596970][ T32] audit: type=1800 audit(1595427660.429:158): pid=12494 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16274 res=0 [ 352.604157][T12410] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 352.629548][T12443] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 14:21:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 352.684639][T12443] bond5 (uninitialized): Released all slaves [ 352.727762][ T32] audit: type=1800 audit(1595427660.559:159): pid=12494 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16274 res=0 [ 353.071332][T12504] xfs: Unknown parameter 'smackfsroot' 14:21:00 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a45322, &(0x7f0000000100)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000280)={0x0, 0xc0fc, 0x2001}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r1 = inotify_init1(0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000100)) readv(r1, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080)=@gcm_128={{}, "ed20ea5dc07ea51b", "8b84bbf54c7a126b906c1d0525318b00", "8925c1de", "b381e0d9d89fe641"}, 0x28) inotify_rm_watch(r1, 0x0) r2 = openat$vhci(0xffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x8fac41) r3 = openat$vcsa(0xffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x400000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r4, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = inotify_init1(0x0) readv(r7, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r7, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000001000080000000000300000000000000daa2490cd3d4de3b0f81165f649f827e522a5016f3ae11dc7139f4867c2a5033c1fe96da360c898fe459acf0c713446d25b522ed77565e2de66eb59e9cc19d67ade33025fceda5d23c8e2d617164", @ANYRES32, @ANYBLOB="00000d00000008000000f800000000000000000000000000000000006dfb3366d691b2202b347ee2c728c84ff3d53e581347585b821d2dcd8a9056322f87498e72ec72ef50a5cc404806c40f04000000a80225f15a67795c4b8143811961a6ae0ac33729f4f2cf42d3fa5bacb3a1db81b2ead69fee8a9ab291e2f1b4656f7a3361cc353083a6032110335f7ccc3391119627cce8683d4f01744033b25142df20fa96d48757a01f44d9773a7b16417d877a275143032972cf0ea591384f4c458f5116f02ef06098d6e336e275c6f06f3f418152b498be87af71ba", @ANYRES32=r6, @ANYBLOB="0000000001ee0000000000000000000000000000000080b360e77e4c", @ANYRES32, @ANYBLOB="000000000500"/28]) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000000)) socket$inet6(0xa, 0x2, 0x100a) 14:21:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:21:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 353.768056][T12523] xfs: Unknown parameter 'smackfsroot' [ 353.786137][ T32] audit: type=1800 audit(1595427661.619:160): pid=12520 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=54 res=0 14:21:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:01 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) [ 354.095456][ T32] audit: type=1800 audit(1595427661.929:161): pid=12520 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=54 res=0 14:21:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r4, r3, 0x0, 0x80000000) 14:21:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x1000, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r0, 0x40002) sendfile(r0, r1, 0x0, 0x2008000fffffffe) [ 354.385953][T12531] xfs: Unknown parameter 'smackfsroot' [ 354.611629][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x18, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x6e0000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x78, r5, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3f}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x401}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10001}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000804) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r6, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r6, 0x8008ae9d, &(0x7f0000000280)=""/173) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r7 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 14:21:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:21:02 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 354.950477][ T32] audit: type=1800 audit(1595427662.779:162): pid=12546 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15810 res=0 [ 355.146735][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 355.296262][T12558] xfs: Unknown parameter 'smackfsroot' 14:21:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:03 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) syslog(0x4, &(0x7f0000000100)=""/188, 0xbc) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000046000000657464657673696d0000000f0002006e657464657673696d32000008008e00070000000c008f001fffffff000000000c009000000000000000000043a01515c991"], 0x54}}, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="00082abd7000ffdbdf250a000000b169e9b946b12c34ce59c61a68ed06b855566482ec56470c9bc51782a75b9ac432d884df5cf1e1a85f670f4e58a71735"], 0x14}, 0x1, 0x0, 0x0, 0x4048}, 0x4000) 14:21:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000140)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf={0xffffffffffffff2b}) r1 = openat$vicodec0(0xffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@private2}}, &(0x7f0000001800)=0xe4) sendmsg$can_raw(r3, &(0x7f0000001940)={&(0x7f0000001840)={0x1d, r6}, 0x10, &(0x7f0000001900)={&(0x7f0000001880)=@canfd={{0x2, 0x0, 0x1}, 0x3f, 0x2, 0x0, 0x0, "14b178c7597b39dcc7d621999386522656f93d5848aa44639eb7350c737c916a20daf7fb4ef7da47f251caa93b826bdfd099c63eb68fce74029c496e401a06a9"}, 0x48}, 0x1, 0x0, 0x0, 0x40800}, 0x20000840) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000080)) 14:21:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@noquota='noquota'}, {@uquota='uquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) [ 355.742001][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 356.093363][ T32] audit: type=1800 audit(1595427663.919:163): pid=12581 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16254 res=0 [ 356.156574][T12571] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. [ 356.275581][T12579] xfs: Unknown parameter 'smackfsroot' 14:21:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uqnoenforce='uqnoenforce'}, {@uquota='uquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:21:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:04 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x24) r2 = inotify_init1(0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:ksm_device_t:s0\x00', 0x22, 0x3) close(r1) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 14:21:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 356.472964][ T32] audit: type=1800 audit(1595427664.299:164): pid=12571 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15793 res=0 [ 356.509017][T12571] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.0'. [ 356.792142][T12591] xfs: Unknown parameter 'smackfsroot' [ 356.823662][ T32] audit: type=1400 audit(1595427664.629:165): avc: denied { relabelto } for pid=12586 comm="syz-executor.1" name="RAW" dev="sockfs" ino=39146 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:ksm_device_t:s0 tclass=rawip_socket permissive=1 14:21:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uquota='uquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:21:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:05 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100)=0x45b1, 0x4) r2 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r3 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(0xffffffffffffffff, 0x800c4151, &(0x7f0000000180)={0x0, &(0x7f00000013c0)="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", 0x1000}) ftruncate(r3, 0x40003) sendfile(r2, r3, 0x0, 0x2008000fffffffe) 14:21:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 357.323592][T12604] xfs: Unknown parameter 'smackfsroot' 14:21:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uquota='uquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:21:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 357.923643][T12621] xfs: Unknown parameter 'smackfsroot' [ 357.942939][ T32] audit: type=1800 audit(1595427665.779:166): pid=12623 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15828 res=0 14:21:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x7) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r2 = inotify_init1(0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, 0x0) r3 = pidfd_getfd(0xffffffffffffffff, r2, 0x0) r4 = socket(0x10, 0x1, 0x3a) r5 = gettid() r6 = socket(0x10, 0x80002, 0x0) r7 = gettid() sendmmsg$unix(r6, &(0x7f0000000a80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x18, 0x1, 0x2, {r7, 0xee00}}}], 0x18}], 0x1, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000000)=0xc) setresuid(0x0, r9, r9) r11 = socket$netlink(0x10, 0x3, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000030c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)}, {&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000180)="bb2bd3dcaf895829fed1b6c4eab0c3134f4f4feb84fc881accb97bb974ac5114692f5f5aa8340e7de1ee4da2d1e6ed8cac3b551da6368c40c47a7b777b694e9a12f2583ed05f237a228739dea20b4eaeed36e20bfe941408eb546b0f52cb7b5249b48ea2d1ee3c22ba0ea94bce14dc52d28838bcb387cac0c9040b12e9827d6d0591efe81c9a3ef0e323d95eb6c1916e5cafedf370a2d1245e9fcb81377ce3f09c54fed7bb83803269e6ba81a2ed0dd14341479c86fac88b5b3cce0652bb3c7c35811a991c452185c520f00100ca1a4dac4078a062812a5e6f187a089dc07277a9418254dfccded201e6d165368a4bdbf9ed0f97aaa65e827dcad5e920f0", 0xfe}, {&(0x7f0000000280)="8e6926ecdec5f386d761941a52f1d4c59cde1e2fc1fd79a917eed6ada24b47b9129ab1a82303a605dadec1", 0x2b}, {&(0x7f0000000300)="da5b6c236d5e8fdd652e64cfcb93c5a4eba6c03bf12b85019dfb789ac03394911eed09de59aef235962532cc85888284318230424206545a59f4120c7c97c15c43180a875f9ba2193adbae3d2e5fcd30990f6f680054ae1bf9a66bba6b72144296704ff38670113da0113b338a5ed1ee018786f84ddfdd565a15993cc221558a0000cb539f6bdddfc344c2cb507b29a1186e571f93f62904fb8db150e3519eeb49db977906ac02c5e9edbd638c9c369fd58666e57f58741974a3f8aa6409e74fc422347f4dea", 0xc6}, {&(0x7f0000000400)="3fd55b8ab1df4a2f4ecfa55482550d05f0d494e6f5310598e3141fcd42e2da7b54b84d09ea0922147dc60b285cd552fcbc829785769c39a9f2b24678c4d88a039a80561e48595caf1a7f9fb23bb25e81a81287", 0x53}, {&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f0000000480)="28ad7a01be3112188c135ac9081080b29bf3b5dcd128de049db757b2e524ec2cbd4b2b071d1607bc139b345b8ba13dfd196ea018354126364745aa73477001c09e256bf19f194943a0033d6deab86effc476271d1763c0f8c2626817c9b6c9058c11cc6a47ba601e911cfb7382a4a10d0cfe423b48be9c8b5ed6798ee2bcbb7d7bb1178bcbf87555d481be281567715d4db813d87bf9a2da8acfe6230e792bf777257413d732d39697722cab1969ac67aaaccd430d3add4d06af23debf7464", 0xbf}, {&(0x7f0000000540)="b1483a268cca63311fa0d75d36d3f6884f0e9d46177e8d517198753c65d2eb46ba38b5a07b668d0310fc6860b30ef1e46222d34bd0f4ab496040c0376e28cac5036d7093291d1784de41b16b0f7fe35a418050bbed2da2e7aeb4e335e254e27fd544aa2fc7ea665aa3495868f52f468d50b22c05b670329853599c28cf791b8e5e88099f7f7b7fe5dcc621c730d7e16c1add9f9dc3d15d0932c8e3f62a80f64081a4255bc47d19abaed36a4b83", 0xad}], 0x7, &(0x7f00000007c0)=[@cred={{0x18, 0x1, 0x2, {0x0, 0x0, r10}}}, @cred={{0x18}}, @cred={{0x18, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x18, 0x1, 0x2, {0x0, r9}}}, @rights={{0x18, 0x1, 0x1, [r8, r3, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, r0, r4, r2, 0xffffffffffffffff, r11]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8, 0x8000}, {&(0x7f0000000880)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000900)="43a8132a03594d9f524e752d1e559e98", 0x10}], 0x1, &(0x7f0000001cc0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18}}, @cred={{0x18}}, @rights={{0x10, 0x1, 0x1, [r8]}}, @rights={{0x10, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3]}}, @cred={{0x18}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff, r3]}}], 0xf4}, {&(0x7f0000001dc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001ec0)=[{&(0x7f0000001e40)="32864dbcde2960640d9284c61ed1efa5943c84309cc3ec54c4182a1b1019f1f7e3190bee1e5a548b77cb06ae7c470b32a0d2ba59d8cd4ea3e5a0997d7589659475c3f6a02dd6ffe84a56dc22554dfa6876aa61e05c4194cfcfa3", 0x5a}], 0x1, &(0x7f0000001f00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x18}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x4c, 0x14}, {&(0x7f0000001f80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003080)=[{&(0x7f0000002000)="a79d911408847500403dca2255ef29665e52e3bcf5dcad75095d348561e5404cc6760d171d8fcedcb12a26341eb022a15e733eb98962765d70241238a6fdc1dd9b5457c5c33d94cd7ac15d89f124b2bb4dd5d83ff17d929dd730b5", 0x5b}, {&(0x7f0000002080)="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", 0x1000}, {&(0x7f0000003980)="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", 0x1000}], 0x3}], 0x5, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0401273, &(0x7f0000000000)={[], 0x6, 0xff, 0xa14, 0x101, 0x1000, r5}) [ 358.205876][ T32] audit: type=1800 audit(1595427666.019:167): pid=12623 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15828 res=0 14:21:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@qnoenforce='qnoenforce'}, {@uquota='uquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:21:06 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = geteuid() syz_mount_image$f2fs(&(0x7f0000006dc0)='f2fs\x00', &(0x7f0000006e00)='./file0\x00', 0x8b9, 0x2, &(0x7f0000006fc0)=[{&(0x7f0000006e40)="495bc16aa7877bb1cec5c9a8dcc24740a9ccaaf520087088a013aeff5acae2d3071b843fd6a1d852db7ef18e3e6421e57b9e08431a6612d771a75fd9af64dbaa8baf96a12ce99532e4162ecd83c447ac1c5633fa3b1ba01c4ac67a3b42f401574c2764f90fc9dc88b701cfd5044c1dc6af8803e0b90aebe78f8627573fc0c024133d8f764e2cd6280151712562bc889fbac3e65889a56914075d54d70cac71c01f783bc64a81ae7a50", 0xa9, 0x5e}, {&(0x7f0000006f00)="4ce0957f5943ece37b8c621f1e2f43a8c272c483c0f339eba8992cc17370f1dcdf5e9663ef987456ca2e73598712da17f2312b459c164eabaa400dcb66bbfb909e6834c59c8d1527f4cd7f46ba5ccde52cdefdcdbed1b2c6d56a45ff68b32ad0eccc6a53bf326aef1104336e7b03fe7110cc7200871fb0cdd877b554c2a40b886940448522d61a55f8cb42a82f7311dee2454d4cdde1682213d6925c1951cd587f4ae30cbc462d7b64bdd6335c79f784b737ff99a8c92250f729c2", 0xbb, 0x80000000}], 0x1084000, &(0x7f0000007000)={[{@acl='acl'}, {@heap='heap'}, {@alloc_mode_reuse='alloc_mode=reuse'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '{!'}}, {@subj_role={'subj_role', 0x3d, 'cpuacct.usage_percpu_sys\x00'}}, {@subj_user={'subj_user', 0x3d, 'cpuacct.usage_percpu_sys\x00'}}, {@seclabel='seclabel'}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, '+'}}, {@permit_directio='permit_directio'}, {@fowner_gt={'fowner>', r0}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000000500)={0x6f, "24947b00de0de43febbe75870221032a9cbbbc0212d7c4df7571e59dc1ce94516df0cbb0aa0f643084f0913c4070afb8999213f35889815ba209904f2d6d29a6798fd9f1398ea695b351f228465f07eec8c6061057ccce20ce617b0822ef948745546f4b5362d8d83f37806bdbcfcf7878ebce44690b57c87df96b60d57847c4"}) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f00000005c0)={0xffffffff, 0x6}) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c00000010008506000010000000000000000000", @ANYRES32=r5, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) sendmmsg(r1, &(0x7f00000012c0)=[{{&(0x7f0000000180)=@in={0x2, 0x4e23, @broadcast}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)="b599d41de9f00e99e4579ee48214d1", 0xf}, {&(0x7f0000000240)="b7c14bfdefea2da222c4866f6e2391d74e151b6a74a0d574a8247d89489cfbf5c0acb0f0cf85fd7187b9735f8b5c38f46f13fee997098737eae0029e4c422940d398a170f0f7acc09ec704a609ff20682948e6e2bf736614620e4790866c346a09317bdbf996381e8166b40752d4b5852f371a7b59f7f37e876c7ab149bb83b4dad9f6638c84a82d2422d68fd0cc4fac5a1c5a829935760023e8cd5d3820c354c27079fe87411e60f1351dfca5ddb71b7d1f", 0xb2}, {&(0x7f0000000400)="592db9f825ee7eba11da64b0b8ae60e0ae665b3115d7184c52c46925ac3a2372c4f8c147052593b43f078caf034e9bc8bf343d22359b1e66942c9c4dadb0c1bfff28960761b69c6bd08208c486f4bad2cfac40ac0adefb0c4ca9309cd52d28fac05a2445ed546936917a19d9c588c14e1da3f8330d5b15dd5a60ddf4717e4653f0077b5f82084293283c45bb0fe75692c348175bb3c33bb77752f0301fd4a90123e96b7d5e99de4532983b12df430d0701506a25ef6e9f35d3cc60cfdb49e4f10742ddc6af56e08aec23e31d4ba0e8b11a34405dcf447a11caf15f869d539a086705d49702d88bcabc92c46ad332eefea4b603bb3ea27e79", 0xf8}, {&(0x7f0000006c40)="58b25de0fe9f5781488145fca8f33cd254445c505283daabc97ac308091d0bf38108fcf5c425cbff8b449985e7a6e458ca774000ffd404837d9b100689a7616a3b7b8377e2d393d5f86f3ea6143bd787bad3392f22871cfe3d58dfa713bdb5a17b16c047d7e1f4d03bf2f616085cb8f5e0dc745b16db1cbed1178d1551d39b945c7a90683b163fbc84e939c6d442e02195cee7ec85516837241042a35148c11063a400f5f0771be6fcdec8953ba12909b27b0cc3942ec60c2f04cd0802d60ae7502d4ab7aedc75f88fa378b73c31c98d0d80cb1969ef78c9973a0fe23dc3e093f71b3538f239521f205f6e90bd5144dabbb3c93b13c57ef4ee27370c8ff9512ca08d920b3032e83e98fcb4b70989862e843f027659f88861d852763fb7dee863abfdb92a6728804220390134177cf626557d80bace9315bdc3cfd4853ae35e3c88d37550af0bc4972d6bdcac8daaf8774a0f9e5d84924390bf9316dd54af3a2b72549b9f91efd0770757736508d5aeb1b246", 0x172}, {&(0x7f0000000600)="f7270d4391b428a39b9ba8e18beb25bb0c51b5f16264b9181203cf28ebae449b1fd48d577637bdd9e8fc8997d05d796c0a6fc0b54745016217442c0dc48cd2e5cc776c897a6d53f02262d4695236533f7424f9d93576d4286c4af848264dfc23dab57a0ab90133840a166ce483cb5755a739bb3189504014242bd699b8ed2165592977a0f53e3c25e6120a4369ccc6dea11a00e6200e9c64c3f6aa4155595f4a97aa155828705362f11f08a05a01de2ece4590a6ecade86f98daacad73d3518597575ed2", 0xc4}], 0x5, &(0x7f00000013c0)=[{0x100c, 0x109, 0x4, "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"}], 0x100c}}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000340)="fc271d87f03e0766592d6b1679a429b07de3ced73334a297e687f803c953df9329b0b55298280c616805e51e1b0c3dca7f6b637bd56b58f2d8b0b1cbfa960cfebdcbd540fbd01029d04453c79de5465070dc5ef5ab9de28aff75c8f9836769bfd1f68421de683b013750721b580a416c6008363309b0c8262314eaece8d45653", 0x80}, {&(0x7f0000007100)="c02e6b07b8a1b854d3a6343afdcb3ad45e2f33160bf787fb5a21387781a1b0e4a547580b", 0x24}, {&(0x7f0000000740)="067569e3066c7d19c088c600134051e1d7959b00c5a3b131ba4f67e892c8ef68bebe56b9dc84960ef0f3b77e2a3daa4cf1168b3941c4c885eb7162eccb7ca39cc564b672cb2043d07bef0b9cbd9df8", 0x4f}, {&(0x7f0000002400)="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", 0x1000}, {&(0x7f00000007c0)="7867e8ca4caf77820dca7515aece8b52ea5345556b1753d192e2c5410b35e381032a78bb4e8f458fbccd306234ae6e33c65bf3e02b2094bbbb232382b1e219825451cac11d84ea7f558f02dfb9c91044a94be3c5618c5f264d2235319bdcbad14091c5f226e09e72d0c886fafd72ba4f886603ba286acba1b00466748f591814be1d13bcf4c78470fb159ab1523e9576652abe726c03376afc5cb508771f879956e72d0cc846642a952e5dbc84e0af", 0xaf}, {&(0x7f0000000880)="2620eacda8770bfb8cb7381ed57f47d1adc0f8bc2aae01de442e6cf7a237a73ebfd1c1fb4b6e25cdfa30d7c306f3f2def9714fe049c0ad1dd54b1a8ca73be2fef91018846e54e82a45313f07e1ec07ba30c8e7908f1a9719479c92013e52a2863cd21be7ab17d91940d03cfc1002cd638081551b0549aeea2fd15b75b7b85dccf00eb2310c7c3c", 0x87}], 0x6, &(0x7f0000000980)=[{0x7c, 0x11, 0x0, "8622bb14b2ce415f680b257fd1727c69ef75f0197161d1bd2acfff32d4714a31910ce76f4cd347bd98267212630644f33bb640e30a3a9bfbb729469c20ccbe3372752f6ff010515264a5b5380535950bc104756f896cb758676f82390af4b494491bd08708e7a4d0f18d9d77fde0"}, {0xc0, 0x112, 0x7, "52a8c802c84bc86c749a59bfbc469fd96d090618579b764d798a571aa74e80750bf50c828dc4e4057281ca75e450cfdf8be5b287d9e58dfae97bfe8ac73b598ff695646fb1ff52dfd158bcfaca9cd249c7fa3c88bdf33dd30bb2bbe27631a7650136b66bb7d90dd079dc0d18d77ce8f80599baf90fa31d528d42a9a7fda88807a576ebe4df90e94bbd873f4502e75b2e180ee0720d4a1e22f4ecfc40662e20305d0f1523448840899e0324eeadb157082a3e9b51"}, {0x54, 0x0, 0x8, "3fe80a2f7e84397c4ced52ef2d9952f1a2f36bd4b8f67ffa23ba7f8a1794784e4336c79d10bb66ff6c8013ba963e05b8a4c35ea1321f626924c005d9ce7dbe2e37f605679eb1"}], 0x190}}, {{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="3a3465dd0222cc6667e51585408ff0e4956e596d99de6fe36f31d7c9077984e387b3cfb0c69ffda54bf3b09a8c2b6a9d17f8d3a1d5b08e49173aaefad05aa26186f9177e74786576dd351c72f80e0980599b3ff909caecffa27a488eb4381e79d789dca6086b6bf5", 0x68}], 0x1, &(0x7f0000003400)=[{0x100c, 0x29, 0xb8, "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"}, {0x90, 0x108, 0x9, "04acdd0000f70a75908b51c3d2aef8d52b6f5149321e3fbb19a0418c6ed93a633519ef96755cb26d608afe02ea0a4e443c4ea6d44a9811035b6887884d492e658b6381a71ecb265d700bfd3f50d9c4b7c68b532502c535b020c6c91ed10e231474733ab1f831c98ca92e038d9b1763f72c102faf27d4749a38cde740df3aa6ab05a68b"}, {0x64, 0x100, 0xa470, "117fbb78c878bd6c58cae0fa6ab7470262f4a9af5f0c8eba86c946cfc5a96b99d8131db6d5eaf20e92af6c0acb1fed9eb86700e921854e182bf17a442670d5a6380b67c2541e801debe91909209a575ffc960bf539843d1a"}], 0x1100}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000c00)="7b76ac950820b8ac85", 0x9}, {&(0x7f0000000c40)="bd7631392ff4c5e0923c45e5e9ed08a302cbeb74b94197cd", 0x18}], 0x2, &(0x7f0000000cc0)=[{0x78, 0x88, 0x8, "662771dbe7a9958f6f03aaaf5a9d7b6b2224bf0646796b88687a9923a759b2c28d65184b39b1117f7242d5bcab3fdfcf12b68f8ad248c9f95c4293836af8a71f191cca0c5c7e1d8f5b9099ca6b135bc668e64da706c4a80dbd8b09983b852354366a4d3b573348e9e9e3"}, {0x64, 0x115, 0xfffffffd, "c3c68f41fcc7c5914a243d97cb3bd2fbab6695f2d3fa59b25532e41abd05d6a240175c1a090c0221c75a51b3c9c9cb16f3db4cd478bd09601198dbe379adfe346d118a45400adbe59eda34874d3f8f2a22f8a91d2ac4e3"}], 0xdc}}, {{&(0x7f0000000dc0)=@nfc={0x27, 0x1, 0x2, 0x3}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000e40)="5ff7006927876a229123200b9b4dab44958ed6154a809443dea01df491f17fd0700ddb00bcce97da3153db842820579680dea7eb655b9cd3dfd1ffb6e3a7db3c240ddda03c65f17525792a0a0ce4b855ed9854eb35c2e37cf0b68f81ddbd5a85ad05653263cdd38f6a66fc2a9c3a372f9d1c08a3a57691df577cc204b8310997bc8df3a289ca5fa3dc3e97d46837a451716ba4afac86d453", 0x98}, {&(0x7f0000000f00)="f97e21369a3e3b189f5502eac9ebf13d97305b865bbcf1cc67d669a657556efd086ccdc18b1d96a71a85bf8762e278f0a08a8d131abcb89d43", 0x39}, {&(0x7f0000000f40)="816f1e80af1951997c5d8e36291ccc33450609b858a3df6502e80abf4e5d7f03477bd24c8f6adcb03e8f79911d97b039ad1e318cb7a2ac6f6647cc01cc891526228a910c4290ea65d6360fd3fd861f26cd4f46627113110f6bb98916fb9a132d93713c481509663aa9bf8a1c8ff5e1d24868e8f2b86369103154e1840eda6c59b656b8b670eff5d1c0f9ef64405fee037a49caa4b50ff993aab9d0e61e31", 0x9e}], 0x3, &(0x7f0000004500)=[{0x100c, 0x103, 0x7, "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"}, {0x44, 0x6, 0x10001, "ce1ddec4c0f708b861b20e617b67a1684d933c0ef1ee12fdb40ee3987e666c11d2fb7d126199ae1b547213b950d8476c03ee0cf9a7d5b7"}, {0x94, 0x103, 0xaefa, "6e50b91511cf9ee48200cb2b8b96ad220fd8b11ba37aee5a124f8cdd848b0af1e42d789a16fece6ab2d2d34462efe6082917f433da3f9a0528cc0b5e9797e20fabb35e460f504c1d53d90d4891737263598e0086207932fd38d01a940bd782af19dc736203779e73b6ad95720fd83ea0a714b8cf835eb98b0303da7d0d380b0b5b4967249d54"}, {0x100c, 0x29, 0x101, "22291e68eb3f03b058a21a549ffc0ba67454ee3580711e2a50bfc21e85ca548b4943a48322db0f875957f5c53abd740b92ba673777e5833d34d5eeee33ab778b51b1222caf35d5d3a3958d6c28cd7e29c0ed532d09f1c4e8d3f048c9d3c306037ab479b0d158ae7f49df15056d18e85fd571a0f2457da9b181fdd43675d82696f222421f76409f9b1acc1900134324203bf9909d22a6a75bfb7225a293be12250cd68be7777b06cd4c375df55c971219d5e8de87a0180a79b8c5cd44e5f316d7872f997775ecfbf8236f88357097a4e32f74ce92cb179dd2beff31c02d14d73080274b46e1b4bd390e6d267856843bf00bfbb3c11575cec86febcf699c490bc8aafbf91e44759d547afbfb6fe1f30efe61fb93d26ca9ec65f2bba5ee5f91b0d3559c69e251f2c40bd66d82bc387027f5fa6db71f969fc8e397271b4ab96311c009306086e650fe4889065758a095d9c7bc8def2776f768820962f4259dd77a7ee39082bc8b3d803bbb524864c7a4f24ddc32379db8a1c9be785a0901043ec1c8d4ef2383297c3de17f9fdb98f76ce1dff8a530a39adde208e8ad0928f2015622d54add281c8813b92df6f037042c6c2e797fe9453850c372d13b43579d314f94142ba8c6523cfdc79e254c15cb5344cfed98ff385bf8ecc624af0536577f6f56ffd3efbcecdd6629af428b3bb112424fcb972519b19387907d715d0c80809b2f24e63a4ec63e42d9270782b17848fd690eba4b463c974fab9c0c6f6ed23b820e858174c5d0a47a07f9fe93289d796d243659130855079f5a7de645c15ce085dfc47dcb70ab9aa3a361a45f275614ac79e5a6847910d2660f880f3576402d99fcf1dbf5da6679a8c12424b79321a97eefd2d2c5032eaa67d1fa7e71ce2f1b303c9080b55978c72922166d2043bf784a53823b269a69acb971b66d8d0f446ef832901bd1dfd96fb1869e761931f5712b160f2877e619e171e6aa76c0c3fb0a2fe7e3f22fbb9de6cf0c51e740b06f85912506b41eed44fbee7ec4725cc2eef2ea37f12fb77579fa9406933eaf197a7ca0ab4f8f7011639438619cd5e51efac4374f26577e9c94b761d3c8db66b9a493997118026eda67d1b7fb9ff54c67a48e1f8499a831c1323890721a2541df05761eb28353133fdd6d7638072bbec13c75a9ee4b819ff5bc1341adc8a35e9c4598d090da783fe1e67962128e300efb7061dd5774dfc5c8efad26e00a847e17694e2bfaf785ae628453de9a7dca121625d27cd48b3cb417f5f2b53e3e7d3aaa3e56102ba948a04cf941aac04932b8d9a7d0395384e3c10deb67f443780dc62da51d36b5c07f4248d741f2bae8929bb70970ef0ea691e403239a1c2c39f3db8868ed570c191a8fe85d66a547675be945ef314e65152938476a81dd6d1da00b532ed0d1e2dc21d252525b037cb49d66a21bd09e75f52cb88c99764d66588d0ce94a67f3b0ce0f9cb6ed572a320e0c3203eaf427ae9dc1c9c01764995620ec0a17bae85e0c1c98e08cba1fffb421205c995e75cc1e857210001c4397267b926670d37ec57585709b508943a3be1e25b0de1ce1c8f47715c6061f2853891a10e186436dcbec11c02501603e59c3ed79f25153eb5db17b6c4b7e07fe5ad89810f2b08f92f6b22d9e440a1f954d3324833e978ac336d5a975b94be69ce40b65a85a0eee53491ffa085dd1e051767d52ae84065b3e192890b65aa8c17f0217de9f26bc60885fc1e16c9512ad8b6b17aaaac10aa4992ae88dce7408af8689bcb5879fa8bd3985d1a03cc4a1f424f393dbabb04fc1270362fdad01abc203e2a1f3cdce5b1346e7ae9d6d12d16e0a5cf7dd185108f4794ed6a3fecb3a9dbc647c194fbda2887c1a2d62bbae0ebc06e35ec87caef909a51f4f3cd40d5a864e2593f2d139d616ff201caef583739455a534fb61b060340bcdebcc030d2f08ea176c9985df5572b653e0f7e5f02dd7d723f27f6678861563f264944281573af0b173e82f59f7c8729de0048fac28ec7e37610357d22e2539804134cd93001d604215d78220842f5b54114ee8579fc549af723b73a3ca6fcbabbdfebfd14d7f06328101d1c6ed55873811ad3f18defca01a7fe1f1b64b8edd5ceafe95848a0563c9a994e5540061b5c5d4302d1b6d495947d2ee6d614678f78d09b4614aaf09e8676ba1a1d8556df8dcc3e140f5d8edb4beca348f84d8cc03558d408270366c8a3795ebb8a1b9f64b8667f133e629a04304ccd70294acd3d6e12f579b03198f997301fed3cfddc9da87fc700f2660b68acbd930597355a6b574164866821de9e1bbfdc1084bfac728bb9cfb68bafa87321d2578cc88ca4a9964f1a1c1a60792712d44df897e336f73700efc75ce3c7639a5d39444c8b76c959023531490c86c84a5b2f46ac7a5adebae05b2cf1d1c44c11e613b87613c66f850cc2614ee77c818d3c9831dfae7383ab7bc7e24c1318cd9c91ffbf32319d9b238b47df9bd20dc5779b390d3a246dd85908a8942a0a31f5396ee2dd37cdfc4988a6e4ae979010a2d65ac7a487c4f9ac216871212332a018066ba1a25a8339386206d7a3ce8b758efcb9d6a5a4ce5612bc536fad5951ec1d7a1e240acc2455320331336653c96af29ffba5477ab52e659a7816b1b3cf73d832d4eacae239104cc3c85a971bbe864982bbfa7ffb5879b8d6312835b38f02846d9981612113f7416ff5f9bc6a258b7ebae3675356f114664c7c6ad50cf630e76cff6c18d8387d88fc2ace30acf558a9ccc98a4ce1bdfb78db13e18d687241e11b8a114a4cbfcb07bd67a09c0fe25075b2db8e61addd3f2b9d848b21642c64feb0b5230fca30f4a2a9e4cfeff7bfb223d4cb24e54ebec8b77923c442921aa9e13b87c0a6202c77f5dc7c4571d43bd0362686e714d58ac3b18a9d957a1883e4ab9a0a1201e13eb1a45801546e360b3303301688ce013fdbbcc97cdac931ae458726eac8e20a5dbc2bd16c3cc7e609b818b8136c794ac24fa18f4644051d385eff7fcee27b5be244974625ce3b6cb46e0a5eecff085049089e0901ec59f4aa89d22625f4e2bd7818af11ba395f492a47b5fdcc451b8cc078bfa7ef09381ef439bbcb8863909e242e727931e62b06a5ffd8178ceca916a4c61608b33bb096a86df5676fcf11823c1942ba4faa59bf47106da0f79aa5f9e93246c17d1e3c4bb86582481a6856fe5276d56ab7a0a581ed5377c30eadbae2f1283ba399bc2cd3cf235c711e0f7170c57811c9ae650d4f28e2e43c6ade7d207b0b32e637a93753a877f22c4a4f5d28abea48ce5d0ed461950571d8324be1a054c26d201fe390815ec8cfa53fd5bb0faedb0f38115c769b3f73bd126fe80316783605348a0066c2280ee187aae09447470bc85873e4dba53ddb355a47736a40558e660fb746f16e0ccc6466009f599b99716a94d0b5aae57a29768c0cdba9a1138ad4f2816782a12537c1c421c7113fd1f27bf0db456cf179f6d9a760cfde45cc99b8fa9ff3a9ea7a7e32bd0257ced226f199ee635a576f2ce1e0b151efba6a0bf4ff73e2756de8c1cb8e073268bbb9e13a923ccb298861c7372065bf6dcf4802b8b351d58cbdabc2c4b0773f1775e3508a146661ca59122c78f015fb6af12f6c3e5335bb3bcd8f8109fe6e4da51b2ceb82b89a96d3a929b41e2addbabbfd3a67c787dd497e6300c683c6270b320622a4f77c51e00feb503372ad9ada151479c8565432fc53ee814510af44e306183f8e7e128179fbd492a25e25786ebfc61f1af89655edfe0d6f89e9654f6c4954a90209e66764257cfca1000c8afece909977464ae77fa9e7593af1506154fee5f75d3f6c313f495d9c594dffd520ab11e38f8381c234e062955079769889ec2bb09a53dfeec8cb505e4884cd2fac1ab807dac4faabdabd5f01f8ff1816b634ad3272ab06b9bd31ce882087c94a5c4de57c22a0d27145f3488c9b82f2a8d9400be3768531f537f08353ab9aec4d53d82e2ab97682d7922260f17021d06fe50ced2d48bee892e004fb14affebaf5f8e39ef45f224435b8d31f619f3656353601ba4fa14d223f8dff0050544e56c4c4b624f75ad0ab061e0cd3aa838fe3bb9a4b95d9f1ea20029809930764295d1a135026833ab1544a2ab15f7d1aa48a7fb7cbe8620953b6e354c25f9274fbb1978b5de9b96b6f2a064af4a6dbc560b53c50b9de3f64767e5c33e64526ccf813b05968055e2d6263f631961b759b4ad59ac5c4e258ff47dc05b71085907095d3be0bf42c714ef0638725ba395d2abceacdbef5a641894569db5175a2c92b6f8b14e25fd5b0cd47ad98213fd2f3cfe24beb116d8dc77eae91bdc6a2e4c283653a5378a795c87d3f8fc1e8e1eb0dd1de47ee9522aa451c4364e621f9919de360e3224faf66f9124822cb184dedcce02df5ed5eb49d802ef16f0f5f3134e698bfac05a2f549bd08649f07bc4b9ac31514b585ec4aa985717f371cd0672f001383a5df169b6b0218452fdb4e6589241162979abf3e7d1215e35bfb2dd3eb038b3572452ba506402981310061c7c326164b22ccd991808ea0e7c11a062654ea4e62fb9f5175239695b8a97aa022778a377c4cf6c6619793cc3fe3edf20638cdd3c0b3444a8be40d51959dca03b4801f79d5d54ff760ad2e7b2567c7bca2b6da6d3737e99c4f9f2d97c42cd97538deddca8bd0e003d85732f03988dcd17edc3c31bfc77c8633510d4b0060d6ae2948453bfa0dc43f9468202c5d1e489d49403382aefdf4095d3a751a16ef3fa370fb8a9cfb779956ece1e9a428f1d00cd6c61e44a978423b4430c0210172a502a7cdc0798b687555aee8b0423a59d7084f9f366df152195e0a75630c0446d93f4168af21e3e39aec03b8b3b100d80fe0397a3922dc68807e5e22dc445a2914ce4d357a49d17aa846e5f4a78d5bb0ceff621827747d1ff772fe88db6f5bfddf26e9d0d87a322e95dae75f1580b5cb41744329eba384865046fcf4c255208a0eaf418343625e306b1022fded610888f28c5357051b3b7d609de11a188da52ba2cc637e8c4b226398936a8ef394062060cfba6f9bc5ee3c2a4819267495642fca72fce46777175a8d41789c4045170627f733c9b8db0fa819c85c05b7209fe44402d6a67ae07d7cacf9af9eb3ba73f240b5564a26fa281069f93cadbf3141b1231fdfda9600909499bfc90baf6ec2cf3957f76a4135a3ded12cfb6765efc20c42b8e35d6104a5eff73c085f81b660fa68c2d0ef4c100516333a52fcdafbd3dbf04dde065a5718b9b7451bee51cda3698845f323de39e5e71dad80930d1c2c637d0a9a353d3c39f2fc322c840a4a9668ce4655e9e46c1011452145e9675aa08109a70d774b5e3b2f459eb40f0ab5a12ba7d28a550e88d4936c101673276e9218eaca5f897d403df856f21e7fcaf05ebf31d9214dccef36b1b51db70124bc4d80c0834744970812d4f29befacf2b4794221d0abbab8283a6b95192575edd5e2d109ec7753439eb04faf7a657a80dc886790e6c9b113a2285708fc88cd2687e75d7789842414a2cb082432407f9de8ba2e9291ec1c1c45c81d2acd00c646afdfa97d62903ca63b33681e75952b83b30e1aa99bf916d01002a9f944668d69a895a0ade9ce5b7c4787ae7d202c3c9103fdb3d8d713ec4b03df6af50b75dc1f6330586c2013c3ad59926b4cbc8640e53765f36bbc99d0a33e9e435106b78f801e817fa81faf051bd85faafd48e9f99a6832a0713321369a17b6cbada3b1804364deb5e9e518049eeff38cea4214ce00832f51185cd"}, {0xac, 0x102, 0x7, "f16ee3de61bb9f9b7ff1ddc9cac6ccc81da778ef513bd22e82b9e631bef80a1f2233e87e16353ef2d1658a57bc81712e6f65ee55d6d337c6e7f0c20ed80848e0826083b23f46545fc3605c0ea738b7c613cb8481d21e92ff9f2eef5403d68c504f21884919f86539323a0555ea359411b6db5f790a12c4917b5d34d206a7b4c4c1397422d703274075d8caf9398e32a37dd9ae655f433e5559457e197a"}, {0x28, 0x102, 0x2, "9eceba8691abe07254ae23269b0638a54f9413863883823fc30a"}, {0xf8, 0x118, 0x9, "57f59563945f118fa4278fefb1520ee82e55045b4f57e3432fe4f397b9db2d16e10b992135de6de670bed18e63e74d70ce69c5ba2921fb327dd5c67a7d99534758fbc744c059e55d81052fde285c417326b7135f29af881235ae3f1dffe8b67a34ee66a7bb85267f1b9c4b5924b3e71790f49afbce6a0ccac7763230bf04f7e56e00a144542323532f7cadea184a038becd88db646670380cc7e1812fda6b798e343a554d5a3e7bcd8f456e842937270e3ecfe407f47fd7d7f582c795e50c18d48b3828e72146163fb495ac1c6619b22f3b026fea28488810ac7c23d8295bc4381157b000000000000"}, {0xec, 0x6, 0x43, "51a8bafdc409030803ca946d91d63b7af3eb1ed44a565ea2ae7f317e9e5d6cfd1db91b6e400d47b32accf5bb3018ce6b8e3320d0a023b848f7d1dd6798695a1868e4f4a871fa0b64fd0d013cda0bbca5940205248f573354e516b3e631f3759a3c5e527cc23411176a5830dabe7ec203c59d2ecb45739251037fef897b36031f0466938db728047326b7ea416da505bc190da17968223e49b2cc1f2b8adf5cf666c94db55ce4f0a21530f94773b6e168aa04db29c88975eabc67fe3d101d1dc8eb80625ada92c7754d4630b1d8597003d85e39c3d178462eee3f8e3034"}, {0xe0, 0x84, 0x7, "d8c1bf0af092798d7566a775834490a223b6705fca98c9d2e4ddcbcb2f7391357e1900a57668f6cafbb8b121c510889b7e66379d9b15469bfdb4670df6d77197d47a78786b0dd001e9d7cc1f7bb17e62a1f8a9e570580ed0ac97df405b5abbc186027d6288470abd083b8f7ffae1174a9f77834685be19cec619cf8cc915300588e6ce6ea97b9587d4abcc027a0cb1e66325538685de19cd1ae608cd12bfdd2c6e7e1a60fb229d6be28cead7525e458becc197c991efbec3a88a83d35ca2891e70c7889399a82333a44e61919175b6ca4d"}, {0x48, 0x119, 0x80000001, "537711881f6ba71c3cf9d498fddae60a165fb94691e99289d58b418893ccf934913c8510f66471beef39b8244176b23f47ec0624083e6cf409dc7c"}], 0x24d0}}, {{&(0x7f0000001040)=@ll={0x11, 0xf5, r5, 0x1, 0x6}, 0x80, &(0x7f0000001280)=[{&(0x7f00000010c0)="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", 0xff}, {&(0x7f00000011c0)="8db39a14bcf6893b35239e5946107f6c0a9e8258a7a3c67888d500dda2c8a795206ed4b66b397cac651db036c0095a05fffb92499d8ac7bb0d3e66d176effe1e2de1a76e20f2d9ca5cc8d2c97ad55368df2cd2fe57783837b1c86b905275146c95632f73485dc592f510f6892de9d5546f8e90ba71f76663", 0x78}, {&(0x7f0000001240)="b4ccfdb46f9c2cc88c", 0x9}], 0x3, &(0x7f0000006a00)=[{0x90, 0x110, 0x2, "9dd8d2d78506656b8731f8889467424fffee2262d7d5e0c7d7a45f3ef7a0698158be0095332c24d3b351a60332f4bb1f56800edf093de2cfeef78b07207e5b675d3a0eb6910916a383cdd12168f0326a3aa84675c8df70e5198d0feea1e45b0bf368878829d372ba73190b4461b66bf29ae4f760d92e48795999fa5a4f5c40f25c34"}, {0xcc, 0x105, 0x9, "bf06096ca3b93469bec75b824a97c6676040b4289053ddc2dffdc817ed37b40971f15d39e115b92c1f263856722788ac31d0d4c4d2311935387b349faac87dc8944274f9e8a9fa0e881d2475fb6da55cdbe05041df3f4a17deb73bebee3b2eed3aaec7a6c3d1f594a1d18c39c8b7471be5c7f350b47360116459eab890e07dbfe38c9a7f4682427b918a4a59eea27912ca762bcadee442c800151f3c5f10af275f487af8ccbc8dd89fd97eeed495db9e06a38a155c795b648d1d523ae1f8"}, {0x44, 0x88, 0x101, "2f6892363af43bdab0fd9588d766645936ca732b35ebf8e117e37a89d1419d8c8d9f5abdfd2f2b4c6817b9cfa3f74470e6d818feaa"}, {0x84, 0x107, 0x2, "1888f18b1c06afa5d56de144a43adea04f2d8b0876fe43724b7651ff5b22e82e5d88d2cb31f996097d34b5f77164dc8ca7d2a7eaaa5e885fe6ed0fbe74b1573e030e8d47014c127c40509dd501a6f976d80f6e037001bf1595aa84938b1c589b24fb38483faec3380d6e7f5c5ddecba0992e361903f4d5f7"}], 0x224}}], 0x6, 0x4000) ftruncate(r2, 0x40003) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000140)={0x0, 0x3}) sendfile(r1, r2, 0x0, 0x2008000fffffffe) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000100)={'veth0_virt_wifi\x00'}) 14:21:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x80000000) [ 358.789506][T12641] xfs: Unknown parameter 'smackfsroot' [ 358.899722][ T32] audit: type=1800 audit(1595427666.729:168): pid=12643 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=55 res=0 [ 358.915261][T12643] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 358.966554][T12643] 8021q: adding VLAN 0 to HW filter on device bond1 14:21:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 359.196320][ T32] audit: type=1800 audit(1595427666.999:169): pid=12633 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="cpuacct.usage_percpu_sys" dev="sda1" ino=15825 res=0 14:21:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uqnoenforce='uqnoenforce'}, {@uquota='uquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}, {@hash='hash'}]}) 14:21:07 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x20, &(0x7f0000000000)={'syz_tun\x00', @ifru_data=&(0x7f0000000080)="1a6c17fc75b703e41f5b55c5a135f6bf0cec393f24f6e354813b1c26fbccdc29"}}) [ 359.484714][ T32] audit: type=1800 audit(1595427667.179:170): pid=12679 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=55 res=0 [ 359.505650][ T32] audit: type=1800 audit(1595427667.249:171): pid=12682 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.0" name="cpuacct.usage_percpu_sys" dev="loop0" ino=56 res=0 14:21:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x80000000) 14:21:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:07 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) fanotify_init(0x32, 0x101000) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x14, 0x400, 0x1000, 0x25dfdbfe, {0x1d, 0x7}, [@INET_DIAG_REQ_BYTECODE={0x34, 0x1, "9a1d44efb8a2bbc395a2994edde66558a3b0e0a076368d4cd1e0393ee05ab255114516895eac724a8060819fb19b0650"}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x44001) sendfile(r0, r1, 0x0, 0x2008000fffffffe) [ 359.805412][T12695] xfs: Unknown parameter 'smackfsroot' 14:21:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uqnoenforce='uqnoenforce'}, {@uquota='uquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nls'}}]}) 14:21:08 executing program 1: syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, 0x1c) [ 360.153393][ T32] audit: type=1800 audit(1595427667.979:172): pid=12707 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=57 res=0 [ 360.292894][ T32] audit: type=1800 audit(1595427668.119:173): pid=12707 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=57 res=0 14:21:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x1, 0x6, 0x3, 0x0, 0x0, {0x2, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8010}, 0x8001) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="615cd9babe3c75478adbc02800000000000000", @ANYRES16=r1, @ANYBLOB="370a000000000000000003000000050002000a000000060001004e21000004000500"], 0x28}}, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000001380)='./file0\x00', 0x13da00, 0x120) r4 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r4, 0x40003) sendfile(r3, r4, 0x0, 0x2008000fffffffe) 14:21:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x80000000) 14:21:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 360.675812][T12719] xfs: Unknown parameter 'smackfsroot' 14:21:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000000), &(0x7f0000000080)=0x8) 14:21:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x80000000) 14:21:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)={[{@uqnoenforce='uqnoenforce'}, {@uquota='uquota'}]}) 14:21:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:09 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000080)="2b4ccf2031efb054c777bb7461281978b9295377fae4603117dda85713e4be01df1304f862f494eb156f2c9779bc1b02f2936f8a32477d10e082e9cae6997f4b936691960fe3a16611062577acab2724b4f1187663ef1fd15ba03a515f55885e5631cf08dc89c07fc71b23189892434a0c05c1f53e61cba8b9ebc456260f20e213a04d228240a1b010b470a5b1de22a89cc624ee6f162f5622ab7f4683c70b258b6b12b14629b4c54748c4a5b157416f9b588b468e1862ee02d21b6b41a60784d0c6b4d0df885a10c5c811", 0xcb, 0xfffffff9}, {&(0x7f0000000180)="6800000000580effcc33804fee714c90c5a35bf1cddb5d059125f31c5507b018a651069bed60df901097770e5bc37856be837a663abed6dbb21e117d49ce6f380dba7a9c483a31633e267a8f603fb18e260fdbf9b30b5144ad35a51b0233a9ebf75f4b99dcfb61006458ade44b1b217d18a730e813f08b1e80c3ca69d842bfca0a131b74810c1b9177cb86b752de4d2bb0561ccf5d2f655125", 0x99, 0x800}], 0x20008, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) truncate(&(0x7f0000000280)='./file1/../file0\x00', 0x8) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000300)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_SET_LIMITS(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r4, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40001}, 0x404c804) 14:21:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:09 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) pwrite64(r0, &(0x7f0000000000)="38d395d3c39219c654b4c3cf0db965848cbcdd6892d4d299a75811800af7be80e9eba4989d", 0x25, 0x0) [ 361.455388][T12735] XFS (loop2): Invalid superblock magic number 14:21:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x80000000) [ 361.718102][ T32] audit: type=1800 audit(1595427669.549:174): pid=12753 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16307 res=0 [ 361.790996][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:09 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000000/0x3000)=nil], 0x0, &(0x7f0000000100), 0x0) [ 362.005157][ T32] audit: type=1800 audit(1595427669.839:175): pid=12759 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16307 res=0 14:21:10 executing program 1: r0 = socket$inet6(0xa, 0x2, 0xfffffffe) r1 = msgget(0x1, 0x256) msgctl$IPC_RMID(r1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) setresuid(0x0, r3, r3) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r5, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r7, 0x0) r8 = socket(0x10, 0x80002, 0x0) r9 = gettid() sendmmsg$unix(r8, &(0x7f0000000a80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x18, 0x1, 0x2, {r9, 0xee00}}}], 0x18}], 0x1, 0x0) connect$bt_l2cap(r8, &(0x7f0000000100)={0x1f, 0x6, @fixed={[], 0x12}}, 0xe) r10 = fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000080)={{0x1, r3, r5, 0xee01, r7, 0x0, 0x9b4}, 0x0, 0x0, 0x1, 0x80000001, 0x400, 0x401, 0x2, 0x7f, 0x4, 0x9, r9, r10}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:21:10 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04090a0200027400f801", 0xa}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) r2 = inotify_init1(0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, 0x0) sendfile(r2, r0, 0x0, 0x2008000fffffffe) 14:21:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "308d40", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}}, 0x0) 14:21:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x80000000) 14:21:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000), 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 362.728585][T12780] FAT-fs (loop0): bogus number of reserved sectors [ 362.735298][T12780] FAT-fs (loop0): Can't find a valid FAT filesystem [ 362.736891][T12784] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:10 executing program 1: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r1) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100), 0x4) close(r0) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = socket$inet(0x2, 0x80001, 0x84) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x82, &(0x7f0000000000)={r4}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={r4, 0x8}, 0x8) r5 = socket$inet6(0xa, 0x2, 0xc27) ioctl$sock_SIOCGIFCONF(r5, 0x8912, &(0x7f0000000040)=@buf) [ 362.781239][ T32] audit: type=1800 audit(1595427670.609:176): pid=12785 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15811 res=0 [ 362.813998][T12784] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:21:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r2, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a}, 0x1c) 14:21:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:11 executing program 1: socket$inet6(0xa, 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100)=0x7, 0x4) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in6=@local, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x0, 0x8004, 0x0, 0x0, 0xfffffffffffffffd}, {}, 0x1, 0x6e6bb4, 0xacee83c54af253f7, 0x0, 0x2, 0x2}, {{@in6=@private0={0xfc, 0x0, [], 0x1}, 0x4d3}, 0x2, @in6=@loopback, 0x34ff, 0x0, 0x0, 0x0, 0x80000001, 0xfffffffc}}, 0xe4) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0xfea7) mmap$usbfs(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x100010, r3, 0x7da) close(r2) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000080)=@req={0x20, &(0x7f0000000000)={'macsec0\x00', @ifru_hwaddr=@random="d0713c5aa000"}}) r4 = inotify_init1(0x0) readv(r4, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r4, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4014f50b, &(0x7f0000000180)={0x1, 0x3d}) 14:21:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 363.473091][T12780] FAT-fs (loop0): bogus number of reserved sectors [ 363.479824][T12780] FAT-fs (loop0): Can't find a valid FAT filesystem 14:21:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) recvfrom(r1, &(0x7f0000000540)=""/4102, 0x1006, 0x0, 0x0, 0x0) [ 363.565117][ T32] audit: type=1800 audit(1595427671.399:177): pid=12805 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16312 res=0 14:21:11 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0x705, 0x3}, 0x20}}, 0x0) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r2, 0x40003) sendfile(r0, r2, 0x0, 0x2008000fffffffe) chmod(&(0x7f0000000240)='./file1\x00', 0x8) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r2, 0xf503, 0x0) 14:21:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 364.024436][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 364.543449][ T32] audit: type=1800 audit(1595427672.379:178): pid=12832 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15811 res=0 [ 364.804775][ T32] audit: type=1800 audit(1595427672.629:179): pid=12832 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15811 res=0 14:21:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:12 executing program 2: perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1, 0x0, 0x3d}}], 0x8000000000000ba, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 14:21:12 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = openat$bsg(0xffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x4000c0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="a064d9009cd2dda81b7f249ad94888ef000000", @ANYRES16=r2, @ANYBLOB="080028bd7000fedbdf25140000000c0005800800010075647000540001800d0001007564703a73797a320000000038000400200001000a004e2300000081fc010000000000000000000000000000010001001400020002004e200a010101000000000000000008000300239200002c00038008000200080000000800020002000000080001000000000008000100050000000800010001010000"], 0xa0}, 0x1, 0x0, 0x0, 0xc0}, 0x20000800) 14:21:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') lsetxattr$security_evm(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@sha1={0x1, "c1a6798548e77f54a6ac5354b09cae620c77a826"}, 0x15, 0x2) r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x185) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x80, 0x1405, 0x4, 0x70bd26, 0x25dfdbfe, "", [{{0x8}, {0x8, 0x3, 0x4}}, {{0x8, 0x1, 0x2}, {0x8, 0x3, 0x3}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x4}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x3}}, {{0x8}, {0x8}}, {{0x8, 0x1, 0x1}, {0x8, 0x3, 0x3}}, {{0x8}, {0x8, 0x3, 0x4}}]}, 0x80}, 0x1, 0x0, 0x0, 0x8884}, 0x10) 14:21:13 executing program 2: perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1, 0x0, 0x3d}}], 0x8000000000000ba, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 14:21:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) connect$pptp(r1, &(0x7f0000000080)={0x18, 0x2, {0x2, @broadcast}}, 0x1e) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000040)=@req={0x20, &(0x7f0000000000)={'veth0_macvtap\x00', @ifru_map={0x401, 0x401, 0x9, 0x1f, 0xff, 0x40}}}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r3, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40047703, 0x5) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$RTC_RD_TIME(r4, 0x80247009, &(0x7f00000000c0)) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c00000010008506000010000000000000000000", @ANYRES32=r7, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) sendmsg$can_raw(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x1d, r7}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)=@canfd={{0x2, 0x0, 0x1, 0x1}, 0x14, 0x0, 0x0, 0x0, "37462cdeb3d8505afed1815190ba9f0513507eff118cee86cf576993fc1f0ca070c8e724058edb5142a0d75257a6de6af0e7d6602d50ad36240759eb12c4a565"}, 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x8) 14:21:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 365.970346][ T32] audit: type=1800 audit(1595427673.759:180): pid=12863 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16318 res=0 14:21:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 366.296431][ T32] audit: type=1800 audit(1595427674.129:181): pid=12863 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16347 res=0 14:21:14 executing program 1: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf) r0 = inotify_init1(0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4004700e, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) ioctl$CHAR_RAW_BSZSET(r2, 0x40041271, &(0x7f0000000000)=0x587d546f) 14:21:14 executing program 2: perf_event_open(&(0x7f0000000a80)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1, 0x0, 0x3d}}], 0x8000000000000ba, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 14:21:14 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000140)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0xfffffffffffffee2}], 0x0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a45322, &(0x7f0000000180)) r1 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r2, 0x40003) sendfile(r1, r2, 0x0, 0x2008000fffffffe) r3 = socket$inet6(0xa, 0x5, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x82, &(0x7f0000000000)={r5}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240)={r5, 0x3}, 0x8) 14:21:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x80000000) 14:21:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4), 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 367.560532][ T32] audit: type=1800 audit(1595427675.389:182): pid=12898 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15811 res=0 14:21:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x80000000) 14:21:15 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ppoll(&(0x7f0000000140)=[{}, {r1}], 0x2, &(0x7f00000001c0)={0x0, r2+30000000}, 0x0, 0x0) 14:21:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4), 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 368.317900][ T32] audit: type=1800 audit(1595427676.149:183): pid=12898 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15811 res=0 14:21:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) link(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)='./file0\x00') prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) write$cgroup_subtree(r0, &(0x7f0000000240)={[{0x2b, 'cpu'}, {0x2d, 'rdma'}, {0x56, 'pids'}, {0x2b, 'rdma'}]}, 0x17) ftruncate(r1, 0x40003) r2 = openat$null(0xffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x82001, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000480)={0x140, 0x4, 0x9, 0x64048787, [], [], [], 0x101, 0x4, 0x80000001, 0xd4b, "05516410ecb1ecb0229bb588e9b333bb"}) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'osx.', '@&\')\x8b,\x00'}, &(0x7f0000000200)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc3\xa5veli', 0x1d, 0x3) sendfile(r0, r1, 0x0, 0x2008000fffffffe) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x30000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x3, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x2404c015}, 0x0) r3 = inotify_init1(0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r3, 0x0) fcntl$setlease(r3, 0x400, 0x0) r4 = openat$bsg(0xffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x80001, 0x0) ioctl$VHOST_SET_LOG_FD(r4, 0x4004af07, &(0x7f0000000140)) 14:21:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, r1, 0x0, 0x80000000) 14:21:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4), 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 369.396026][ T32] audit: type=1800 audit(1595427677.229:184): pid=12923 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16367 res=0 14:21:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4), 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) ppoll(&(0x7f0000000140)=[{}, {r1}], 0x2, 0x0, 0x0, 0x0) 14:21:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 369.985446][ T32] audit: type=1800 audit(1595427677.819:185): pid=12926 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16367 res=0 [ 370.053484][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:18 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000100)=0x1, 0x4) ftruncate(r1, 0x40003) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000140)=0x8001) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 370.323941][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4), 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 370.694273][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 370.922366][ T32] audit: type=1800 audit(1595427678.749:186): pid=12952 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=58 res=0 [ 371.142828][ T32] audit: type=1800 audit(1595427678.859:187): pid=12952 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=58 res=0 14:21:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x10000000000, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 14:21:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xfffffffd, 0x7, &(0x7f0000000080), 0x3000000, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 371.470708][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4), 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 371.672186][T12966] FAT-fs (loop0): bogus number of reserved sectors [ 371.678924][T12966] FAT-fs (loop0): Can't find a valid FAT filesystem [ 371.765536][ T32] audit: type=1800 audit(1595427679.599:188): pid=12970 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16356 res=0 [ 371.859397][T12966] FAT-fs (loop0): bogus number of reserved sectors [ 371.866695][T12966] FAT-fs (loop0): Can't find a valid FAT filesystem [ 371.952170][ T32] audit: type=1800 audit(1595427679.779:189): pid=12978 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16373 res=0 14:21:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x10000000000, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 14:21:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = inotify_init1(0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r1, 0x0) r2 = socket(0x10, 0x80002, 0x0) r3 = gettid() sendmmsg$unix(r2, &(0x7f0000000a80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x18, 0x1, 0x2, {r3, 0xee00}}}], 0x18}], 0x1, 0x0) fcntl$setown(r1, 0x8, r3) r4 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r4, 0x40003) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f0000000180)={0x4000, 0x10c000}) sendfile(r0, r4, 0x0, 0x2008000fffffffe) write$binfmt_elf64(r1, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1f, 0x1, 0x8, 0x9, 0x2, 0x3, 0x3, 0x1c9, 0x40, 0x36a, 0x101, 0x6, 0x38, 0x1, 0x41, 0xfffc, 0x5}, [{0x60000000, 0x1000, 0x1, 0x6, 0x9, 0x400, 0x9, 0x7}], "bba69d50b9f86f9b1dc9f370938f8953858daef11b6cb89e34b9ba4015ea1eb73c67a336ac1cab71cd1d9e2a7a1368116cd3e4fcd5839a76d01de61323db938b6c340105b465fd31f8f2b053f72e1aa64879716ddd98bf9db06846ed1bb7bcecf1463d455299fd78b5323e49506d8ee670e12761fd4ec452ecba245fb3592508d91ecf3df9ac2d774c8590870efbb39e541028054eca02aa1dc7401cd9a8cfec49b62079934d264f85df78089024", [[], [], [], [], []]}, 0x626) 14:21:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 372.533436][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 372.602831][ T32] audit: type=1800 audit(1595427680.429:190): pid=12993 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=59 res=0 14:21:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PDEATHSIG(0x1, 0x0) [ 373.006971][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) [ 373.124791][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 373.297861][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="450000000005eb30", 0x8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0xfffffffffffffff0, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}}, 0x78) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:21:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:21 executing program 1: socket$inet6(0xa, 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c00000010008506000010000000000000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={@private2, 0x1a, r6}) socket$caif_seqpacket(0x25, 0x5, 0x1) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getrandom(&(0x7f0000000080)=""/69, 0x45, 0x3) ioctl$sock_SIOCGIFCONF(r7, 0x8912, &(0x7f0000000000)) 14:21:21 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') open(&(0x7f0000001380)='./file2\x00', 0x1ada42, 0x0) r0 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000100)) ftruncate(r0, 0x40003) [ 373.737998][T13022] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 373.766534][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}], 0x41f, 0x0) [ 373.929507][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 374.097009][T13022] 8021q: adding VLAN 0 to HW filter on device bond5 14:21:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 374.453907][T13022] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 374.623170][ T32] audit: type=1800 audit(1595427682.459:191): pid=13068 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file2" dev="loop0" ino=61 res=0 [ 374.718533][ T32] audit: type=1800 audit(1595427682.549:192): pid=13070 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file2" dev="loop0" ino=61 res=0 [ 374.807497][ T32] audit: type=1800 audit(1595427682.629:193): pid=13070 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.0" name="cpuacct.usage_percpu_sys" dev="loop0" ino=62 res=0 14:21:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x5, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x82, &(0x7f0000000000)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000000c0)={r6, 0x3}, &(0x7f0000000100)=0xc) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r7 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r8 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x3, 0x2) epoll_wait(r8, &(0x7f00000001c0)=[{}], 0x1, 0x80) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0xc) 14:21:22 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) execveat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\xda!\x00', &(0x7f0000000180)='msdos\x00', &(0x7f00000001c0)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', &(0x7f0000000200)='msdos\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='msdos\x00'], &(0x7f0000000340)=[&(0x7f0000000300)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli'], 0x1000) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) [ 376.083587][ T32] audit: type=1800 audit(1595427683.909:194): pid=13080 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16384 res=0 [ 376.167335][ T32] audit: type=1800 audit(1595427683.999:195): pid=13089 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=63 res=0 [ 376.226899][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4), 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:24 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000000080)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000580)="6af423066627ffbe2a8bae88657f7bb955eb99d3e194adcf5adc8fa6d7be889d702b1b33396f4cba3895878d53f1e64ba3e63a2ce61c987a9ed4fa9c7cc4eb0d4cdb8601ff88afcd101b6b43257d7a359ac31697281628aec2a798c7812599f922da9ede6137a5e5a2d60b82a119d6d250adf1dc685de7a99633112af77eb413e7f1825ce9c2ab402e8f00297409bb5c9062f1c2a8a60a6ab5366e45e2a197bbcd3db4cd4c829c1d82406b064620ecbd31596428dcaa", 0xb6}, {&(0x7f0000000280)="06a05a1f6fce19a1233a72f4fcb979ca8365fd2dd93be0e30f4a8ba8d8a2e18ce28262a7ceefcd94a250b9cb15ec776d531a8248a60dcc225ea49d0aff137418df3cc58ab2f0b7d2428b66d4ea38b3da7f4b8f9fe0a2cdcc82a5562510bd784a18d2ae902f54595a8ae5dc6bd58d684171c779559f802743fc6e0b332fe394de95efc58f59ce60832604ff6c0c0ad9f2aa7f2cca", 0x94}, {&(0x7f0000000480)="454b92e4f8822b982c3c483fa00911f1a22ca84c5ddd5e4db517948bbb1e950f2f735d85095ba010606473f6fed67e5b883a21a02e308ddede0bf4c22ab7df63d93b454a7510eea95cade19293f0153c1ea5df808d96e66c6146cf88e9efc82f9b3665aea38b5931bdf302952402415636219d50955c59e291dfc067967935a212e2472952f6fd0da45c34a1218fd62929e8a8ebf92dc98debad86fef937e3483f122c6043a6eca871856e2e7bfa83f981cb347d4f829641d8ec714108d10ce4c3a9869deb688c2e72ea2973e11d5dcee9fdddd5061649", 0xd7}], 0x3}}, {{0x0, 0x0, 0x0}}], 0x2, 0x4048) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000240)=0xfffffff9, 0x4) ftruncate(r1, 0x40003) r3 = open(&(0x7f0000000100)='./file1\x00', 0x505000, 0x102) r4 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x82, &(0x7f0000000000)={r5}, 0x8) r6 = socket$inet6(0xa, 0x5, 0x0) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x82, &(0x7f0000000000)={r8}, 0x8) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x2, 0x8000, 0x1, 0xed0, 0xff, 0x9, 0x1000, {r8, @in={{0x2, 0x4e20, @remote}}, 0x2, 0x3, 0x2, 0x2, 0x6}}, &(0x7f0000000200)=0xb0) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = inotify_init1(0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc01cf509, &(0x7f0000000040)={r0, 0x9, 0x1ff, 0x1}) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000000)=@buf) [ 376.855979][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) [ 376.971064][T13107] FAT-fs (loop0): bogus number of reserved sectors [ 376.978005][T13107] FAT-fs (loop0): Can't find a valid FAT filesystem [ 377.038587][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 377.086795][T13107] FAT-fs (loop0): Unrecognized mount option "Ù;EJuî©\­á’“ð<¥ß€–ælaFψéïÈ/›6e®£‹Y1½ó•$AV6!P•\Yâ‘ßÀg–y5¢âG)Röý ¤\4¡!Ö))è¨ëù-Éë­†þù7ãH?" or missing value [ 377.449168][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:25 executing program 2: socket$unix(0x1, 0x2, 0x0) pipe2(0x0, 0x0) socket$unix(0x1, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000000c0)='syz0\x00') r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000040)="24000000220007031dfffd946f61050002000000054300000000391e421ba3a20400ff7e280000001100ffd613d3475bb65f6400004efb0000000000007e23f7efbf54000000005cc37fcfa3", 0x4c}], 0x1}, 0x0) 14:21:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4), 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$autofs(0xffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x20000, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f00000001c0)={0x6, 0x80, 0x1}) r1 = openat$btrfs_control(0xffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x80200, 0x0) open_tree(r1, &(0x7f0000000140)='./file0\x00', 0x8101) r2 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r3 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r3, 0x40003) sendfile(r2, r3, 0x0, 0x2008000fffffffe) 14:21:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) [ 377.660483][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4), 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 377.830038][ T32] audit: type=1800 audit(1595427685.659:196): pid=13127 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16034 res=0 14:21:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 377.910413][T13135] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 378.004427][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 378.052898][ T32] audit: type=1800 audit(1595427685.809:197): pid=13130 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16034 res=0 [ 378.270663][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) clone(0x2000000002008100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() sendmmsg$inet6(r0, &(0x7f00000019c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) 14:21:26 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) openat$sequencer2(0xffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101080, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0xfea7) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r3, 0x0) r4 = fspick(r3, &(0x7f0000000140)='./file1\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r4, &(0x7f0000000180)={0x1}) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000) 14:21:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x20, &(0x7f0000000000)={'macvlan0\x00', @ifru_hwaddr=@broadcast}}) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x7, 0x50000) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000002c0)=0x400, 0x4) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x5460, &(0x7f0000000480)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0185648, &(0x7f0000000280)={0xa30000, 0xfffff800, 0x4, r0, 0x0, &(0x7f0000000240)={0x9909de, 0x5, [], @p_u8=&(0x7f0000000200)=0x7}}) setsockopt$inet6_MCAST_LEAVE_GROUP(r6, 0x29, 0x2d, &(0x7f0000000380)={0x6, {{0xa, 0x4e22, 0x4, @private1={0xfc, 0x1, [], 0x1}, 0x2}}}, 0x84) r7 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)="6b819e79a4256082ae7407e930d8ab043b213bb13aa9f157aa00cdfe1c826e5253937e4c3c8f995e2c0d", 0x2a}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) ioctl$IMGETDEVINFO(r7, 0x80044944, &(0x7f0000000180)={0xd0}) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @in6={0xa, 0x4e21, 0xfffffffd, @local, 0x100}}}, 0x90) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r3}}, 0x18) [ 378.887763][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 378.932861][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) [ 378.996015][ T32] audit: type=1800 audit(1595427686.829:198): pid=13161 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16384 res=0 14:21:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000) 14:21:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) [ 379.436817][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:27 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x2, &(0x7f0000000240)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}, {&(0x7f0000000140)="59d7e544ae72f0ccb034ae009ba13a9b4c2863e06d8347a2c2e067c9ed80c7218950fdbc765f30aea1faecb506eefb4fe46a54d95e4eb6d9b4dd82d9d59f993673380aea7fca355e6d9f8d036bd3b6d71bad1ab8083647b1148f27ed5245b75254b46d88e092d2359eed8ecac2896d90b482025d4a0379c00fa7984f4a52c2edc6dbab6f0a704a8a771c40186440c5a688a72347e4b1587feb85114695267ee1c99f6351bb25c4ef8345646cd3299b3c2c244c6c996a969cb87ba9c8fa914de9dd333a49a0d2b6d63d671ad8e1bfa29e469d0a86a1c2546f1a", 0xd9}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file0\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000100)=0x1) ftruncate(r1, 0x3) sendfile(r0, r1, 0x0, 0x2008000fffffffe) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) 14:21:27 executing program 1: r0 = inotify_init1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x40002002) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f00000000c0), 0x4) sendmsg$inet(r2, &(0x7f0000001380)={0x0, 0xc0, 0x0}, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r0, 0x0) sync_file_range(r0, 0xf77, 0x7fff, 0x1) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x8) r4 = openat$sequencer2(0xffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x801, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r4, 0x10f, 0x80, &(0x7f0000000100), &(0x7f0000000180)=0x4) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000040)=@buf) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_STREAMOFF(r5, 0x40045613, &(0x7f00000001c0)=0x8) 14:21:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="a001000010001341447c40c2720bbf00fe880800000000000000000000000001a41e00010000000000000000000000000400"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1e00010000000000000000000000000000000032000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000096000000000000004800020063626328646573335f65646529000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000001c0017000000000000000000000000000000000000000000000000004c00140073686131"], 0x1a0}}, 0x0) sendmmsg(r2, &(0x7f0000000180), 0xf1, 0x0) [ 379.968483][T13179] FAT-fs (loop0): invalid media value (0x83) [ 379.974975][T13179] FAT-fs (loop0): Can't find a valid FAT filesystem 14:21:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000) [ 380.051122][ T32] audit: type=1800 audit(1595427687.879:199): pid=13183 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15748 res=0 [ 380.126110][T13179] FAT-fs (loop0): invalid media value (0x83) [ 380.132926][T13179] FAT-fs (loop0): Can't find a valid FAT filesystem [ 380.257962][ T32] audit: type=1800 audit(1595427688.029:200): pid=13183 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15748 res=0 14:21:28 executing program 0: r0 = inotify_init1(0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r0, 0x0) r1 = inotify_init1(0x0) readv(r1, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r1, 0x0) r2 = inotify_init1(0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x7f, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYRESOCT=r2, @ANYRES32=r0, @ANYRESHEX=r2, @ANYRES32=r0, @ANYRESDEC=r0]) chdir(&(0x7f0000000000)='./file1\x00') r3 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r4 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000100)={{0x4, 0x8}, {0x81, 0x1}, 0x76, 0x0, 0x7f}) ftruncate(r4, 0x40003) sendfile(r3, r4, 0x0, 0x2008000fffffffe) 14:21:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20040044, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000340)) 14:21:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x0) [ 380.841857][ T32] audit: type=1800 audit(1595427688.669:201): pid=13205 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="cpuacct.usage_percpu_sys" dev="sda1" ino=15842 res=0 14:21:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) [ 381.037712][T13214] FAT-fs (loop0): Unrecognized mount option "nYWPý6OrYíEg›." or missing value [ 381.142829][ T32] audit: type=1800 audit(1595427688.969:202): pid=13217 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15748 res=0 14:21:29 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x41) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$TIOCGICOUNT(0xffffffffffffffff, 0x545d, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r1, r0) [ 381.382710][ C0] net_ratelimit: 7 callbacks suppressed [ 381.382742][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x8000) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib}}, 0x90) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {&(0x7f0000000080), r3, 0x9}}, 0x18) [ 381.572487][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x0) [ 381.648160][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:29 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) renameat2(r2, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file1\x00', 0x1) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) r3 = inotify_init1(0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r3, 0x0) r4 = inotify_init1(0x0) readv(r4, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r4, 0x0) dup2(r3, r4) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000000)) 14:21:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0xc}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x22) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 382.051672][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x0) [ 382.240868][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 382.255568][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x80000000) 14:21:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000) [ 382.569742][ T32] audit: type=1800 audit(1595427690.399:203): pid=13261 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15938 res=0 [ 382.604685][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:30 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10=\x8f\xa2\xc7\x8b\x96|?\x16\xbf\xa1$\xe2\xf4\xa6t#M\xe0l\x0e<\x89\x8df\xa0m\x00\a\xbb\x84\xc2V\xff\xb0j\x06\x00\xba\x1a\xe7@\xab\xe2v\x8a\x97\x88\xd3\xa5\xeePb\x10\xf5\'\xc1\x01\xfew\xdfgCM>\xba\xc6\xe5\xa6\xac\xfa\xed\xdf;') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000bc0)='./file0\x00', 0xc0242, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r5 = openat(r4, &(0x7f0000000040)='./file0\x00', 0x141202, 0x0) write$FUSE_INIT(r5, &(0x7f0000000140)={0x50}, 0x50) fallocate(r1, 0x3, 0x0, 0xd3fd) 14:21:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x401, 0x482ff7964b2a666b) [ 382.918487][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:30 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="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", 0xfb}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000100)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x06\x00\x00\x00\xf0\x06\x00\x00@\xc8k\xc0\xa5veliy(\xc6\x03\xbc\x06\xc2&x\xcfG\x15\xc6\xfc\x04\b\x959\xa3\x89\x03\xa3\xb5e', 0x4) ftruncate(r1, 0x40003) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) accept4$netrom(r3, 0x0, &(0x7f00000000c0), 0x1800) sendfile(r0, r1, 0x0, 0x2008000fffffffe) [ 382.963256][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000) 14:21:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_GET_FP_MODE(0x2e) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000002e80)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f0000002fc0)={0x0, 0x0, &(0x7f0000002f80)={&(0x7f0000002ec0)={0x3c, r2, 0x1, 0x0, 0x0, {0x3d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x1ca) r4 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r4) r5 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_group_source_req(r5, 0x0, 0x2b, &(0x7f0000000c40)={0x0, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x104) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @initdev, @multicast1}, &(0x7f0000000100)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000140)={'gre0\x00', r6, 0x0, 0x7800, 0x6, 0x7ff, {{0x13, 0x4, 0x1, 0x34, 0x4c, 0x67, 0x0, 0x8a, 0x4, 0x0, @private=0xa010102, @empty, {[@timestamp={0x44, 0xc, 0x47, 0x0, 0xf, [0x7, 0x5]}, @cipso={0x86, 0x2c, 0x0, [{0x0, 0x8, "ad1205b38178"}, {0x7, 0x6, "5c9c25f9"}, {0x5, 0x6, "09cea3bf"}, {0x0, 0xe, "a0700bade8376a5b665f9997"}, {0x6, 0x4, "3791"}]}]}}}}}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0) 14:21:31 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$netlink(0x10, 0x3, 0x4) writev(0xffffffffffffffff, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88", 0x12}], 0x1) splice(r0, 0x0, r2, 0x0, 0xfffffffb, 0x0) [ 383.430283][T13281] FAT-fs (loop0): count of clusters too big (11010558) [ 383.437819][T13281] FAT-fs (loop0): Can't find a valid FAT filesystem [ 383.531855][ T32] audit: type=1800 audit(1595427691.359:204): pid=13286 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16383 res=0 [ 383.567257][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000) [ 383.780532][ T32] audit: type=1800 audit(1595427691.509:205): pid=13286 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16383 res=0 14:21:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x800001d, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 14:21:33 executing program 1: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf) 14:21:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:33 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r2 = inotify_init1(0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, 0x0) ftruncate(r0, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x4, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @volatile]}, {0x0, [0x0, 0x0]}}, 0x0, 0x64}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x22) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:21:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x0) 14:21:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x0) [ 385.590952][ T32] audit: type=1800 audit(1595427693.420:206): pid=13322 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=64 res=0 14:21:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:33 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0x8d, &(0x7f0000000080)="fd3401bf4075700e717d9496822b9d97cd537de65a1093c9e502f02b00e854a3e8dd53bb7596fa7f8228130b698014dd0c61568b9c1a4bc724a1524ad7f2ff0d8cc494642c0457e44648ff5619daca965c5fd7135ca746a7d10d5d3a18c40e01a631d010df2d27a7fecc807c37a3d4d7a3074c777897d155fd122d6e3f1ef91b35cb73412e2a1583eb9f0b7565"}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r1, 0xc0385720, &(0x7f0000000040)={0x1}) 14:21:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x0) [ 386.111482][ T32] audit: type=1800 audit(1595427693.940:207): pid=13334 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="cpuacct.usage_percpu_sys" dev="sda1" ino=16019 res=0 [ 386.265042][ T32] audit: type=1800 audit(1595427694.070:208): pid=13325 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=64 res=0 14:21:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$SNDCTL_DSP_NONBLOCK(r1, 0x500e, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:21:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) [ 386.579531][ C1] net_ratelimit: 5 callbacks suppressed [ 386.579567][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 386.927706][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 387.026144][ T32] audit: type=1800 audit(1595427694.860:209): pid=13351 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="cpuacct.usage_percpu_sys" dev="sda1" ino=15924 res=0 14:21:36 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x2000, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x8000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000180)={[], 0xf2, 0x7, 0x6, 0x1002, 0x401}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 14:21:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r3 = inotify_init1(0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r3, 0x0) r4 = inotify_init1(0x0) readv(r4, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r4, 0x0) r5 = inotify_init1(0x0) readv(r5, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r5, 0x0) write$binfmt_script(r2, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r4, @ANYRESHEX=r5, @ANYRES64=r5], 0xfea7) openat$cgroup_ro(r2, &(0x7f0000000100)='devices.list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x2008000fffffffe) getuid() 14:21:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) 14:21:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000000)={0x0, {0x7fff}}) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000040)=@buf) [ 388.418237][ T32] audit: type=1800 audit(1595427696.250:210): pid=13363 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=65 res=0 [ 388.439403][ T32] audit: type=1800 audit(1595427696.250:211): pid=13362 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="cpuacct.usage_percpu_sys" dev="sda1" ino=16381 res=0 14:21:36 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x807284, 0x0) r0 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 14:21:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:36 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unshare(0x0) 14:21:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r2 = inotify_init1(0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:devlog_t:s0\x00', 0x1e, 0x3) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r1) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 388.838605][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 389.133155][ T32] audit: type=1800 audit(1595427696.960:212): pid=13377 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=65 res=0 14:21:37 executing program 4: 14:21:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) sendfile(0xffffffffffffffff, r2, 0x0, 0x80000000) 14:21:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_SET_BSS(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_P2P_OPPPS={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008800}, 0x40) r4 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0eli\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ftruncate(r4, 0x40003) sendfile(r0, r4, 0x0, 0x2008000fffffffe) 14:21:37 executing program 3: [ 389.757602][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 389.950106][ T32] audit: type=1800 audit(1595427697.780:213): pid=13407 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=67 res=0 14:21:37 executing program 2: 14:21:37 executing program 4: 14:21:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000) 14:21:37 executing program 3: [ 390.114392][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000) [ 390.311246][ T32] audit: type=1800 audit(1595427698.130:214): pid=13407 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=67 res=0 14:21:38 executing program 1: socket$inet6(0xa, 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000080)=@caif=@util, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/51, 0x33}, {&(0x7f0000000100)=""/170, 0xaa}], 0x2, &(0x7f0000000200)=""/234, 0xea}, 0x2001) r2 = accept4$bt_l2cap(r1, 0x0, &(0x7f0000000380), 0x800) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000340)=@buf) 14:21:38 executing program 4: 14:21:38 executing program 3: [ 390.494903][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:38 executing program 0: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d}, {}, {}, 0x0, 0x0, 0x0, 0x1}, {{@in6}, 0x0, @in6=@loopback}}, 0xe4) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x4, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[{0x81, 0xff, 0x6, 0x1000}, {0xff, 0x83, 0x5, 0xffff}, {0x2, 0x7, 0x2, 0x1}, {0x4, 0x20, 0x1f, 0x9}, {0x9, 0x9, 0x53}, {0x9, 0x7, 0xe1, 0x54f242fc}]}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x0, 'ip_vti0\x00', 0x3}, 0x18) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x2000) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000200)=0x7fff, &(0x7f0000000240)=0x4) r3 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r3, 0x40003) sendfile(r1, r3, 0x0, 0x2008000fffffffe) 14:21:38 executing program 2: 14:21:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x80000000) 14:21:38 executing program 3: 14:21:38 executing program 4: 14:21:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x44002, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x34, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x34}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f00000000c0)={0x2e4, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x9c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd50c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x14, 0x2, @in={0x2, 0x4e20, @empty}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'veth1\x00'}}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffff7f}]}, @TIPC_NLA_NODE={0x74, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x27, 0x3, "71a4c3a8c142a55a405b6846c6c0c8e18154a17cb8e9662d0f7edd451967f379d75a48"}, @TIPC_NLA_NODE_KEY={0x47, 0x4, {'gcm(aes)\x00', 0x1f, "f2c4b1e05f3d04dd155089e7c6924b2ecbbfb49fed47ee391c4252dec91e01"}}]}, @TIPC_NLA_NODE={0x1b4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "6dd415c4c5cc381105681dadbd246c0af04adf9eaaf8bac16878"}}, @TIPC_NLA_NODE_ID={0x35, 0x3, "e5e2c6df1d4c1e713c037f6636e6e99368f0580e75c6b16574e3066d0b6ba2eea791831ee21aa213fca1d3d220bcf1fa66"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x69, 0x3, "bb22b77d5450eb9dd2bf177621e6fb5623c50b195e67ebaba68f8a736d90e623e59fe2bb1b9ba7e1da6bfe7f904cf5b60f242362a46e6baea26d84c5c484d6408dc92239bacdfee478fbe066bc339eea0d93b6a585eda108107a8735d009790f49f9054265"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x42, 0x3, "f0f26ffd17fd5480543e2c391310bfcf6606b633f66e97facc43fdf2f3a247bf01d5960de4200b7cd75bfd7f65a9761bceb3deb3393c9c0bed6f694f5414"}, @TIPC_NLA_NODE_ID={0x6d, 0x3, "b2af9c47fb30eecaf83de6302ca17673a096f38e2d9e9ab115033f45a5c65870166a96030f88002dab24121ffe74fcb4bbebc2a280a3fc2dac3ebb8801ab4502a84d9c32cef4592bf8fa9e25441d48928a910f1b8947542996957174ffe612f38a9649431ed1201491"}]}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x4008800}, 0x44014) 14:21:38 executing program 2: [ 391.120624][ T32] audit: type=1800 audit(1595427698.950:215): pid=13432 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=68 res=0 [ 391.196109][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 391.263083][T13440] tipc: MTU too low for tipc bearer [ 391.405530][ T32] audit: type=1800 audit(1595427699.090:216): pid=13439 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=68 res=0 14:21:39 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)={0x1c, r4, 0x301, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x1c}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="03000000", @ANYRES16=r4, @ANYBLOB="040425bd7000fcdbdf250a00000005002f00000000000500330001000000080032002000000008003a000b0300000500370000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x40010}, 0xc010) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:21:39 executing program 3: 14:21:39 executing program 2: 14:21:39 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x9, &(0x7f0000000800)=[{&(0x7f00000001c0)="95f7a7887b8c0588003d9d719507d37eed62bc9544ec7b49b5e9b74f8e3d10cdcb7563e9658a5cd772373b0b6988ca49ebb7a63a8cda3a05fdd837ab1f45f17a85dc9c07d12dc561d6584e1b1b21a3948851cd8633131e7a9188dee3e4c15cbb2f90097e86b290949db9146bf91ba3091afc573eacf867ac8116d642c95f168dee2eeae16157cc9b40f183a16585d407319595a16c680466629165514d97103d851214b84b55bc1a4321a3241392ba1c1ee8b1a59dca46766b2574935ebf04836371852b92f30cd84b4f7f0102fc2d095498cd", 0xd3, 0x9}, {&(0x7f0000000080)="a98595f198e4c3a0075fd03b142ab2fcab41bde595090253474e401e13a91f4b08761b7e8b529cff1826c0323c4f16", 0x2f, 0x3ff}, {&(0x7f00000002c0)="09c63b28dd1c9fd41d93f5395d5cd23c1e92390036f1efff2179276548123a869fb610cc0ff4a9e8f11da49884510e04baa3ef0f970296ea97313fbbb5e8a256ea6f2c29d1f74bc2f91199e907262da3930df3b276cce7cc0a8265789253a07bcf5854bf2b703391d113b17c202abfac1dae56566429bc0165a361bf43117f64e20092aa342e8df7977e90acc5234629a1685d353656cb5619f82b23bdfe437acba7dd535ed9baedf9b1072ff4e2b7d8ff60a087453d08f37162bd1cb5c5caa2d6e3b4b591ecdde715cd42ae07be7ddd7be70fbe15cb4c597efe1aeebadcdb74ab131afd7fe47e644b5154e595d1", 0xee, 0x3f}, {&(0x7f0000000400)="737c1a1b7374bbb719c232ed4cddc048679d6a08a4f75e64af52242a63f14ed1a28c1e1b0c8b150d78f1b7b0310bef2ffbc55e82507b1cbabc5e8971024aae5bf75567903d7287f91473c9cb7390a612e6d2aecf8d8e4adf49de66fc31b2d134e9338e186d68f488ea39d7fa6efc2cb59e1c99bf75455ec9", 0x78, 0x1}, {&(0x7f0000000480)="9d3a9b7cc60be165e7aa88905b6201f3ac84e95339c9ee1c6bb32e580b0a87db12b3a033404d7514afd47b7cafc8dfa93afeb988deec8f4cf952596de7fc93ce58f3ccaa390fdf0e17ab580833c754df353bc2d3aaa3f3b584373a8151d2de60887a5317b53853127ee8501424775c", 0x6f, 0x9610}, {&(0x7f0000000500)="69d618c20621895fe30e01b4b901d130d8a6a9dc1bec07dbda1ff6d82c3c445426f924290fc869a06735ad4cf631d6c81fc973d07d7b27210fb3f14eb515d8c1f3c55bbeecdb3c8244185a7d6f010a9ea785ab69fa636e70e51b8f0e87113a34fc08c2a72356ed94a8b816f038e910198fda4e51a5527c28c876c93a30a77c72d83060eb2cd71743ff088780e569ba7500f2a54085998c41d320ced4109b09d6b92092f24d9924ec409e3bdb20d98c98ddff4f57cd80edac9da7596ef10821a386f2489694e92c9f764cdc7f685ea54d1185de1a8d64e20970ecd4f8bbfdbd6d02bd31f0c9b98397fa06e52908d6b517e16fafdfca76df", 0xf7, 0x10001}, {&(0x7f00000000c0), 0x0, 0x7fffffff}, {&(0x7f0000000600)="522a70bbba960a4bc7b0d2afffd3918fd8f1b88db86172b71de3b2cf8d4fc5f790e5c17b021ff90ab8e602102495ab4e6ff32a297219e6863495c02afc7a4210ca8fccc36128f2bf72a9da23372c9067d9e9aaa9020e6ad1187b23dd777e89e35ad6462849442780d9c80b0ec0c1f538a0177ba08b0e3b7d80281ff332709735548cd7b3225f2da3e4208fe7f1359a937a24423c43f22c774ba10038db001c7e45a7c7e88465d54a4ac6a5d91f48f37acee81b25fe3f89c98fd18440010f0619069be2582ae01b12831ffe34b082eb15bcaaa583cd9388fea82286892a9f7d8636f8b65ea2a745fe5d1f33e3763e6cea", 0xf0, 0x8001}, {&(0x7f0000000700)="7a36badc29804b6765af1011c9f658cc4e4a9908746460cf3fb9bdb40cf07732c343a108f3a03bc8e7d1c7a564ba7aebe4379204c81298a134d876ff395a7a5b8bc463999fe9c204a7463da85a69faabacf272d6c90f6d3d0a7ebcf05991c9d835affbad970f9f698ea3ab7b33e7107bf49710e55259a9da3203836d9e6b20a503d8d37861282be5ec0dad76532e05f150a69b1a54804b27a342ed8ce452f3ffa30c6a237379b2eef7934346e29ab122b59c64a64be6380e542fd923b861dd0cf1eafbc7b3f0ac90be21053518ce6318e077d6bc29d77ce340cc8ad59cb94c726f4bd54cf481f39d3c8f0e3e42", 0xed, 0x2}], 0x1002, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "641a6428c870b402b801881751b8b1a6"}, 0x11, 0x2) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x0) 14:21:39 executing program 4: 14:21:39 executing program 3: 14:21:39 executing program 2: 14:21:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) [ 392.151577][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 392.323420][ T32] audit: type=1800 audit(1595427700.160:217): pid=13461 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16380 res=0 14:21:40 executing program 4: 14:21:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x0) 14:21:40 executing program 3: [ 392.558597][ T32] audit: type=1800 audit(1595427700.390:218): pid=13465 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16384 res=0 14:21:40 executing program 2: 14:21:40 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@l2tp6={0xa, 0x0, 0x0, @local}, &(0x7f0000000180)=0x80, 0x800) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x3f7, 0x300, 0x70bd2a, 0x25dfdbfd, {0x7, 0x7, './file0', './file0'}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0xc040800) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x68, r4, 0x8b8e0eb13081c495, 0x0, 0x0, {{}, {0x0, 0x4109}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r4, 0x100, 0x70bd25, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004090}, 0x4004000) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r5, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}, {0xc, 0x8f, 0xffffff1f}, {0xc}}]}, 0x54}}, 0x0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r2, &(0x7f0000000680)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x188, r5, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7fff}, {0x6, 0x11, 0x7}, {0x8, 0x15, 0x4}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x1ff}, {0x6, 0x11, 0x7ff}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x2}, {0x6, 0x11, 0x800}, {0x8, 0x15, 0x750}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x8}, {0x8, 0x15, 0x7}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8}, {0x6, 0x11, 0x9}, {0x8, 0x15, 0x292329f7}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8}, {0x6, 0x11, 0x80}, {0x8, 0x15, 0x2}}]}, 0x188}, 0x1, 0x0, 0x0, 0x40000}, 0x40008000) r6 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r7 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r7, 0x40003) sendfile(r6, r7, 0x0, 0x2008000fffffffe) 14:21:40 executing program 4: [ 392.909630][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 14:21:40 executing program 1: r0 = socket$inet6(0xa, 0x4, 0x400) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:21:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x2}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000009, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000001280)='net/tcp6\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x0) 14:21:41 executing program 3: 14:21:41 executing program 2: [ 393.290756][ T32] audit: type=1800 audit(1595427701.120:219): pid=13489 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=69 res=0 14:21:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x2fffc) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) r2 = inotify_init1(0x80000) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, 0x0) r3 = pidfd_getfd(r1, r2, 0x0) madvise(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x15) r4 = dup2(r0, r0) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000000)=r4) [ 393.441091][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 393.487792][ T32] audit: type=1800 audit(1595427701.220:220): pid=13494 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=69 res=0 14:21:41 executing program 4: 14:21:41 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000140)="0e43ffab113c5a8ee46525ccd166b128734dd6adefb5e044c5f245ea277e50592f393daddcdd8906dc381b15bfad1298173d82448cc91a3b69a84fbb55e0b9215b056824b92adf0b617c702fa17b9d47416d7e57a009bdcf39599e0d77d0b0651c546de700f7c9a2f7864c2caa888c7cd2cb616e3aac73fc297fdc5dd099bd1f32acd14a76ffad9df93b8ca0f71c8bbdf334fbe7232e69e2140bf6f04230b1d7fb26ea9b737483f3488350514eabf733a430176859baac8e5b363fef4e883dc13a611243600a696ac95c391d8b58aa47f1b0f3ad67fc1d", 0xd7, 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file1\x00') openat$fuse(0xffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r1 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x5, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x82, &(0x7f0000000000)={r6}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x1000, @private0={0xfc, 0x0, [], 0x1}, 0x5}}, 0x0, 0x8, 0x2, 0x3ff, 0xa6, 0xab, 0x8}, 0x9c) r7 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r7, 0x40003) sendfile(r1, r7, 0x0, 0x2008000fffffffe) 14:21:41 executing program 5: 14:21:41 executing program 2: 14:21:41 executing program 3: 14:21:41 executing program 4: [ 394.155956][ T32] audit: type=1800 audit(1595427701.990:221): pid=13507 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=70 res=0 14:21:42 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000000), 0x4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:21:42 executing program 5: [ 394.329271][ T32] audit: type=1800 audit(1595427702.090:222): pid=13512 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=70 res=0 14:21:42 executing program 3: 14:21:42 executing program 2: 14:21:42 executing program 0: socket$inet6_icmp(0xa, 0x2, 0x3a) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:42 executing program 4: 14:21:42 executing program 5: 14:21:42 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x3, {{0x2, 0x4e23, @empty}}}, 0x84) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x380000d, 0x10012, r0, 0x6fa81000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000080)={0x6, 0x6f, [{0x9, 0x0, 0x2}, {0xffff7fff, 0x0, 0x3}, {0x5, 0x0, 0x2}, {0x3, 0x0, 0x7fff}, {0x400, 0x0, 0x3fc}, {0xfe, 0x0, 0x101}]}) r3 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r3) signalfd(0xffffffffffffffff, &(0x7f0000000280)={[0x7, 0x400]}, 0x8) setsockopt$inet_udp_int(r3, 0x11, 0x1, &(0x7f0000000240)=0x897, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r4, 0x0) ioctl$TCGETX(r4, 0x5432, &(0x7f0000000140)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, &(0x7f0000000100)={0x2, 0x0, [{0xbdf, 0x0, 0x7f}, {0xaf8, 0x0, 0x9}]}) 14:21:42 executing program 2: 14:21:42 executing program 3: [ 395.021152][ T32] audit: type=1800 audit(1595427702.850:223): pid=13528 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=71 res=0 14:21:42 executing program 5: 14:21:43 executing program 4: 14:21:43 executing program 2: 14:21:43 executing program 3: [ 395.483011][ T32] audit: type=1800 audit(1595427703.310:224): pid=13528 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=71 res=0 14:21:43 executing program 2: 14:21:43 executing program 5: 14:21:43 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x280000, 0x4) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:43 executing program 4: 14:21:43 executing program 1: r0 = openat$proc_capi20(0xffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x244000, 0x0) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x1412, 0x4, 0x70bd25, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x20000010) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x5, 0x0) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x82, &(0x7f0000000000)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000080)={r6, @in6={{0xa, 0x4e22, 0x9, @remote, 0x6}}, [0x7, 0x1000, 0x81, 0xd940, 0x4, 0x6, 0x78, 0x4, 0x5, 0x8001, 0x87, 0x7, 0x80000000, 0xfffffffc, 0x5]}, &(0x7f0000000000)=0xfc) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000180)={r7, 0x9}, 0x8) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000040)=@buf) 14:21:43 executing program 2: 14:21:43 executing program 3: 14:21:43 executing program 5: [ 396.291794][ T32] audit: type=1800 audit(1595427704.120:225): pid=13552 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=72 res=0 14:21:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x6, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000000)='nomand\x00', 0x0, 0x0) 14:21:44 executing program 4: [ 396.483630][ T32] audit: type=1800 audit(1595427704.290:226): pid=13557 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=72 res=0 14:21:44 executing program 2: 14:21:44 executing program 3: 14:21:44 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000100)={0x7, 0x6d, 0x2}, 0x7) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:44 executing program 5: [ 396.852666][ T32] audit: type=1800 audit(1595427704.680:227): pid=13563 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.1" name="cpuacct.usage_percpu_sys" dev="sda1" ino=16371 res=0 14:21:44 executing program 4: 14:21:44 executing program 1: r0 = socket$inet6(0xa, 0x80806, 0xc0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:21:44 executing program 2: [ 397.189273][ T32] audit: type=1800 audit(1595427705.020:228): pid=13572 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=73 res=0 14:21:45 executing program 3: [ 397.360901][ T32] audit: type=1800 audit(1595427705.090:229): pid=13574 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=73 res=0 14:21:45 executing program 2: 14:21:45 executing program 4: 14:21:45 executing program 5: 14:21:45 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) shutdown(r0, 0x1) 14:21:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r2 = openat$proc_capi20(0xffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = inotify_init1(0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r3) r4 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe4) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r3) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYRES64, @ANYRES16], 0x14) ftruncate(r1, 0x40003) pipe2(&(0x7f0000000100), 0x4000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r5, 0x0) ioctl$KVM_GET_DEBUGREGS(r5, 0x8080aea1, &(0x7f00000001c0)) sendfile(r0, r1, 0x0, 0x2008000fffffffe) [ 397.966517][ T32] audit: type=1800 audit(1595427705.800:230): pid=13592 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=74 res=0 14:21:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:21:45 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 14:21:46 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="000094"], 0x19c) 14:21:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) shutdown(r0, 0x1) sendmsg$inet_sctp(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d8", 0x1}], 0x1}, 0x0) 14:21:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x3}, 0xa0) 14:21:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r3 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) openat2$dir(0xffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x3, 0x1}, 0x18) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r4, 0x0) ioctl$EVIOCSABS20(r4, 0x401845e0, &(0x7f0000000100)={0x40000, 0x2, 0x30, 0x7, 0x3, 0xd3ba}) ftruncate(r3, 0x40003) sendfile(r2, r3, 0x0, 0x2008000fffffffe) 14:21:46 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x104, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:21:46 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x10) 14:21:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r4, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r6, 0x0) statx(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1000, 0x100, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x4, &(0x7f0000000180)=[r2, r4, r6, r7]) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 14:21:46 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000000), 0x20) 14:21:46 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000a00)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) shutdown(r0, 0x1) 14:21:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f00000000c0)={0x2}, 0x8) [ 399.407170][ T32] audit: type=1800 audit(1595427707.240:231): pid=13631 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=76 res=0 14:21:47 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000a00)={&(0x7f0000000100)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000140)='~', 0x1}], 0x1}, 0x0) 14:21:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f00000013c0)=[{&(0x7f0000000040)='d', 0x1}, {0x0}], 0x2, &(0x7f0000001440)=[{0x10}], 0x10}, 0x0) 14:21:47 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r3 = dup2(r2, r2) dup2(r1, r3) 14:21:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0xab, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) 14:21:48 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000340)=[{&(0x7f0000000080)="5d2791ab1254b049e8149dc72e59d58aa040cc5e539d3c90cd6bf1e9316baba76077a12bead7507cdec3f056c35246082dffccc9f8", 0x0, 0x4}, {&(0x7f00000000c0)="548039995833406f0ca4c6deba863192aa9ffc9f1f472574ac9e1881defc994016659a6e7c8336b70ae30ba96cb04bcf89e1f183532ae03b02602e57321b2ed9918ec545f7ab210059c8a71c44795fad038fc662a8e0bb110b0a3bea113558cf32f67290368f2a0a9522df1340de24f96fcb0b34470f6047ff3d38447a", 0x0, 0x3f}, {&(0x7f0000000140)="f810a03721e4f4e15b69b19353b11cc7442ab93c598c334c6a2e1136f49876057ef68c8bdd30f4d62c60f224daff088170fd883a8a408f19d23269a85108f95c9b8236d782300477015f072b93f31de734596ee5834eb8f89574e886b5af1a04f12a5156a3a608e2547fff0be36ebc8785f6a6b78171754af9abcbd3185a4d65bc66c31d4681800440601594cdf519e70cf0c174f93fad69644db4b7c740b6fb0cd88f287d56d2b29abe4628e1909b70f52f05803bae26", 0x0, 0x3}, {&(0x7f0000000200)="ed53bd", 0x0, 0x7}, {&(0x7f0000000240)="97722b20d8f30e237306eca6883e9ce9c54b35ebeb58313ad0c3a9209e5cbe7a3d96ee6104487ff5fdf1dcbfe864a12e274aef1921885620c6fb1cafbbfa79690228f9eb74a9cb37decc2c476a83a991559e8214a09b010a79b30ef2d91a82e6e1365e5addd9a9484b21678d2e9428154f2da6f31f0d0ecb256fa8d42d83636d3749852ac8b50d4084d98a3e8862a7b0c078a6d29bd9aaab745035d5d051e43f8eae2006a9af41e3cd35fa10675510fba046363b38c8e233edb228a6c869efa68dba6bd3eca6e697a9098d5cb0fdca2a1daa921e4571bee1544b3192a789416781825a5f75cbb94ac2c49ccc", 0x0, 0x3}], 0x0, &(0x7f0000000380)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:48 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 14:21:48 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@in={0xfffffffffffffd21, 0x2}, 0x14) 14:21:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x9}, 0x14) 14:21:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000000), 0x4) 14:21:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, 0x0, 0x0) 14:21:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x5}, 0x10) 14:21:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180), 0xa0) 14:21:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 14:21:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$unix(r0, &(0x7f0000000180)=@file={0xa}, 0xa) 14:21:49 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180), 0xa0) 14:21:49 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x8008, &(0x7f0000000000), 0xfdca) [ 401.229904][T13696] FAT-fs (loop0): bogus number of reserved sectors [ 401.236825][T13696] FAT-fs (loop0): Can't find a valid FAT filesystem [ 401.288842][ T32] audit: type=1800 audit(1595427709.120:232): pid=13699 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16367 res=0 [ 401.444760][T13696] FAT-fs (loop0): bogus number of reserved sectors [ 401.451385][T13696] FAT-fs (loop0): Can't find a valid FAT filesystem [ 401.471248][ T32] audit: type=1800 audit(1595427709.300:233): pid=13701 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16370 res=0 14:21:49 executing program 0: prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x8c) 14:21:49 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000000)={0x0, 0xfffc}, 0x8) 14:21:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), 0xb) 14:21:49 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="10024e207f000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ef000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000fb"], &(0x7f0000000140)=0x8c) 14:21:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000280), &(0x7f0000000340)=0x4) 14:21:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000280)=ANY=[], 0x8c) 14:21:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000002c0)=ANY=[@ANYBLOB="1002"], &(0x7f0000000000)=0x94) 14:21:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) shutdown(r0, 0x1) sendmsg$inet_sctp(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 14:21:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000000), 0xc) 14:21:50 executing program 5: r0 = socket$inet_sctp(0x2, 0x8000000020000001, 0x84) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, 0x0, 0x0) [ 402.421328][ T32] audit: type=1800 audit(1595427710.250:234): pid=13733 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=78 res=0 14:21:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000200)={0x0, 0x7f}, 0x8) [ 402.790571][ T32] audit: type=1800 audit(1595427710.620:235): pid=13735 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=78 res=0 14:21:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$KDADDIO(r0, 0x4b34, 0x1ff) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@buf={0x6f, &(0x7f0000000100)="a48b6af9127f31f51e24122b0310ad1d4e8c6c497310d53198329e2005aacc29cfcc0464ee9a12532d3193d9d7ff0a3269856e981097a6a6640a59eb8f8d3bab4afa5f4402e4a6e55f67262b7303c67649679555a111c8f6197b0a61fc1bf0bbeca6820e3b0213be050094e397c54b"}) r1 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r2, 0x40003) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 14:21:50 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 14:21:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000), 0xb) 14:21:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000000c0), &(0x7f0000000180)=0xa0) 14:21:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000000), 0x8) 14:21:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000001c0), &(0x7f0000000000)=0x8c) 14:21:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x104, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 14:21:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f00000004c0)=@in={0x10, 0x2}, 0x10) 14:21:51 executing program 1: r0 = socket(0x2, 0x5, 0x0) connect$unix(r0, &(0x7f00000014c0)=ANY=[@ANYBLOB="8202ad4fac"], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x1200, &(0x7f0000000340), &(0x7f0000000380)=0x1e0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000240), &(0x7f00000001c0)=0x98) 14:21:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) [ 403.560139][ T32] audit: type=1800 audit(1595427711.390:236): pid=13774 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=80 res=0 14:21:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000), 0x10) 14:21:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000000c0), 0x10) [ 404.053609][ T32] audit: type=1800 audit(1595427711.880:237): pid=13791 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=80 res=0 [ 404.194970][ T32] audit: type=1800 audit(1595427711.920:238): pid=13777 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.0" name="cpuacct.usage_percpu_sys" dev="loop0" ino=79 res=0 14:21:52 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x101001, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f00000013c0)=[{&(0x7f0000000040)="64ff2a63d6ec281151fe88fd9670b1e3ef396f7e6cf31530b87a80be2d6f9aa20f6a99c2320b6840e0ad9b020685924073c36133f2485aa3e684ae", 0x3b}, {&(0x7f0000000080)="3356bb027dc11ab368beee6fabffd5b2e1f4cd6a19db7e5e804c418293382c299e71460e", 0x24}, {&(0x7f00000000c0)="7a71f9a4da59d6943a807f09ad033c688461c23f7addeafa1e7053ede93a341dc78a90458842def571f4e5de5539cce19887cd65a2c02abf9e31140691d53c5122ac330d0599a8ed8ed52db8e0cb6444e558bb571b3c01bd57d0a9c446a19610c52532197926cda331f63955df2dab54bdef3c30e4570273f75321a71ee164af05fec3fb80083384b06ba80e6f1fa11709d0626920a8f2baab436059d2ecba8699277ec7e1476676f0443205c3ef3c4520444fc19703fe6e29068455c238f1aad0fee6f0543c998961f72fb0", 0xcc}, {&(0x7f0000000240)="bf3233ee48fc2446f47f4301869c6eb90d8fce7090b7207dc2c5e20b6dc83dcebcf758cd4293c8667a169e43ff4949d96102ce8a5f9355baada1f00fa3df6846ce5b14e4f4906772c5aa7fba", 0x4c}, {&(0x7f00000001c0)="795cf0e7a703c0fd5a2bcff51d6d786209b4a1d9f55265f15a353f093bc0af3619bde4b4268880", 0x27}, {&(0x7f00000002c0)="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", 0xe53}], 0x6, &(0x7f0000001440)=[{0x10}], 0x10}, 0x0) 14:21:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 14:21:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000080), 0x8c) 14:21:52 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000080)=@un=@file={0xa}, 0xa) 14:21:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000000), 0x8) 14:21:52 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000080)={0x0, 0x9}, 0x8) 14:21:52 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000a00)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 14:21:52 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000a00)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000140)='~', 0x1}], 0x1, &(0x7f0000000600)=[{0x10}, {0x10}], 0x20}, 0x0) 14:21:52 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) getsockname(r0, 0x0, &(0x7f0000000200)) 14:21:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f00000000c0)={0x0, 0x5, 0x0, 0x9}, 0x8) 14:21:53 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x8) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r4 = socket(0x10, 0x80002, 0x0) r5 = gettid() r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) setresuid(0x0, r7, 0x0) sendmmsg$unix(r4, &(0x7f0000000a80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)}], 0x47, 0x24044080) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000280)={'syztnl0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x4, 0x67, 0x1, 0x4, 0x48, @empty, @private0, 0x7800, 0x8, 0x80000000, 0x47e}}) sendmsg$AUDIT_SET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x3e9, 0x800, 0x70bd27, 0x25dfdbfc, {0x12, 0x1, 0x1, r5, 0x7, 0x3, 0x185, 0x3f, 0x0, 0x1}, ["", "", "", "", "", "", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x24044881}, 0x4040840) 14:21:53 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockname(r0, 0x0, &(0x7f0000000140)) 14:21:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x903, &(0x7f0000000040), 0x8) 14:21:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000200)={0x0, 0x2, "42de"}, &(0x7f0000000040)=0xa) 14:21:53 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000a00)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000140)='~', 0x1}], 0x1, &(0x7f0000000600)=[{0x10}], 0x10}, 0x0) 14:21:53 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendto(r0, &(0x7f00000018c0)="8c", 0x1, 0x0, 0x0, 0x0) [ 405.802091][ T32] audit: type=1800 audit(1595427713.630:239): pid=13848 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=81 res=0 14:21:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xb) 14:21:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000000), 0x10) 14:21:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x7}, 0x14) 14:21:54 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000180), &(0x7f00000001c0)=0xc) 14:21:54 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f00000016c0)=ANY=[], &(0x7f0000001700)=0x8) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000080)={r4, 0x9}, 0x8) 14:21:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000040), 0x4) 14:21:54 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) getdents(0xffffffffffffff9c, &(0x7f0000000180)=""/117, 0x75) r0 = socket$inet(0x2, 0x3, 0x19) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4018641b, &(0x7f0000000200)={&(0x7f0000ffa000/0x3000)=nil, 0x0, 0x4, 0x4, &(0x7f0000ffa000/0x3000)=nil, 0x9}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, {0x0, 0x1}, 0x0, 0x400000}, {{@in=@multicast1}, 0x0, @in6=@empty}}, 0xe4) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)) chdir(&(0x7f0000000000)='./file1\x00') r2 = openat$hwrng(0xffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x1a1283, 0x0) ioctl$SNDCTL_DSP_NONBLOCK(r2, 0x500e, 0x0) r3 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r4 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r4, 0x40003) sendfile(r3, r4, 0x0, 0x2008000fffffffe) 14:21:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000040), &(0x7f00000001c0)=0x8) 14:21:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0xab, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) getsockname$inet(r0, 0x0, &(0x7f0000000040)) 14:21:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180), 0x8c) 14:21:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c) 14:21:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x3, 0x6}, 0x10) 14:21:55 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000140), &(0x7f0000000200)=0xb8) [ 407.441764][ T32] audit: type=1800 audit(1595427715.270:240): pid=13906 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=82 res=0 14:21:55 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000a00)={&(0x7f0000000000)=@un=@file={0xa}, 0xa, 0x0}, 0x0) 14:21:55 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x0, 0x1c, 0x1}, 0x10) 14:21:55 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 14:21:55 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) [ 407.709176][ T32] audit: type=1800 audit(1595427715.420:241): pid=13906 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=82 res=0 14:21:55 executing program 0: ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000100)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000200)) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) dup(r1) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r2, 0x40003) r3 = inotify_init1(0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r3, 0x0) fchdir(r3) r4 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000001c0)={'veth0_virt_wifi\x00', &(0x7f0000000180)=@ethtool_gfeatures={0x3a, 0x3, [{}, {}, {}]}}) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 14:21:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r0, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000040)) 14:21:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/212, 0xd4}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/163, 0xa3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) shutdown(0xffffffffffffffff, 0x0) shutdown(r2, 0x0) 14:21:56 executing program 2: r0 = open(0x0, 0x0, 0x0) fcntl$lock(r0, 0x0, 0x0) r1 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x10000, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000280)={0x1c, 0x1c, 0x3}, 0x1c) socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x0, 0x0, 0x0) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) dup2(r2, r1) 14:21:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f00000013c0)=[{&(0x7f0000000040)="64ff", 0x2}], 0x1, &(0x7f0000001440)=[{0x10}], 0x10}, 0x0) 14:21:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000280), 0x14) 14:21:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 14:21:56 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000100)={0xe, {0x4, 0x0, 0xad, 0xb1, "301334ae9f9fb9a46176ed1eb60a489e451804fd96a63e338d30a6d87f5a9fbcd370aa71b05d2e9f32f88b28b983b8ed38c2313bbde2c89750157ede31f228f25c4c3873caaf635999678204dbd67f4ebd430b4bb828d862b02f3a344bdc1fae8bb1249dbbbf530aa45a37703932f8cd118442c85551380f71a18a4faf40b1af4a57e203e01318e18bcd8cf98a09e48f3cc149e17f00553ad84c021ddae96b293949f8e108e5e4aecbb97af3d75c8a6a47"}}, 0xbd) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r2, 0x40003) sendfile(r0, r2, 0x0, 0x2008000fffffffe) 14:21:57 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000200), &(0x7f0000000040)=0x8) 14:21:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000040), 0x4) 14:21:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000000040), 0x4) 14:21:57 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000a00)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000040)="8f", 0x1}], 0x1}, 0x0) [ 409.312109][ T32] audit: type=1800 audit(1595427717.140:242): pid=13977 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=84 res=0 [ 409.504041][ T32] audit: type=1800 audit(1595427717.340:243): pid=13982 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=84 res=0 14:21:57 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0x9, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v1={0x1000000, [{0x80, 0xffffffff}]}, 0xc, 0x5) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) r2 = openat$sndtimer(0xffffff9c, &(0x7f0000000100)='/dev/snd/timer\x00', 0x40000) ioctl$FS_IOC_GETFLAGS(r2, 0x80046601, &(0x7f0000000140)) 14:21:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000040)="d8", 0x1}], 0x1, &(0x7f00000001c0)=[@sndinfo={0x1c}], 0x1c}, 0x0) 14:21:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), &(0x7f0000000040)=0xc) 14:21:57 executing program 3: r0 = socket(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 14:21:57 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x14) [ 410.198366][T14007] FAT-fs (loop0): bogus number of reserved sectors [ 410.205894][T14007] FAT-fs (loop0): Can't find a valid FAT filesystem [ 410.270644][ T32] audit: type=1800 audit(1595427718.100:244): pid=14013 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16372 res=0 14:21:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, &(0x7f0000000380)="ae", 0x1, 0x0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 14:21:58 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f00000001c0), 0x8) 14:21:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000000), 0x4) 14:21:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000200), 0x8) [ 410.404496][T14007] FAT-fs (loop0): bogus number of reserved sectors [ 410.411268][T14007] FAT-fs (loop0): Can't find a valid FAT filesystem [ 410.497578][ T32] audit: type=1800 audit(1595427718.330:245): pid=14013 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16372 res=0 14:21:58 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000140), &(0x7f0000000180)=0x8) 14:21:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0x2, &(0x7f0000000140)="a690fe4bd8de836091e061d294d6213164da461066cb1d0e874fcda724de8042f62bbdfb07d18b3b4dc3dc5e0b267bdb762376ee06f9ad229b7ec4f3901d8a03018fe69bf26a90d36b2ec89eadc6661a696c1020c10a0db9f8f5d520c1deab0828d6db43879a957eedccba454484ea13558580979475721fc5631b2a115a2be1e147426aabce75f94fb1f33ed7", 0x8d) ftruncate(r1, 0x40003) openat$audio(0xffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x5c20ddc954897c84, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000680)='/dev/vcsa#\x00', 0x4ba3ac28, 0x4000) r4 = inotify_init1(0x0) readv(r4, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r4, 0x0) r5 = inotify_init1(0x0) readv(r5, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r5, 0x0) sendmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000280)="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", 0xff}, {&(0x7f0000000380)="7a6311145bb1b120c07a", 0xa}, {&(0x7f0000000400)="90ac9cda5a27a078c58b458ba29470bdbc612e168ecb31d18708b37fe60c60aa3be0749f7f2615110971c42f0dcc4c6c2638087915718de50541eebb57ee4d32f40f3cc74bd3f5d4416cc02d17f7853d505e1a545b22a671d2bc5e7dff587a1fd48e35532c7a136dcf38ed6edd433940c09d6de3a496e50aae84b4222b8f7b8aa56d", 0x82}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f00000004c0)="acc60e23f3d9ed8cfe0e37e86a69f99aa7d38d8327353c8262e3f4339e2d9627603a98bbebc5a84a0af381d103a87dd2d85a638a73bc06d6fcefb01ff7a94372d811bd56a26bb150e49dba1b3e9972b84d3176f2b0116aa7b492e82600d1e6fe01aafbd8d9c06ba5289deaeea375ce", 0x6f}, {&(0x7f0000000540)="e2f280da210a239520e8884438f132ca085fcf578bcce142f4f448d042ac0da211697afe087ded3737c565613b02ae01aa2313872a3268224402849d0fb57a30d915cb7436b0d6e857c68082cf993f00008278", 0x53}, {&(0x7f00000005c0)="9fa2b3cbacb2ce58822ffa56117c0b8c2ffe7b434ae9ada88a3d3cb36bee6cb5bb0bffe1fca3c2b92627a52f812c09b51cbd284f791666b5121219fbabe8f0cde97305ec3df4b2fb595b991d", 0x4c}], 0x7, &(0x7f00000006c0)=[@cred={{0x18}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r3, r4, r5]}}], 0x40}, 0x40) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:21:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffa}, 0x14) 14:21:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x0, 0x5, 0x8}, 0x10) 14:21:58 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x2010d, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 14:21:58 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000a00)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) shutdown(r0, 0x0) 14:21:58 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000000), 0x10) [ 411.079808][ T32] audit: type=1800 audit(1595427718.910:246): pid=14035 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=86 res=0 14:21:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000780)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000700)=[@authinfo={0x10}], 0x10}, 0x101) 14:21:59 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x104, &(0x7f0000000040), &(0x7f0000000080)=0x2) 14:21:59 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0xfffffda6, 0x0, &(0x7f0000000640)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 14:21:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x3, 0x8, 0xd10}, 0x10) [ 411.754364][ T32] audit: type=1800 audit(1595427719.580:247): pid=14061 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=86 res=0 14:21:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000200)={0x0, 0x7f, 0x1, "81"}, 0x9) 14:21:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x8000000000000001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000280)={0x0, 0x1000}, 0x10) r1 = dup(r0) sendmsg(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000001c0)="b6", 0x1}], 0x1, 0x0, 0xc}, 0x0) 14:21:59 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r1) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000100)=0x4, 0x4) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f00000013c0)={0x1000, "130ff31a057c13a40c19cee64eafe316285e8ced5c90c9c9f0c378fd4d20c13b82af704607c5e99073ce42ea2f4a7d04399cccb8629f571a918b512e4b3f9e7fa5a6e70e2be95c343a25d1dbb5086283f71048e9626586d36f888c0d57a355dc022771d316da1256c3294ddabefe88821c773d08aab4a203824ff82f687bd584d5dc27786dc70254ebe186d6ae30696d97edddc299d41b155c6e9577f5bd0a1f281abe7d75cb48bdd0b90dd1ed7f56fece417055f678a95c3d705ef0b82305cf44f55ce26a4e5e98cd1b3a8a9d902191c07a39ec61745f0edc03e0f49496b444c73af2d02158fa3b36093b1f6e9d5f75ee679eae5f8b9d20d89ba71f7d3e03ee3fc5f34a1adb75d966c83d979bf7f48b8fc2c6bb4992b07b5315c1ffed56e90d428bb5640f47efbfd832cd4471a897c6c37d09c7b82ede95293d74b8a916a6038b6e86a553f9c6ba1eb3da502faa4b1f90203b485c5480ef3e493ddeca3e487ffdeddba7bf6cdbbf7d56652deffc6825472f83d1db3e1bcb5d392fc6d9866153a85fd6fd09ec68fe79a4cab98daf960442903638d7e0ef2de2654c5cc30f3a4cff46c03ed5f235b0b819592d817701a5e2f34acc5f4090e9cafaf48cfd866774ab2fe8e5c4e0a14e68f4ab3eef0e313298d4abb966d983e1dddd80c80cc85512623d515f89b38b7f83409ca9dd0ef86e1b405128f314fac32259c075b2f73a7e461bb84d4e3c06fc99c31e53ecf84f3d71f26f6b67503ddc2a9fc1744fd0bdf754e32e01d88bda3102210e7a33c994a584e84ba60a86b4355ccd4b144b23228dc005cc349e7e2539a59d9b0977fd066c76f424037f993889d142d65e70818b5f2e833b41c46ff98d090c2f8b8dae5471dd89da38378835cc82f654b34eb138ead4b7758b97c4ce8e99a0245f10568b9bf07417399c6007f989cad215f92c2f3cab299f612234152a52b44101652593315d482f22a35cc6a5384426b0d1d65403cd54c760a67196531218d5b28b860984ebe937929a66e4239e602314bac493070fc04c1880682e6fc364b42ff97635ed003f00eb34a5c9e7ee18b89166e82d2088dabdc6f33bd2cb7d2f2aadf508f609bfb671aec5f899446df7b4d677f2c79432cdd4dab9c6e80bf7642a5e0571617e728ecf9075379ab735e315a311e70e5cdf76b96dff04c1ea3e98ecbab2aa9910f45eb42bc03c9ffed44dbc18477bec4531693f3fdef4729e520fd97256640c1a21f53f84d375eb4ca2ca0c1ce277bc97fc93eeea7f27470efe503ac55be578fb67de7e2db97659f7cc0e58cd75b75a1709771a6b32631b25ad641a01c0444bbf5de672fbb6a22453738f920c40aea4911e38efee8e7f1b43fb9e7216ac39fb9b335126a29ec23df48c41deae39ecdab1e3c1e6407e02645dc7681ab1c450c8d69746f824f9709510d50fc1773e33c23433c07ed5de6955810147463909678d1014d2a61d0783249cc571bc27345c7ca139a79c358f664702381935a3e5a8256068de873ab33da7c6e9782d36265b83c4bbc3ed594301b71df8d18df3b109562a9c319fac81f9c7e443ff0d9eb1ed28df2cadab0368c73938c1f3a1a91197b95d37a0d5a68f1cd09c3e13842842145c61fe50f71710aea7ee6eb1443fe6761c40804739f870345ca4db4a6485e97d72380134131dacdfb0ff956717d0cb7b23d00b2e7a99046beced6883c38a834ca37a439827376aaf302d60a21b1fba951f821bf9712777c44b9e395051c0c8e424d052a8dcbe666d51d795b1a0ef05c487ca25fbfa83a185fcee289a7e13ddf38c730037a71b580e9be8c41611269cd2651f7c62e32132a40e8ec627f7170f5d6b5b65db334d8e9dd737b59b2447ae3de0688a7039369c748ae5635c2df06779af3421b4f608a3e1ac6a2a9da726ad5c488304bbae21fe0ce9a636b063f3dbdf2adf045af893e753c444136eac02a7a8f7e8959d5c71fb020ba62f76ca189cd92beb2b0c7a8f6d7827c80168728999a492ceefcee16d4faa65dcd184545527f4d3fbb739b539fd321e9b3cc804162f828e6796b560d3594bde854d52805f4cb7c0553a4b6d598d77093efc41f61aef8f66c570821dfbad56fcd3f86cbffd96762c1b160ae4f04ebfd24aee7315aca641e08caed0d69634c0651de5ed7e15a65fdc90413f662de6bcaba953439c3e5829b2e95a72325ebe7c620e78572251d5416383586c5171a04de70a2c393ea4500bf89eac8c7dd210cc92647993495d3388eec42970b1b83800d1524d7d0ef140304f477a1ad8f07839f2827aeb15e65a6f907b4482918d8a548eeaed7ce96c5b69ef3eb2aa77ff160cf08ab6cf96e15e2449308f31d2ecd7420543bf6519afc1c13a94c9b2462ecc143e10402e9f99e41d684e91dc27246e07c85eae5e77065f7d1e6f2d56e53632c416629b4967b6045861ba1542b8c99a9383a078effb92f60515f7f510f1fd755e134752806a382e4bf16516679a2ea954446a843daca574b2b6ac634f025524ab63ae9453f9ff2a1979e1c0c2ee8276e5c0fa85fdbe4a91c92fe8bfbcd86b98d2a9132d16cd1f8afba4f68282a99d0eeeaac3b19377dce6f4c47f7dc993c836ecec215a7efa078974db4a47894ae33f61a327151a824e22ba5314bf24f3533e34effaeccc91ebe4cda44f7e223531ff1322b7988b12b1b8bf8f0dde27a3c33199e25512e494f9c9c6c45519e5f8069dee44a525da16441e3f8cd3a0c9686e60622868a0ed55812870f65b48c0baea10797f69aee8544cf52da16c0940fe263158adff0e115252e5895d22ca26e9cd8af7092ad1484c0f5efb40f65771b3b4cca539b3164207986b22f14003709f5e769d2715b0c50a03dcc01ae033f7d5ead90f3116eed993d39947ae6de51888ff8843479f77986a2981b8811096219547ce546a0e4c065c0b01511e6a332c1666e2a111a6552330bdaef1c11479a07d56f30ac2a23071910d531310da8961bae1870936da94702aa0486a008a1b1d1f7fa4a47f8815943029adfe4b95532651d90fe9dd423d880ae91597b7fec2b080f3ae61229a0ebbdce7f31c43e8792f99441119a30f8e5089e504c16571e196b808d22f52bd396f374acd0d03b6435281a06f32b476e6aede96b278b7717521b0332302fbf955c3cfafbc86a9e6ee9bcd897ac0429b7bf87eadbbd5c70fcd412500d97b82bffa6729ab33a72bd0282a5d8bf7d1e9f9182ff1c85aa5b6bbf24a9e6b73b5ad67434f5eef21440eacbd5a1c44f2a16de07565e0f251b8b7dcc4cb4fbbc49ea6e2e9de4e6e81e27396534fea30db52f4e2fd489953111749147a252a8cc5f6e96426bf5b5e099f56d77c14ce27ab377546dfdc1605c009c0732a8bb7df8debb7cb2e8e6f55b9c24bc14c09a09564649f0586d4dec1f2dde70a522c91eaacb9fd0b580ba895e5b98e39816b4e8fe25825d42e8598c3dbb89bc0b20df8cf30fd3afd8d8958135ae00cacfa2b7af76a765767d7bcbe59052121c3db37a5c0d55e2ca142779ac36456c83694aa53af4645b994846775876e4c93880d925fff225d15548010f24774802ae0f5c648c3ee1e21a89911ac48eac07acb999099beed1f398ae66eb11a395000ff7cad35afe5f21e5b50989c541cc3b118edbb804d9ca0a07cf2c7b8c57bafdb8102ae98dab3cdc9772a35edac69c2d9ca080603b6d614050a2404e0047502574d841984a029ec0b992930c3371f238089cf51fea736dd4e632073b0b04d6f77a68cb38b3f22d48a2f6398b7f00e3ad3e2e3e2516feace72eb0ce2dfe01211471a376893748bbe5f522e89c85786a6cd07d9fec24199a4fb5545bf93ebd7ec9225226cee80d967d8cf6eb829a07d5b6a28ca19aa1f9ce9ff6dfb08e56c5850b675e92d11b5a9b3a0692a4d61b05b1b558ae6159e011169e0c850614e68a4b2350db7a7d67118c66ca4a409f5f609d9f10b77adcf1af340db5a17d15b7955ee77be1e1b3108f0a2961f38c5056393f0c275202ce059b1e1ec731f1f4758dac6a9a0b4bb45fb0dde3b1c757075749a42bea8c328af7255358dc3de53e02154949201f56692fb87bf0d1e3a16cd3aa92bbe4a982385f755d6544ee8881fe57c2dd03de4eb95f148a3bdc3c900650269054c3c71dc6f50dec8b7730db20738d281d12631cd122cc1deb06f33a536f1f75c26c24062f4586a7422861189e8d2f7dd7e4a1ba8256e790eebdb325cc554f5975fbdb1da4b7c6b9132065ddd0de363c81cb7316baf0f833bee8541d9c9d8493f5b09a27b17be6fa6bef974d2e24669e955d6f534a48159373d0e4de8252a204073e71ab077076e53c4fa2dfd1c4fd61686eb36f1a539914aa8b317d62a609b77b152f6c4db06661c44d897d38969b95b27562073dc279f6b7671da94a7b6a56e4eb73213ba67592332bc2d67b8eaf4c423b46f0beb9d9077dd27d48b9bcbe1ce602c928e247f1bc149f48deb31078baa2a3af7cdd26bea7432a4e784dd3ca82e45bdf964383292e91faf8b81c6e0b144864fea09b6221ea740e1a9fb5f70fbac4cd92c3584e841c7e9d57414a9abf44ea9abdbc4021d44750e4cb7d5c107f577674d9b1a4f5c4bc7720c4ee20c13c46d3dec703c196e51f6c0969f14cd1b1e36aaff9983da99def627fa6821b9dcea915a927136efa37ccef9ec823d2969ed37f02fd5b8763d25558c83cee0d4fc16b36595530931506e472232b2579e99aa403e5005e111412390b7a3bbfc4283b151ec9b7f077985ba07866e26f883e4840ee50d6bbf75ee907f34c6d229fd4c68da7b065e0984d32ec5c8d7c5225dc1c3e5cf9a623e26dede6bd2f5f83005f1b9588d7f47c3971422b1e182b9924ec5f74e204b67d826844cd7e852c42eddb70251cefa783e604610cd06952000f6602370ec4a77997b0c57ab6a1f358a1cb3048dad413fbe310ca84fe523ec424f53d7b29941ce61bc58f498c4f7d5d6ba3e34c6b54b38310b98ff098a3b0db4e5751810aaafc8e08df737086ace48a64da09def5cdccdacaf9c788e665aa09e12b03810549af4668e59189f540b766b0f20476b810bd7fb26ef4c1130bedf9335ca947671166f9f869de1a14d8010c03a0162c7f86fbbb4f1957d1215f87d85d48cc20c5a8f1697c6e82c7800fa40093eeccddae5db421040cf25cd8e81aff8531e8cdbc196b6d510f326f2c0f5d4e27233d74ad1068c0778b829871fe9cb2291a0686bab844323cafe31668a785542fb08201ea441bf44ffc6f0c348c3e66ce582255008000d32a6b96a428933fcd8eaea2546255b5663370c8335d23faad155fd8265ba40d0643e4ccef243730f1d49dbfe02ed910ea1cca7cd273dab7bb213626c7a83afb071639d821fb815bdd39496ba9e6094b87f02ab9e77ea13c9a716494de9c889125295f0636264db6f494a06ffe1bb2f5ef784d3cf26eb0be037720598aeb91d26275772b6be1d7fa1eca6f937d163e253890dd793a137ed95dddc58370dc792f2964ecf8ba40d7d1a3761be1e1d9fccc5063a42b7256583386a732c24be09ba94b84d6624b2515c6283f56ad2f27115a0e7257f3a4925724c727c1d74169ad6e89d489b48e02adbe50ea642f155062b8bbda88405b7d5b070d8278017062c100035338f4524891bece3b84d5da15667099206d47f321a4f565999aed0f5e1879a7d411678562bcb70afc30f5610e40103677861feaf74fd055de241291e4e54693526197eb57901da596916b43a74fbed10b8736b88b4d816b334b807a6e9d72e348c5a570996209de55b1bd7fb2b08"}) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x5) ftruncate(r2, 0x40003) r3 = inotify_init1(0x0) readv(r3, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r3, 0x0) fremovexattr(r3, &(0x7f0000000140)=@random={'security.', '/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli'}) sendfile(r0, r2, 0x0, 0x2008000fffffffe) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) 14:22:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000100)={0x2, [0x0, 0x0]}, &(0x7f0000000140)=0x8) 14:22:00 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x2018c, &(0x7f0000000640)=@in6={0xfffffffffffffd91, 0x1c, 0x1}, 0x1c) 14:22:00 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000a00)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) 14:22:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000000), &(0x7f00000000c0)=0x8) 14:22:00 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000000), &(0x7f0000000040)=0xb) [ 412.611318][ T32] audit: type=1800 audit(1595427720.440:248): pid=14090 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16371 res=0 14:22:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2}, 0x10) shutdown(r0, 0x0) 14:22:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x2, 0xfe}, {}, {0x5}, {0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 14:22:01 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x8, [@var={0x5, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x0, 0x0, 0x4}, @volatile={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e, 0x2e]}}, &(0x7f0000001340)=""/4080, 0x48, 0xff0, 0x41}, 0x20) [ 413.255725][ T32] audit: type=1800 audit(1595427721.090:249): pid=14094 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16371 res=0 14:22:01 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe10, 0x9000a00, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 14:22:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:01 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r0, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0xfffffe44) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c00000010008506000010000000000000000000", @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000180)={'ip6gre0\x00', r3, 0x2f, 0x1f, 0x7, 0x1, 0x7, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2a}}, @rand_addr=' \x01\x00', 0x1, 0x1, 0x798c8600, 0x7fffffff}}) r4 = inotify_init1(0x0) readv(r4, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r4, 0x0) lseek(r4, 0xff, 0x1) r5 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r6 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r6, 0x40003) sendfile(r5, r6, 0x0, 0x2008000fffffffe) 14:22:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000300000000000c00095000000000000002ba728041598d6fbd30cb599e83d24bd8137a3aa81d36bb3019c13bd2321af3cf1a54f26fb0b71d0e6adfefcf1d8f7faf75e0f226bd917487960717142fa9ea4318123751c0a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b32a83438810720a159c9a903634e369a9e152ddca64057ff3c4744aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c39e4b3449abe802f5ab3e89cf6c662ed4048d3b3e22278d00031e5388ee5c867ddd58211d6ece1ccb0cd2b6d3cffd963218ce740068725c37074e468ee207d2f73902ebcfcf49822775985bf31b715f5888b24efa0000000000000000000000000000000000000000ddffffff020000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab3323aa9fdfb52faf9cb09c3bfd71e193ce429b5ed209000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f03000000000000001cf41ab11f12fb1e03494007000000c6592df1a6c64d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b540500a30b23bcee46762c2093bcc9eae5ee3e980026c96f5989b8e673e3296e52d337c56abf112874ec309baed0495f06d058a73651d6fe048ba6866adebab53168770a71ad901ace383e41d277b103923a9d971f7a2591dbe4a92473a10fe5762448d16286744f83a83f138f8f92efd92239eafce5c1b3f97a297c9e49a0c3300ef7b7fb5f09e0c8a868a353409e34d30104000000000000d380a447483cac394c7bbdcd0e3b1c39b6e0c410ade7a36b2635d60916de48a4e70f03cc4146a77af02c1d4cefd4a2b94c0aed8477dfa8ceefb467f05c6977c78cdbf37704ec73755539280b064bdaba71f897144910fe050038ec9e47de89298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06dddeb6179925b55ff413c86ba9affb12ec757c7234c270246c878d01160e6c07bf6cf880d29621c3ffd59c3a0d062357b22515567230ad1e1f4933545fc3c74137421166596b63b1dd044dd0a2768e825972ea3b77641467c89fa0f82e8440105051e5510a33dd0c2ab3e2dcda5e143fbfc7ee9fb2d92d6f45588171221fff161c12ca389cbe4c51b3fa00675cc175067d2a214f8c9d9b2fcf63b66c5fd9c26a54d43fa050b88d1d43a8645bd9109b7e07869bba7131421c0f39113be7bdd7115c7ba680b85d7d3aad0b2f6c7a8400e378a9b15bc20f49e298727340e87cdefb40e56e9cfad973347d0de7baff231a1b933d8f931ba3552b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2af79b8d4c2bf0f7a2cb032dad13007b82e6044f643fc8cd07ae636a5dbe9864a0a7d27326850a7c3b570863f532c218b10af13d7be94987005088a83880ccab9c9920c2d2af8c5e13d52c83ac3fa7c3ae6c08384865b66d2b4dcb5dd9cba16b62040bf8702ae12c77e6e34991af603e3856a346cf7f9fe0bc9f2a1a7506d35e5eb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c010000000000000048a9dea00000b91d2309dc7ae49e4d5f52053a39e7307c09ff3ac3e820b057dd74d4aafc4c383a17bc1de5347bb71ca165cbbbaa2935f602327484386b21b96492ae662082b56cf666e63a757c0ef3ea7af6881513be94b362e15ffca8ec453b3a2a67aedc002d2bce4c41ed04b790a8ccc9afe09d3f8dbbe333bc0f128270de700a1222a27e3f310a3abe884fd2fe21133279118c603769b17ab27fbe36dffef6eaa58adf18642b2d144d88ba63587b79b079999a24fb263c8cea69818b70911edc6a089fb05d3edc2acfd3b95d871943c88ab3f1f7d5349c57719857a1c364f6256f67f0c70be1fae38fb2bf58a1f047261af205369be5fb3eab7a3270b98843f8d5622ec583845aeb52b953ab074ce699ffd2c5709b40e27ed624365ad76d17f08df570e690e9f2e6742d12fe8192fa2aebc7bed7ac4c07d7aac19ccf63662c342643e470360e019839edc48e4d23637369efddcc4206742eab7d160500057429034d347865dd5ecd2c6a795dba6c79815002e009c6e4d36bb176196c1e203c141c"], &(0x7f0000000140)='GPL\x00'}, 0x48) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r1) 14:22:01 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:01 executing program 4: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4ea00) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x4, &(0x7f0000000040)=[{0x2, 0xfe, 0x2}, {}, {0x5}, {0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 14:22:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) [ 414.150895][T14140] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 414.220423][T14140] bond2 (uninitialized): Released all slaves [ 414.272803][ T32] audit: type=1800 audit(1595427722.100:250): pid=14149 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=87 res=0 14:22:02 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) [ 414.787953][T14149] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 414.853560][ T32] audit: type=1800 audit(1595427722.690:251): pid=14173 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=87 res=0 14:22:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r2 = socket$kcm(0xa, 0x6, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @loopback}, 0x10, 0x0}, 0x200408c4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x4, 0x0, 0x0, 0x40020000}, 0x6d70) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={r3}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r2, 0x10d, 0xb, &(0x7f0000000000)=r4, 0x4) perf_event_open$cgroup(&(0x7f0000000000)={0x1, 0x70, 0x6, 0x8, 0x6c, 0x7, 0x0, 0xcd, 0x50091, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x401, 0x4, @perf_config_ext={0x97c, 0x8}, 0x45c3, 0x2, 0x5, 0x8, 0x4, 0x10001}, r4, 0xd, 0xffffffffffffffff, 0xa) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffe0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) [ 414.910069][T14149] bond2 (uninitialized): Released all slaves 14:22:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="1600000016008105e00f80e045e4b37c4cb33fab463c", 0x16}], 0x1, 0x0, 0x0, 0xa00}, 0x0) recvmsg(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x0) 14:22:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5091, 0x20000) sendfile(r0, r1, 0x0, 0x2008000fffffffe) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) write$vhost_msg_v2(r2, &(0x7f00000001c0)={0x2, 0x0, {&(0x7f0000000140)=""/15, 0xf, &(0x7f0000000180)=""/8, 0x3, 0x3}}, 0x48) [ 415.447099][ T32] audit: type=1800 audit(1595427723.280:252): pid=14191 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=88 res=0 14:22:03 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:04 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'team_slave_1\x00', @dev}) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000700)={'team_slave_1\x00', @broadcast}) 14:22:04 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000100)={'macvtap0', 0x32, 0x39}, 0xb) 14:22:04 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000b00)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000613756ca1fdec1cb8e17cda153ad0726c89cdaceec68f0d9a3b3ecf09b358159c3273494be17dbfe5c89a7a3da82c7c281f50a0f60206d0e9a4f04ecdf23fe38034b25b3378ebfba332eb9a44406e023c2f9467e079d39e91b0401818513f81839e262c27ed72705f0207d917e7b1314227b002049aa5da6965c5d8bcb7139c535ab17363c1947301ac0f2418894458e2ef584d4e3887d81651ef59a648ddda847af23e32b9e82cc177d5da467ab5d51b53854398729005f549670aa5eb3cf8ebfe1c146f28f7e09e83f5353520cd1f8e3cf30a5d59be6124b05dcc7b4b423fdb038434ed37d405f9073909b16ac971e80ba4e2943a8648966b3076bf7f6c3bb34"], &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x212, 0x10, &(0x7f0000000000), 0xfffffffffffffea8}, 0x48) 14:22:04 executing program 1: 14:22:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000014bc0)={0x0, 0x0, 0x0}, 0x0) 14:22:04 executing program 2: socket$kcm(0x2b, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:04 executing program 4: 14:22:04 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="300000000000000084000000010000000000000007"], 0x30}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) [ 416.683879][ T32] audit: type=1800 audit(1595427724.520:253): pid=14222 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16373 res=0 14:22:05 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x1e) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000001c0)='cgroup.events\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000040), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000040), 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 14:22:05 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000300), &(0x7f0000000400)=0x4) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x800, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f00000004c0)=0xe4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@newtclass={0x40, 0x28, 0x10, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x10, 0xfff3}, {0x9, 0xfff2}, {0xe, 0x5}}, [@tclass_kind_options=@c_drr={{0x8, 0x1, 'drr\x00'}, {0xc, 0x2, @TCA_DRR_QUANTUM={0x8, 0x1, 0x1000}}}, @TCA_RATE={0x6, 0x5, {0x78, 0x20}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x11) readv(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000480)={0x15, 0x6}) r4 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0xfea7) faccessat2(r5, &(0x7f0000000100)='./file0/file0\x00', 0x100, 0x0) ftruncate(r4, 0x40003) sendfile(r2, r4, 0x0, 0x2008000fffffffe) 14:22:05 executing program 4: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f40)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4a06b29e220dc28dac72599456d464419e5b2fc70b72c0bb8e90f61cc4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a20819e02cc22e6b652b1673773ae3cab8d7674c6c4dca2f1b4d745fd95c41f9d441d42f49db6d4a4762e5cc23dfc1adafd1e5a3e7f2e888961cb43e438c4e41ae43ea118e1407a601dae4b8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa2285b6e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a0e3ed34258b8c9370634060105baa664953514605fba3973aa021945b985a8a66e9cfa9d9e57033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13df15d792e604a4f279b3bd6621bdf2c17bc0400000000000000ff8dc4006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11a755761fe46169b2b5b8cdedb695cc425fe203d2f2655a76865c2cb4e2470fcfb1248c0add5431a7fbcb0ef4f66809af93a09fab1daae4b518d7a5d95a017864487366d6d7ee7bb00200000000000000c60fca2e2981b22d08f874e0a9cb6fca78d6f1b18fe380df4bf024f120bd715d82033f2fb7d8fc9e0d773294e097e293db58993c0024ab2fd8e5e7003af92d11de48e8b4d32972cba6f49051cec1bf6f16231bbb90a2d201e5a47811a2278a03bf7700b06fa191ebd3a0c2ef0058ffebd7ccde24f18e4bf7156edc4ef81f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f83074192c48c63384f52b8eeb70571e5bbb3e6d2b5eba52bee6f81968981811f832d064048c0e0bbe46984b2f0d0504255c22ee8674053d0e160e525536edf56a93d0a7a6f088925e872ef8b4f31e6f57ba631baa729031aae25c5e8ca4f78d5a01308243b08f1caa46be5d1ed5c8d2f4dd054083144c642f71cdc8e5634c1360c056430f677ee7ed7ac1f9743786b2fb8d0fcfcc3d36c93230b7b059bc295aa0e38b1c3edc349ab96e73d2060acfd8145e4a5851bc4d6fd6741fce0834c65c5ad939d7795f3879baa88bd0c84892c97c80987e5c7954e9f3694d116b01ce0b8ef953de70e7ce0311c8b018956f8a42ca26ab295f1ecf617a8dc38e525f415a1bd46b3bf627f79867f520078fee48f83b5989543729e57a9e1d686bc86cd51704f309130f5347413776a7b7bea3c46c0c4c4b7c27c45057d95ac85ac1cdcee8e6fa31fc02137ed1fb4a314a6f0b9352be92986d63263b1aa5264cb4a82cf083de3b4ab6368e95dd4fdf6710cd4a79651dc3e1e056c3ecd6b51f30663cc256094c840662e09af831b7bae9aec6d7259250016795cf91f12dbb72fc321c3dfb5f9181529906b43f9d6b8ce9fad13e1085cafd41183908173e16e40037681835aa080f34b87bba0be276340295062f671e933292e32036cbd03f9a4cd660a94374b013e9f32a6bfb65417b537cd8f67f975358140384a1ca0537fd3a2a2c37006e4b30ffe469bba4251aa3ba4626acd810000000000000000ee37c63f7f295579f542b12f248f4b6ba14448abab540fb7d98a081f3d3c946455d61734855005bcc876bd15a76dd552f9bfeb091a4e82a5d11033e528b133103f5592d5684a57dd70556818ea30e03dc2a6eb69423e4f27034351809da4e5002aa346d4d3e0e2a5a9ba1130b4fe983fc344c1de9f536cff06187599523cbddcd8ffc2d11d5db7712be71c0d74a5ae4e8ff6e65238bb23ea2a979d3e8ab83857a1607dc612f0d84492279bba5ec6c5cea6af9d00"/1523], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e090000633a77fbac14143fee", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) socket$kcm(0xa, 0x6, 0x0) [ 417.596568][T14229] device team_slave_1 entered promiscuous mode [ 417.607183][T11672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 417.785871][ T32] audit: type=1800 audit(1595427725.620:254): pid=14251 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16366 res=0 [ 417.791157][T14242] device team_slave_1 left promiscuous mode [ 418.029205][ T32] audit: type=1800 audit(1595427725.860:255): pid=14250 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16366 res=0 [ 418.212303][ T32] audit: type=1800 audit(1595427725.920:256): pid=14250 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.0" name="cpuacct.usage_percpu_sys" dev="sda1" ino=16365 res=0 [ 418.304440][T14249] syz-executor.4 (14249) used greatest stack depth: 4296 bytes left 14:22:06 executing program 5: 14:22:06 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 14:22:06 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="300000000000000084000000010000000000000007"], 0x30}, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 14:22:06 executing program 4: 14:22:06 executing program 1: 14:22:06 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) link(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r0, 0x0) unlinkat(r0, &(0x7f0000000180)='./file0\x00', 0x200) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r2 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x4) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000001c0)) ftruncate(r2, 0x40003) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 14:22:06 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 14:22:06 executing program 4: 14:22:06 executing program 5: [ 419.105713][ T32] audit: type=1800 audit(1595427726.940:257): pid=14271 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=90 res=0 14:22:07 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) 14:22:07 executing program 1: 14:22:07 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) rmdir(&(0x7f0000000100)='./file1\x00') r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:22:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:07 executing program 5: 14:22:07 executing program 3: 14:22:07 executing program 4: [ 419.977467][ T32] audit: type=1800 audit(1595427727.810:258): pid=14296 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16373 res=0 14:22:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:08 executing program 1: 14:22:08 executing program 5: [ 420.190618][ T32] audit: type=1800 audit(1595427727.900:259): pid=14296 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16373 res=0 14:22:08 executing program 3: 14:22:08 executing program 5: 14:22:08 executing program 4: 14:22:08 executing program 1: 14:22:08 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="3c00000010008506000010000000000000000000", @ANYRES32=r2, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="2000000011000d04000000000000000009000000", @ANYRES32=r5, @ANYBLOB="0001000000ff0000"], 0x20}, 0x1, 0xa000000}, 0x0) r6 = inotify_init1(0x0) readv(r6, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r6, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = inotify_init1(0x0) readv(r8, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r8, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f00000013c0)=@newchain={0x551c, 0x64, 0x400, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0xfffc}, {0x5, 0x1}, {0xd, 0x10}}, [@TCA_RATE={0x6, 0x5, {0x4}}, @filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x131c, 0x2, [@TCA_MATCHALL_FLAGS={0x8, 0x3, 0x8}, @TCA_MATCHALL_ACT={0x784, 0x2, [@m_bpf={0xc4, 0x13, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x40, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0x2, 0x5, 0x1, 0x1f, 0x7}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x5, 0x9, 0x3, 0x63a3821c, 0x4}}, @TCA_ACT_BPF_OPS={0xc, 0x4, [{0xf000, 0xd3, 0x9, 0x80000000}]}]}, {0x5d, 0x6, "1d46bb04d19c1a36e48288165909dec2bac15e23f50509522d29d54f8fdafd5febae8c19b9369b480c7a91ef7620b28fb913f69e87347a98b7de8950a9b0beb06c8c6d867fc392156300d6a996574da8224c0e22b540f18423"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_mirred={0x17c, 0x1a, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0x84, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x9, 0x10000, 0x7, 0x101, 0x6}, 0x2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x3, 0x1c26, 0x10000000, 0x80000001, 0xffffffff}, 0x4}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x6, 0x400, 0x10000000, 0x4, 0x2}, 0x1, r2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x7, 0x7f, 0x6, 0x3, 0xfffff699}, 0x7, r5}}]}, {0xcf, 0x6, "46460e8a7d485825423fd006c9b5e286550bc4a9782023e0aaf88eebb95ea723e99bc05e752b8caa46afad8c2b2e2c5d36ae64c2d6870497f773532e296c4f3062bf634da75eb0a0aa658c31afd47269ed934ea131c4cb79f7d45446397b0b037fa7d362118dd059f0dbb66444670820d11d765d4ac38c67efb775342914ae843a8ed80e9f66772aaadf7b9627f17746e42ff85f36bf5c65e0681e336705bae2bb1eb9b64b1a9afac85ffe14801ea52edc8236b6a0cfa08794da26c0b8316fa6ebd6a1d5346521e71a527f"}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}, @m_bpf={0x118, 0x9, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x5c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS={0xc, 0x4, [{0x100, 0x4, 0xf8, 0x8001}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xc2d, 0xfffffffb, 0x6, 0x9, 0x6}}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x6}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0x800, 0x0, 0x40, 0x8}}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file1\x00'}]}, {0x98, 0x6, "d305f9069e4ab0218afe71b8bb3bf0630de1796f726656688aea6f9578b358fec49e3eb0f1dfd29e83953220b5ffd8356809f3e13e691dd0e1a06f07c5bf90f1b0c2a92894c98090a7b1049d8f72e788ca0c08a7bd5b50bd567afc5ab8a9826a793c46ac11853bf8544e72e26740798e3167ba3539e764b91d389667380b5ba5da9757431c33754a71b45e8a95ac8fa3a1e96138"}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}, @m_simple={0x74, 0x1f, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x10, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x9, 0x3, '!#]@\x00'}]}, {0x3a, 0x6, "e284e0de59cef30f08ec3d780eca5cdd27e0f893f13f865eeaf87caa5a2dfa780d5ca3f2cd3fbc50ff3e80bdf617ebaddf0939b8501b"}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_ct={0x14c, 0x14, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x38, 0x2, 0x0, 0x1, [@TCA_CT_ACTION={0x6, 0x3, 0x6}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @ipv4={[], [], @multicast1}}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e20}, @TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e23}, @TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e24}]}, {0xef, 0x6, "b322fe2ded798e31f1d41597b2956fa7c01efda1b49b9f11168895b611f9674e104539135d9f15cb35d27e6b98eef1e0d22baa946c0550aefa1c26fde771b25f02c3369e8402385124719ea17f751e3cafd27127e32d8f5c4a22c9f9eed5ae4e37e365433de9cd9df24023c55beb38a39abed6604ee751c686193d14b9e41b8dd1445c4d720a62379a3737c711f988d8b1b2c5ff27008b106597b2d592153221e27842a942eadf01273867625ccd569c4f36511ee20f022f39a412d802f9d5adf85af53e50a5385c384b19198bb4d26e7551cbcb23d7af99cf3e192de117767a30d0c62775b6c2940ea0ed"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_ipt={0x110, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x6c, 0x2, 0x0, 0x1, [@TCA_IPT_INDEX={0x8, 0x3, 0xfb99}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}, @TCA_IPT_HOOK={0x8}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TARG={0x3f, 0x6, {0x8, 'mangle\x00', 0x9, 0x2, "87bb273663d30f6cadabb350351905c47cc7828b2c"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x3}]}, {0x7e, 0x6, "0c15224af9c0eb42f0d9ea78713edca25b166c1ddcb955041bf8cb71c701ae5fd992b3c4f7a91d49bcb6ec5012d8f238de8a26be56f7c93bdaba31584de675fdcf0868db1035934e0c1f4fbdfb4105b6cc29fbd481f98519d5ffc168d12348adff157a08a00ad582d637e49677e296351195360eff68ed5f276e"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_csum={0x158, 0x20, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x74, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0xc1, 0xfffffffa, 0x5, 0x0, 0x80000001}, 0x13}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x4, 0x8, 0x20000000, 0xb4ed, 0x6}, 0x59}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x8001, 0x0, 0x8, 0x8, 0x8001}, 0x2}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0xffffffff, 0x0, 0x81, 0x5}, 0x14}}]}, {0xbc, 0x6, "53a9636d2969f11f084a8ea370af6eeca5b6b713f39ad78bf5edecb03c64ca12b8619f6e40cfe568bd5087efea605d67e33108d9e46623f5e19a1b31af1a5e460b1e0fbfb12eed8627fa270a8608f5d06de0bff006a987f2b93f2f2d16b42d9f75f0ba8cafe4cfdf89965e99b40b0363fa1393cb11656976fcd8a97ddb28c2b88335c3b2625b6866ec20e090db7b1e7722efc07a6c50894b0915fabe6773284b7784b811193ddd96fbccaf92486a3e093e86a0bce3665829"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3}}}}]}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0xfff1, 0x7}}, @TCA_MATCHALL_ACT={0xa8, 0x2, [@m_csum={0xa4, 0x15, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x80, 0x81, 0x0, 0x7, 0x5c7}, 0x1b}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x2, 0x8, 0x20000000, 0x7, 0x4}, 0x72}}]}, {0x3e, 0x6, "f01aa828b2f72e23d9e131acf424e8f8e96cca750789ed09a8b880470d7f84d8fd3849f0f58455b5a741773b7032cc81579a4972b312c8bacea0"}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}, @TCA_MATCHALL_CLASSID={0x8, 0x1, {0x10, 0x5}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x5}, @TCA_MATCHALL_ACT={0x148, 0x2, [@m_ct={0x144, 0x0, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x9c, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e21}, @TCA_CT_PARMS={0x18, 0x1, {0x7, 0x73, 0x10000000, 0x80000000, 0x2}}, @TCA_CT_MARK={0x8, 0x5, 0xfffffffe}, @TCA_CT_LABELS={0x14, 0x7, "c98b7b0b5ac07895128b568aa9525822"}, @TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @remote}, @TCA_CT_PARMS={0x18, 0x1, {0x1, 0x101, 0x0, 0x3, 0xb3}}, @TCA_CT_NAT_PORT_MIN={0x6, 0xd, 0x4e22}, @TCA_CT_NAT_IPV6_MIN={0x14, 0xb, @mcast1}, @TCA_CT_LABELS_MASK={0x14, 0x8, "c81ea6306cb7a14b92d0379e707a0d12"}]}, {0x81, 0x6, "b4f05de4905be0ab942d2777d5fddf39b83ab7b283f831771f28e152e23fc9ed4ae6dc9805c4891e3a76c4ffa772574476fd51e65b8d48aad1a49c953ea5e941add52085d0e00eda2aa83d0afcb74890b32341ac3091f6410724f491b3c10e658f84dd4f764f80bbd02082e645c26d2ad9d67291fcce53256387605c36"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}, @TCA_MATCHALL_ACT={0x984, 0x2, [@m_ipt={0x168, 0x12, 0x0, 0x0, {{0x8, 0x1, 'ipt\x00'}, {0x4c, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x47, 0x6, {0x80, 'raw\x00', 0x7f, 0x101, "03db4074e5677643a147302d780cc0ca464994a04f027625e33ab42d4f"}}]}, {0xf8, 0x6, "86d38b76911f7edea6e1b726c178138d8d30b2cb1ba4730ca9a277717f6d64675c1a1b0c5719f358b35696df5e0ff6937bf66ed764a637b17f9c1d2fe4957398d4c6289d6a4fe76be8e89f5cc30eeb04dbd46436002b19b11c1a17a2228b9dcba4da8688505165196fd77d0ee3da25d75475ea6097336fa6d6f4bddaec6743227ee3b3f0db4e20ac97f67f1a5cbc0e0212537fa6d0b772be10750a6c8cc37624173f866f96f0bc988976a49e71cc56d96a7a4a41c7e453716c80ab3856c8d052e593af505a8e8291b09f2e62740bd62e39f01d8d9cf2f0689c0f27ee58cc8958c493d3262582b9f68468cef1d9728acad8d204ee"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x4, 0x3}}}}, @m_mpls={0x74, 0x1b, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_MPLS_LABEL={0x8, 0x5, 0xb6130}, @TCA_MPLS_TC={0x5, 0x6, 0x7}, @TCA_MPLS_BOS={0x5}]}, {0x2f, 0x6, "88c40c6589f618d7a089ebee9346897556e17729474ed06e0a8a945612e8815b00bb311d7e78ddef6db6b7"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_skbmod={0x114, 0x15, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x10, 0x2, 0x0, 0x1, [@TCA_SKBMOD_SMAC={0xa, 0x4, @random="41bf3551940e"}]}, {0xdc, 0x6, "e5242e8e10c8dba520c934136a217a1168d7720c583c4a7e682b074342f024524c9f3b85bae6568aadbd4ab0b4ef7581867f6070e64a671bed5da9d48d6586139342b3cfee6a2a8ac41ba8a1cb98bc4501638b4459e00d21decbb71108877b36d9891de3f83f21bb0087193b21bcfcf983dfbcccf379e6e320c81cfc3865d9fb41560aceb9356a79d7b3750ce62f2c61807611cc6f238c078b2bb7fe552be4679cf98fc74b640221d4b92721fc1b9c53f872e67c0a01ba7a449c760c124a10d72c33854c14c6beb10dcec9240b08b671945ea644a340996b"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_bpf={0xf0, 0x13, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x5c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{0x9, 0x8, 0x2, 0x7}, {0x0, 0x0, 0x7}, {0x7, 0x6, 0x2, 0x7}, {0x80, 0x0, 0x0, 0x100}, {0x8, 0x2, 0x0, 0x7}, {0x6, 0x4, 0x6b, 0x298}, {0x1, 0x2, 0x8, 0x5}]}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x3}]}, {0x6d, 0x6, "fca53da38dc541998f3d26f34df2c18b1fee09ba0d539f8dabb89580a618b4a326153e9cfb01367944231d4aead45c8a4aaab544f197a1665d4660172a949c91df55a51a05d43fab3a00e4a462947bada8af94bf38888890ac9c1e2add470a54c817c0a14fc6b01d56"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_skbmod={0x168, 0x17, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x5c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_PARMS={0x20, 0x2, {{0x9, 0x2, 0x2, 0x6, 0xfffffff9}, 0x6}}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x3}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={[], 0x3d}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @random="2ed624fc71de"}, @TCA_SKBMOD_DMAC={0xa, 0x3, @local}, @TCA_SKBMOD_SMAC={0xa, 0x4, @local}]}, {0xe4, 0x6, "d034b07036bf2f12c0476cbaa7dc2a59e0dc3f2db91a5546a7cc3ebb48623cc7f8a414de7cbb4b391f762dae8e7e98d5ecdad6709cc5109191c2fd22835d5b80b774ae77435f73507fcb61e529fa6e37bdd01c4ea0bc882ac8b3242363dc4457c7eebffb60a7569c379dd57af8b8aa6a0e04d4fe94a2f7adf55610cd57688fd571af1d90d5295f923868dac2083accc8b9d5897746486e62fdc8696f19bfef99210b086f09f52bb7b0bf8df370a4cd78a1e92dec19db5754de700fb39b5e68c8e3251a3fdde2f3ee1bf878ffb71e76c0ff7f60c3c85aee5b9d14e37cf4160075"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_ife={0xf4, 0x80, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x80000001, 0xb7da, 0x5, 0xd48, 0x6}, 0x1}}, @TCA_IFE_TYPE={0x6, 0x5, 0x81}]}, {0xa6, 0x6, "0d98daba59ad2ee42f76b86cab32782e1d6b2d7ce066188e200919e7e48d30598a9ece49e92a5e6099e7c1657762a461aa4d3778540d0bb4f36da72bd073e696d4f946aa7c0dc5650db2f011ba5077efd48ca9858c9165fa4f6e64099ff64ab4a909d9cf1a443a3b9c20388cb12a71be98b6f98131267b637bb31f0a17a9d63896b8a9c76b37bc0f8be66c33a626e6d110189ababc18c8909811d922b4fda634e937"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_nat={0x19c, 0x18, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x16c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x3, 0x7f, 0x2, 0x0, 0xe5c4}, @loopback, @rand_addr=0x64010100, 0xff}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x9, 0x9, 0xffffffffffffffff, 0x1, 0xed}, @remote, @rand_addr=0x64010101, 0xffffff00}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xffff, 0x400, 0x8, 0xd85, 0xffffffff}, @broadcast, @remote, 0xff, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x1, 0x3ff, 0x8, 0x10}, @dev={0xac, 0x14, 0x14, 0x37}, @private=0xa010100, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x608a, 0x4, 0x6, 0x4, 0x40}, @local, @multicast1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xfff, 0x61b, 0x6, 0xff, 0x1}, @dev={0xac, 0x14, 0x14, 0x3b}, @broadcast, 0x0, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x6, 0x8, 0x20000000, 0x5, 0x4}, @broadcast, @empty, 0xffffff00, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x1ff, 0x3, 0x4, 0x200, 0x6e}, @dev={0xac, 0x14, 0x14, 0x3c}, @loopback}}, @TCA_NAT_PARMS={0x28, 0x1, {{0x1, 0x5, 0x5, 0x0, 0x1}, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010101, 0xff000000, 0x1}}]}, {0xb, 0x6, "29e820d650b491"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_simple={0xe4, 0x1d, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x84, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x0, 0x90a9, 0x7, 0x8, 0x5}}, @TCA_DEF_PARMS={0x18, 0x2, {0xdf4, 0x20, 0x3, 0x8, 0x2}}, @TCA_DEF_PARMS={0x18, 0x2, {0xfe2b, 0x80000000, 0x7, 0x3f, 0x6}}, @TCA_DEF_PARMS={0x18, 0x2, {0x0, 0x0, 0x8, 0x8a6a}}, @TCA_DEF_DATA={0x7, 0x3, '-*\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x64, 0xdd4b, 0x4, 0x6648, 0x7952}}]}, {0x37, 0x6, "61420b2d7308362ed2d6d9eec9c156ee6e14a4e2e30b8261e84b401697cccf70343db8deb1f76916e089aae224cd165f1450f8"}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}, @m_simple={0xc4, 0x0, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x98, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x8, 0x3, '*-+\x00'}, @TCA_DEF_DATA={0xa, 0x3, 'msdos\x00'}, @TCA_DEF_DATA={0xa, 0x3, 'msdos\x00'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_DATA={0x21, 0x3, '/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli'}, @TCA_DEF_PARMS={0x18, 0x2, {0x1, 0x7, 0x0, 0x100, 0x2}}, @TCA_DEF_PARMS={0x18, 0x2, {0x3, 0x7, 0x0, 0x0, 0x4}}, @TCA_DEF_PARMS={0x18, 0x2, {0x7fff, 0x4, 0x7, 0xe74, 0x9}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x2}, @filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x41b0, 0x2, [@TCA_RSVP_CLASSID={0x8, 0x1, {0xd, 0xfffa}}, @TCA_RSVP_POLICE={0x58, 0x5, [@TCA_POLICE_RATE64={0xc, 0x8, 0x4}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x1000}, @TCA_POLICE_TBF={0x3c, 0x1, {0x5, 0x6, 0x80000001, 0x6, 0xbe1, {0x9, 0x1, 0x5df7, 0x6c, 0x1, 0x9}, {0x81, 0x2, 0x20, 0x15, 0x7, 0x2}, 0x80, 0x400, 0x3}}]}, @TCA_RSVP_CLASSID={0x8, 0x1, {0x4, 0x9}}, @TCA_RSVP_ACT={0x15c4, 0x6, [@m_pedit={0x10c, 0x3, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xa4, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0xa0, 0x5, 0x0, 0x1, [{0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}, {0x4c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}]}]}, {0x3d, 0x6, "ff8b76da25ac283cc454d9fb4d085542d6063460a14c637975d3170faab1d95ccb267316cc6178f7c907acf3d8e1958e61624a138c62c89d99"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_bpf={0x168, 0x16, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x74, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8, 0x5, r6}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0xa}, @TCA_ACT_BPF_FD={0x8, 0x5, r7}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xff, 0x3, 0x4, 0x20, 0x1}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xa7, 0xf2dc, 0x6, 0x400000, 0x20}}, @TCA_ACT_BPF_FD={0x8, 0x5, r8}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x400, 0x65f3, 0x8, 0x8000, 0x10000}}]}, {0xce, 0x6, "8d3a3925f48bbd7b9b12917ae196ca0bca821739b11b383e4bae09b58e6646bd89d635789cc20b00e23b61719aab38f8f81884c51cf294f97359c1154e7debfa79e51fd6686efea13b6d602f3e9657a81cca439f81b8d1f416ad654fb0bf02f6419ffdaba258cb6d8dfbe4be76d506824f1535faa668173842be2f1e0bf0f82111d51196365a80fb9d376270b3cdc8821042eff8e234891c95c77d124970a341efa6201e142fc0e1bbbb14680906be8e3fb35ec42566b905056668e123e3dfee339eeb267ba202e8f306"}, {0xc}, {0xc}}}, @m_ctinfo={0x1040, 0x5, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x14, 0x2, 0x0, 0x1, [@TCA_CTINFO_ZONE={0x6, 0x4, 0x8000}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x5}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_connmark={0x21c, 0x1e, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0x100, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x401, 0xfffffffc, 0x10000000, 0x80000000, 0x1fc}, 0xf8ac}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x100, 0xe1d, 0x4, 0x3, 0x8}, 0x3}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffffc, 0x1, 0x20000000, 0x9, 0x401}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x29, 0x3, 0x20000000, 0xedac, 0x1}, 0x200}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x20000000, 0xfff, 0x5, 0x6, 0x3}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xffff, 0xfffffffe, 0x10000000, 0x100, 0xa955}, 0x1}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7, 0x4, 0x6, 0x5, 0x3e}, 0x6}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x2, 0x100, 0x10000002, 0x200, 0x4}, 0x40}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x7ae, 0x3, 0x2, 0x1}, 0x5}}]}, {0xef, 0x6, "c4188ebc3b35a31f08a8d00afb929d31d0425a290eef89bc8cea91eaf4253ab0c03b562041416f51cd43e580817eae40b51278538d00bdb526a12533cd8c40284c81955c9239a01bb3bb34f3b38e9d5781e382d07651cfbcf408bcba0d48a9210913061c50cec27c48ef0298798e23c5b50c2020e0117d22d4347de9b572f9bb2766b73b0220b4e7852dcab9c6e4de62296826f9a31c41f7396bdb139ec0fd8f71ea69249f9c5d031b3f7e605c74a0b0a723a8252a8594b1eb7b18cac224ab8a78856524a5d9eb48173ae41d5b86e0a3f0eac9e89a98d939030bf3d204ad69995affa664f076c672a0ea0c"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_nat={0xf0, 0x9, 0x0, 0x0, {{0x8, 0x1, 'nat\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xfffffff9, 0x2, 0x1, 0x8, 0xff}, @private=0xa010101, @loopback, 0x10172233dbfea5b4}}]}, {0xa0, 0x6, "9dfb63ddceea81de4d58dae02df6c95ba61d0a4488d3a4bd962554107154174618741dbf31989b6c508622863cc6a7807c7275b0170633b563700ef564ec625b3526c5eb8e0305cf0a963011a3fc3a4c16f080cb3b225c80cd0cb93d9b6c3b036bfc4712c75fc568b4bb864fa34d28f8f7128052781ca1bcc419ea13de960340af761b75be452a9d6f52c8e43b8b0722496070c953af7ef0bd0c2e97"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}]}, @TCA_RSVP_ACT={0xbe4, 0x6, [@m_police={0xbe0, 0x7, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0xab8, 0x2, 0x0, 0x1, [[@TCA_POLICE_AVRATE={0x8, 0x4, 0x8}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x8}, @TCA_POLICE_RATE64={0xc, 0x8, 0x8}, @TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x8, 0x1, 0x6, 0x7, {0x1, 0x1, 0x1, 0x3, 0x2, 0x6}, {0x2, 0x2, 0x1000, 0x624, 0x3, 0x3}, 0x2, 0xa347, 0x7ff}}, @TCA_POLICE_RATE64={0xc, 0x8, 0xf70}, @TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x1, 0x48000, 0x453, 0x0, {0x2, 0x2, 0x910, 0x9, 0x4, 0xff}, {0x7, 0x0, 0x8000, 0xdda7, 0x0, 0x5}, 0x2, 0x8, 0xc4}}, @TCA_POLICE_TBF={0x3c, 0x1, {0x7, 0x6, 0x7ff, 0x8, 0x1, {0x7f, 0x1, 0xf7, 0x3ff, 0x1, 0x81}, {0x7f, 0x0, 0x9, 0x3, 0x4, 0x2}, 0x80000000, 0x1, 0x2f96}}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x39}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x7, 0xfffffffc, 0xc5, 0x5, 0x3, 0x0, 0x45, 0x3ff, 0x1, 0x3, 0x9, 0x0, 0x7, 0xff, 0x4, 0xffff, 0x9, 0x7, 0x19018b61, 0x1f, 0xffffffff, 0x1, 0x20, 0x8001, 0x5, 0xfffff953, 0x6, 0x1, 0x0, 0x607, 0x401, 0x8, 0x4, 0x10000, 0x6f5d37e5, 0x7ff, 0x0, 0x9, 0x200, 0xef, 0x7fff, 0x5f5, 0x1f, 0x3, 0x589, 0x5, 0x80, 0x9, 0x4, 0x8, 0x9, 0x9, 0x7ff, 0x0, 0x9, 0x9, 0x4f5, 0x7fffffff, 0x44b7, 0x40, 0x205, 0x6, 0x80000000, 0x31, 0x401, 0x2, 0x5, 0x40, 0x7, 0x5, 0x7fff, 0x0, 0x2, 0x1, 0x3, 0x7fffffff, 0x280000, 0x8000, 0x1, 0xff, 0x5, 0x1, 0x6, 0x7f, 0x8, 0x7ff, 0xfffffffe, 0xfffffff7, 0x4, 0x9, 0x321b11b, 0xffffff01, 0x0, 0x81, 0x6, 0x2, 0xfffffffc, 0x101, 0x80000001, 0xb9, 0x8fd, 0x8, 0x1, 0x4, 0x6, 0x9, 0x100, 0xfe000000, 0xa6ca, 0x146fae27, 0x800, 0x5, 0x81, 0xffffffff, 0x8, 0x101, 0x0, 0x8, 0x7, 0x1f, 0x46b1, 0x101, 0x6, 0x1, 0x9, 0x7fff, 0x401, 0x400, 0x0, 0x288, 0x8001, 0x0, 0x5, 0x8, 0x9, 0xffffd735, 0x6, 0x5, 0x2, 0x2, 0x7fffffff, 0xfff, 0x6, 0x9, 0xba, 0x10001, 0x3ff, 0x401, 0x80000000, 0x2000, 0x1, 0x0, 0x6, 0x9, 0x8, 0x0, 0x8001, 0x2, 0x1, 0x5, 0xa748, 0xfffffffb, 0x4, 0x8, 0x6, 0x2, 0x3, 0x1000, 0xf4, 0x80000000, 0x5, 0xc4cc, 0x3, 0x8120, 0x6, 0x2, 0x1f, 0xfffffffa, 0x9, 0x152, 0x5, 0x0, 0xfdf, 0x6, 0x0, 0x8, 0x72, 0xe1, 0xfffffff8, 0x1, 0x0, 0x4, 0x7fff, 0x9, 0x8bed, 0x8, 0x1, 0xe2, 0x4, 0x9, 0xfffeffff, 0x20, 0x2, 0x4, 0x1, 0x6, 0x10001, 0x2, 0xfffffffe, 0x3f, 0x0, 0xffffffeb, 0x2, 0x0, 0x9, 0x9, 0x0, 0x0, 0x1, 0x46, 0x7fe000, 0x3, 0x7, 0x2, 0x8, 0x6, 0x3, 0x5, 0x1, 0x6392, 0x87e3, 0x200, 0xe0b0, 0x9, 0x8, 0x8, 0x101, 0x8, 0x8001, 0x5, 0x0, 0x6, 0xf82, 0x3, 0x6fa2, 0x9faf, 0x8, 0x2, 0x81, 0x9, 0x1000, 0x80, 0xb8, 0x0, 0x4]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x1ff, 0x10000000, 0x80000000, 0x3, 0x6, {0x20, 0x1, 0xc4, 0x7, 0xdd47, 0x7}, {0x7, 0x1, 0x2, 0x9b1, 0x8, 0x4}, 0x41, 0x1, 0x6}}], [@TCA_POLICE_RESULT={0x8, 0x5, 0xffffffff}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x47}, @TCA_POLICE_RATE64={0xc, 0x8, 0x7}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_RESULT={0x8, 0x5, 0x8}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x8000, 0x7, 0x9, 0x0, 0x400, {0x1, 0x1, 0x0, 0x401, 0x200, 0x2}, {0x0, 0x1, 0xff, 0x1, 0x6, 0x3f}, 0x2, 0x3f, 0x7fffffff}}, @TCA_POLICE_RATE64={0xc, 0x8, 0x7000000000}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x7}, @TCA_POLICE_TBF={0x3c, 0x1, {0x7ff, 0x2, 0x8, 0x6b00, 0xfff, {0x3, 0x1, 0x6, 0x4, 0x1ff, 0x5}, {0xff, 0x1, 0xffff, 0x3, 0x6}, 0x5, 0x6, 0x7f}}, @TCA_POLICE_RATE64={0xc, 0x8, 0xc0000000000}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x4}, @TCA_POLICE_TBF={0x3c, 0x1, {0x5, 0x3, 0x3, 0x4c7, 0x4, {0x7f, 0x0, 0x0, 0x3, 0x9, 0x7}, {0x3f, 0x1, 0x2ac, 0x8001, 0x6, 0x73}, 0xffffffc1, 0x9, 0x9}}, @TCA_POLICE_RATE={0x404, 0x2, [0x80000000, 0x2, 0x9, 0x3, 0x2, 0x63b0, 0xfff, 0x1, 0x100, 0x5, 0x9, 0x6, 0x2, 0x1, 0x9035, 0x0, 0x4, 0xb4000000, 0x7, 0x64a6c822, 0x9, 0x6f7, 0x80, 0x3, 0x8000, 0x3, 0x2, 0x7fff, 0x7, 0x2, 0x9, 0x1, 0x3, 0x80, 0x0, 0x80000001, 0x5, 0x3, 0x0, 0x0, 0x2e1, 0x800, 0x9, 0x4, 0x80000001, 0xfffffffa, 0x2, 0x9, 0x81, 0x4, 0x8, 0x5d, 0x8001, 0x2, 0x0, 0x2, 0x1f, 0x6, 0xff, 0x7, 0x1, 0x401, 0x1, 0x7fffffff, 0xff, 0x3, 0xb788, 0xa41b, 0x8a0c, 0x7, 0x5, 0x2aa0, 0xbf7c, 0xff, 0x4, 0x9, 0x0, 0x7fff, 0x3, 0x1, 0xecfa, 0x800, 0x3ffd, 0x0, 0x0, 0x6, 0xe3, 0x1ff, 0x2, 0x7fff, 0x2, 0x0, 0x80, 0x8, 0x9, 0x4, 0xfffffff7, 0x80000001, 0x99, 0xfff, 0xc2e4, 0x2000000, 0x80000000, 0xd0, 0x0, 0x9, 0x5, 0x8, 0xb8fd, 0x9, 0x8, 0x0, 0x3, 0x1000, 0x80000000, 0x7, 0xcde, 0x4, 0x1, 0x3, 0x5, 0x200, 0x7ff, 0x0, 0xfff, 0x7, 0x9, 0x2, 0xa32, 0x5, 0x6, 0xfffffffd, 0x800, 0x7, 0x9, 0x7, 0x7fffffff, 0x7, 0x6, 0x9, 0x2, 0x6, 0xfffffffc, 0x800, 0x5, 0x89, 0xeca, 0xffffffff, 0x9d0e, 0x3f, 0x8, 0x200, 0x3, 0x0, 0x1, 0x4000, 0x3ff, 0x4, 0x8000, 0x1, 0x7ff, 0x2, 0x5, 0x1000, 0x0, 0x8000, 0x8, 0x3eb, 0x5, 0x0, 0xffffffff, 0x2, 0x1f, 0x6, 0x800, 0x400, 0x20, 0x7, 0x2, 0x7fffffff, 0x6, 0xde99, 0x6, 0x10001, 0xfffffff8, 0x100, 0x94, 0x0, 0x0, 0x9, 0x80000000, 0x1f, 0x0, 0x100, 0xf503, 0x9, 0x8c, 0x4e, 0xffe8, 0x2, 0x0, 0x8, 0x5cddd8de, 0xffffcc50, 0x37, 0x8000, 0x0, 0xc6c1, 0x2, 0xffff54c0, 0x0, 0x96, 0x8001, 0x1000, 0xfffff7a7, 0xeb, 0x20, 0x5, 0x2, 0xfff, 0x1ff, 0x5, 0xf786, 0x40, 0xa01b, 0xffffffff, 0x20, 0x5, 0x100, 0xec, 0x3ff, 0x9, 0x6, 0x2, 0xfff, 0x7f, 0x1, 0xca1, 0x6, 0xcf2, 0xdfc6, 0x0, 0x10000, 0x8, 0x7fffffff, 0x0, 0x3, 0x9, 0x1, 0x3, 0xbb91, 0x4, 0x4, 0x0, 0x6, 0x6cfd]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x7, 0x2, 0x180, 0x7, 0x1, {0x60, 0x1, 0x100, 0x1, 0xaa, 0x97}, {0x5, 0x0, 0x5, 0x6, 0x3ff, 0x4}, 0x7fff, 0xca, 0x100}}, @TCA_POLICE_TBF={0x3c, 0x1, {0x8000, 0x2, 0x7, 0x9, 0x1, {0x8, 0x1, 0x1, 0x6, 0x7, 0x2}, {0xff, 0x0, 0x3, 0x2, 0x20, 0xffff}, 0x3f, 0x5, 0x6}}]]}, {0xff, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}, @TCA_RSVP_ACT={0x1f9c, 0x6, [@m_gact={0xc0, 0x20, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x28, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1899, 0xfffffffffffffffd}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1c000000, 0x5, 0xffffffffffffffff, 0xa422, 0x7c}}]}, {0x70, 0x6, "39737f08080fdd2aee4377fd7a284eebd86ed2c2c04322565f2b8cb1b108e568c43d788f7a19d60c57b39f5fbff14ed4369a084ce3ee69816fea805498324c27902c134beb8081a10ddecfcb0652bdb7ee0a15412c883c90853a72c2de9ccb322589a3ceb45298d5c5d13c72"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_pedit={0x1ed8, 0x10, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x1e08, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0x1, 0x80000000, 0x10000000, 0x3, 0xfffffffb}, 0x2, 0x6, [{0x9, 0x1, 0x69f, 0xee3d, 0x7fff, 0x6d}, {0x10, 0x3, 0x5, 0x1, 0x9, 0x7}, {0x0, 0x24, 0x80, 0x6, 0x7, 0x8}]}, [{0x4, 0x10000, 0x1f, 0xfffffeff, 0x80000000, 0x8000}, {0x3ff, 0x200, 0x5, 0xfff80000, 0x3, 0x7}, {0x6, 0x8, 0x6, 0x80000000, 0x400, 0x40}, {0x7ff, 0x0, 0x4, 0x0, 0x1, 0x10001}, {0x2, 0x4350, 0x10001, 0x4, 0xa2, 0x9}, {0x2, 0x2, 0x100, 0x1, 0x9}, {0x0, 0x9, 0x8, 0x200, 0x402c}, {0x1e488608, 0x3, 0x7, 0x7f, 0x7fffffff, 0x7f}, {0xfff, 0x8001, 0x2a20, 0x7f, 0xab04, 0x3}, {0x9, 0x3b, 0x3, 0x81, 0x0, 0xdf2}, {0x8, 0x3787, 0x4, 0x0, 0xffff8001, 0x1}, {0xd3, 0x40, 0x1, 0xd49c, 0x80000000, 0x7fff}, {0x3, 0x2, 0x10000, 0x7, 0x0, 0x200}, {0x9, 0x2, 0x8, 0x100, 0x2, 0x2}, {0x0, 0x6, 0x11, 0x7, 0x3ff, 0x2}, {0x9, 0x8, 0x0, 0x6, 0x0, 0x5}, {0xc5c, 0xb5c, 0x9, 0x7f, 0x101, 0x8}, {0x2, 0x2, 0xee, 0x71a, 0x7, 0xffff8001}, {0x8, 0x40, 0x992e, 0xc8d3, 0x40, 0x4e}, {0xfff, 0x3, 0x6, 0x30, 0x100, 0x800}, {0x1, 0x2, 0x0, 0x7, 0x80}, {0x5, 0xfffffffb, 0x8, 0x0, 0x7, 0x6}, {0x1, 0x40, 0xa13, 0x9, 0x5, 0x1}, {0x8, 0x2, 0x7, 0x6, 0x8354, 0x9}, {0xfffffffe, 0x4, 0x0, 0x4, 0x6, 0x101}, {0x4, 0x8000, 0x5, 0xfa48, 0x7, 0x8}, {0xffffffff, 0x101, 0xffffffff, 0x8000, 0x40, 0xffff}, {0x5, 0x101, 0xbf6b, 0x5, 0x1f, 0x7}, {0x1, 0x0, 0x40, 0x1ff, 0x4, 0x1}, {0x400, 0x1, 0x5d9, 0x84b0, 0x5, 0x1ff}, {0x4, 0xfffffff9, 0x7, 0x311e, 0xe0000, 0x6dc}, {0x3ff, 0x5, 0x8, 0x7c3, 0xd40, 0x5349}, {0x4, 0x5, 0x7, 0xffff, 0x1, 0x400}, {0x4, 0x40, 0x1, 0x5, 0x9}, {0xe7d1, 0x7, 0x80, 0xff, 0x2c}, {0x8cb, 0xfffffff8, 0x9, 0x5, 0x4, 0x9}, {0x26, 0xffffffff, 0x2, 0x1000, 0x5, 0x45a}, {0x4, 0x6, 0x6, 0x0, 0x400, 0x2}, {0x5, 0x3, 0x1ff, 0x101, 0x5}, {0x4, 0x1, 0x3, 0x6fd, 0x8, 0x8}, {0x1f, 0x101, 0x4, 0x80000001, 0x1f, 0x5}, {0xe57, 0x0, 0x10001, 0x5}, {0x22, 0x8, 0x8ec5, 0x9, 0xfffffe01, 0x3f}, {0x2, 0x8, 0x3, 0x8b, 0xfffffffe, 0x6de}, {0x10000, 0x8000, 0xf7ad, 0xfe4, 0x7, 0xffff}, {0x2ac1, 0x7, 0x6, 0x8, 0xfff, 0x3}, {0x5, 0x1, 0x2000000, 0x5, 0x741, 0xffffffff}, {0xc00, 0x8001, 0x7e, 0x5, 0x2f8, 0x7}, {0x5, 0x4, 0x400, 0x1000, 0x93, 0x1c}, {0xfacc, 0x8, 0xf38, 0x80000001, 0x80000000, 0x7fffffff}, {0x0, 0x1, 0xff5f, 0x8000, 0x2}, {0x9, 0x81, 0x0, 0x7fff, 0x4, 0xc3d}, {0x7fff, 0x7fffffff, 0x0, 0x400, 0x5d0e, 0x8}, {0x80000001, 0xffe0, 0x7fffffff, 0x1, 0x0, 0x8001}, {0xb16, 0x9, 0x0, 0x3, 0x1, 0x63ab}, {0xfff, 0x100, 0x100000, 0xff, 0x2, 0xd2}, {0x0, 0x80000001, 0x7fff, 0xff, 0x4, 0xe21}, {0xfffffffa, 0x4, 0x1, 0x0, 0x7b, 0x4}, {0x2, 0x3, 0x2, 0x40, 0x3d, 0x6a}, {0x7, 0x200, 0xffffff92, 0x6, 0x1}, {0x3, 0x0, 0x4, 0x4, 0x50, 0x9}, {0x8, 0x7f, 0x1f, 0x4, 0x9, 0x5a16}, {0x80000000, 0x100, 0x5, 0x7ff, 0xff, 0x1}, {0x9, 0x9, 0x8, 0x1, 0x400, 0x3}, {0x2, 0xbc, 0x81, 0x4, 0x2, 0x1}, {0x40, 0xffff, 0x4, 0x9, 0x4, 0xfffffffd}, {0x4, 0x5, 0x7, 0x1ff, 0x8000, 0xe}, {0x7f, 0x81, 0x6, 0x20, 0x80000001, 0xb64d}, {0x8000, 0x100, 0x3, 0x6, 0x8fda}, {0x9, 0x1ff, 0x101, 0x101, 0x0, 0x6}, {0x7, 0xfffffff8, 0x4, 0x5, 0x1, 0x632}, {0x101, 0x3150, 0x2, 0x40, 0xffffffff}, {0x95, 0xffff1b1f, 0x2, 0x3, 0x4}, {0x75c, 0x101, 0x1, 0x4, 0xffffffff, 0x80000000}, {0x1, 0x559, 0x9, 0x7, 0x100, 0x99ba}, {0x5, 0x2d, 0x6, 0x0, 0x7f, 0x6}, {0x0, 0x2, 0x40, 0xfffffff7, 0x8, 0x2}, {0x4, 0x5, 0x0, 0x7f, 0x9, 0x9}, {0x1, 0x1, 0x8, 0x2, 0x2}, {0x3, 0xbd1, 0x4, 0xdb, 0x1be, 0xc397}, {0xfffffffa, 0x7fffffff, 0x10001, 0xfffffffb, 0x6, 0x200}, {0x3, 0x6, 0x0, 0x0, 0x46, 0x80000001}, {0x1, 0x80000000, 0x1, 0x3, 0x5, 0x7ff}, {0x2, 0x7, 0x1, 0x2, 0x3, 0x6}, {0x0, 0x3, 0x10001, 0x4, 0x0, 0xffffffc0}, {0xfffff800, 0x7ff, 0x4, 0x6c, 0x7, 0x4f}, {0x7, 0x8000, 0x8, 0x7fffffff, 0x1000, 0xa5bd}, {0x5, 0x0, 0x1, 0x0, 0x7, 0x7fffffff}, {0xb7, 0x7f, 0xff, 0xe000000, 0xff, 0x3f}, {0x2, 0x2, 0x8, 0x5, 0xffffff9b, 0x72e}, {0xb3, 0x7, 0x0, 0x6, 0x8, 0x8000}, {0x80, 0xffffffc0, 0xbb, 0x9, 0x40, 0x8001}, {0x1, 0x0, 0x9, 0x80000001, 0x8, 0x6}, {0x5e, 0x4, 0x6, 0x2, 0x1ff, 0x3f}, {0xfffff570, 0x9, 0x712, 0x200, 0x101}, {0x0, 0x8, 0x7, 0x9, 0x100, 0x9}, {0xfa, 0x0, 0x200, 0x5, 0x4, 0xab}, {0x97, 0x356, 0x2, 0x6, 0x4, 0x8}, {0x5, 0x20, 0xfff, 0x10001, 0x8, 0x1ff}, {0xff, 0x81, 0x8, 0xa77a, 0x7, 0x4}, {0x9, 0x8, 0x1, 0x7fffffff, 0x64, 0x7}, {0x800, 0xc1, 0x8, 0x8, 0x0, 0x7ff}, {0x8, 0x2, 0x3, 0x9, 0x20, 0x3ec3}, {0x800, 0x0, 0x4, 0x80, 0x8, 0xdcee}, {0x81, 0x5, 0x6, 0x4, 0x2, 0x7}, {0x80, 0x8, 0x0, 0x6, 0x2, 0x40}, {0x2, 0x8, 0x1ff, 0x5, 0x1000, 0x3}, {0x400, 0x8, 0x1, 0xe6e7, 0xc1, 0x8}, {0x8, 0xffffffff, 0x2, 0x2, 0x30000, 0x8001}, {0x1f, 0x7, 0x2, 0xfffffffc, 0x9, 0x2}, {0x7f, 0x200, 0x5, 0x4, 0x401, 0x8}, {0x1f, 0xfff, 0x2, 0x6, 0x40, 0x571}, {0xffffffff, 0xfff, 0x9, 0x7, 0x10001, 0x6f8d886}, {0x20000000, 0x9, 0x3f55, 0x8000, 0x6, 0x8001}, {0x7fff, 0x7, 0x40, 0xbd, 0x4, 0x3}, {0x7, 0x8, 0x2, 0x101, 0x9, 0x947}, {0x5, 0xffff, 0x1, 0x1, 0xb25, 0x3ff0000}, {0x2, 0xfffffe01, 0x8, 0x9, 0x80000000, 0x3}, {0x39d9, 0x4, 0x5, 0xfffffffd, 0x2, 0x8}, {0x2, 0x2, 0x1000, 0x4, 0x5, 0x1}, {0x101, 0x5, 0x5, 0x3, 0x2, 0xfff}, {0x0, 0x2, 0x0, 0x0, 0xffffffe1, 0xf2d}, {0x5, 0xb9, 0xffff37ea, 0xfffffff7, 0x9}, {0x2, 0x1, 0x6b5, 0x1bae4109, 0x2, 0x8}, {0x5, 0x8, 0x5, 0x2, 0x4, 0x5}, {0xffff7fff, 0x3, 0x80000001, 0x94, 0x51a, 0x5}, {0xffff47ca, 0x10000, 0x6, 0x2, 0x3, 0x6}, {0x6e, 0x8001, 0xaa, 0x9, 0x0, 0xaa}], [{0x5}, {}, {0x0, 0x1}, {0x4}, {0x4, 0x1}, {}, {0x1}, {0x5}, {0x6, 0x1}, {0x2}, {0x2, 0x1}, {0x2}, {0x0, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x4}, {0x4}, {0x7, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x2, 0x3}, {0x1, 0x1}, {0x3}, {0x6, 0x1}, {0x1, 0x1}, {0x2}, {0x3}, {0x2}, {0x2}, {0x1, 0xb662055119d04634}, {}, {0x3, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x1}, {0x2, 0x1}, {0x5}, {0x3}, {0x1, 0x1}, {0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {}, {0x4, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x6}, {0x0, 0x1}, {0x0, 0x1}, {0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x1}, {0x4}, {}, {0x1}, {0x4}, {0x2}, {0x3, 0x1}, {0x2}, {0x4}, {0x3}, {0x3}, {0x2, 0x1}, {0x2}, {0x0, 0x1}, {0x3, 0x1}, {0x3}, {0x1}, {}, {0x0, 0x1}, {}, {0x2, 0x1}, {}, {0x4}, {0x4, 0x1}, {0x4, 0x1}, {0x2}, {0x1}, {0x4, 0x1}, {0x5}, {0x4}, {0x5, 0x1}, {0x3, 0x1}, {0x2}, {0x4, 0x1}, {}, {0x2, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x2}, {0x5, 0x1}, {0x4}, {0x2, 0x1}, {0x5}, {0x4, 0x1}, {0x5}, {0x5, 0x1}, {0x0, 0x1}, {}, {0x4, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {}, {0x3}, {0x4, 0x1}, {0x1}, {0x4, 0x1}, {0x3}, {}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x5}, {0x1}, {0x1, 0x1}, {0x4}], 0x1}}, @TCA_PEDIT_PARMS_EX={0xe38, 0x4, {{{0x3, 0x7, 0x6, 0x2, 0x7}, 0x1, 0x1, [{0x3, 0x3, 0x3, 0x8, 0x3, 0x81}]}, [{0x4c12, 0x400, 0x9, 0x3f, 0xffffffff, 0xf86}, {0x5, 0x1000, 0x5, 0x1ff, 0x3ff, 0x3}, {0x8, 0x501f, 0xff, 0x4, 0x7, 0x7fff}, {0x1ff, 0x5, 0x7, 0x5, 0x1, 0x24d0}, {0x4, 0x5, 0xd9, 0x0, 0x9, 0x10001}, {0x1993, 0x4, 0x337, 0x0, 0x0, 0x2}, {0x80000001, 0x800, 0x4, 0x2, 0x1, 0xf5}, {0x9eb, 0x6, 0x77, 0x9, 0x3, 0x3}, {0x851c, 0x3, 0x80000001, 0x7, 0x2, 0x79b}, {0xe648, 0x6, 0x3, 0xffffff7f, 0xfff, 0x6}, {0x20, 0x158, 0xce2436d6, 0x576, 0x3, 0x7}, {0xff, 0x1, 0x6, 0x9, 0x20, 0x9}, {0x7, 0xf, 0x5, 0x7, 0x80000000, 0x1}, {0xd4b, 0x1000, 0xfffffff7, 0x2d4, 0x0, 0x7}, {0x967f, 0xffffffff, 0x887, 0x4, 0x1, 0x6}, {0x80000000, 0x4, 0x0, 0x4, 0x7, 0x2}, {0x7, 0x3, 0x6, 0x60df50c1, 0x0, 0x2}, {0x1242, 0x4, 0x10000, 0x2, 0x7, 0xa867}, {0x4, 0x100, 0x8, 0xf306000, 0x8, 0x7}, {0x71bc, 0x7ff, 0x40, 0x2b, 0xad1, 0x9}, {0x8, 0x0, 0x0, 0x8, 0x4, 0x40}, {0x3, 0x836, 0x6, 0x609, 0x0, 0x6}, {0x3, 0x0, 0x770, 0x6, 0x2991, 0x9}, {0x1, 0xfffffd1e, 0x3, 0x8, 0x3, 0x5}, {0x3f, 0x3, 0x4, 0x9f, 0xffff8e94, 0xd2be}, {0x6, 0x0, 0xa85f, 0x80000001, 0x2, 0x101}, {0x7, 0x17, 0xff, 0x8001, 0xb7, 0xff}, {0x7, 0x4, 0x9, 0x2, 0x80000001, 0x20}, {0x1, 0x101, 0x81, 0x4, 0xc0000000, 0x200}, {0x6, 0x75d, 0xffffff00, 0x0, 0x3ff, 0x20}, {0x8, 0x200, 0x8a5, 0x3, 0x1, 0x7ff}, {0x9, 0x39f, 0x6, 0x8, 0x4, 0x40}, {0xfffff361, 0x200, 0x312c, 0x4000000, 0x8, 0x5}, {0xeb, 0x8, 0x6443, 0x5, 0x9, 0x8}, {0x1, 0x9, 0x1, 0x0, 0x80000000, 0x100}, {0x3f, 0x6, 0x20, 0x9, 0x80000001, 0x5}, {0x0, 0x4, 0x8000, 0x6, 0x5, 0x80000001}, {0xcd, 0x1, 0x1, 0x4, 0x20, 0xe5}, {0x101, 0xec05, 0x8001, 0x7fffffff, 0x10000}, {0x8, 0x401, 0x6, 0x3, 0x885, 0x80000000}, {0x80000001, 0x2800000, 0x7fff, 0x7, 0x6, 0x1}, {0x8e6, 0x7, 0x3, 0x1, 0x80000001}, {0x8, 0x80, 0xad8, 0x800, 0xdcd, 0x800}, {0x1, 0x2, 0x8, 0x8, 0x81, 0x7ff}, {0x9, 0x20, 0x8000, 0x8, 0x80000001, 0x8}, {0x81, 0xfffffffb, 0x401, 0x20000000, 0x7, 0x2}, {0x121ad9f3, 0x2, 0x1, 0x0, 0x2e576d16, 0x4}, {0x4, 0x7, 0x8, 0x8, 0x0, 0xffffff7f}, {0x7f, 0x7, 0x80000001, 0xffff8001, 0x5, 0x5}, {0x0, 0x9, 0x7, 0x3, 0x8, 0xfff}, {0x3, 0xfffffff9, 0x3ff, 0x8, 0x7, 0x4}, {0x6, 0xffff269f, 0x8000, 0xce6f, 0x100, 0x8}, {0xff, 0x10000, 0x2, 0xb60, 0x4, 0x3}, {0x6, 0x1f, 0x0, 0x0, 0x8f, 0x8}, {0x3, 0x1a2, 0x3, 0x0, 0x7, 0x3d9d}, {0x81, 0x7f, 0xd0, 0x20, 0xffff, 0xffffffff}, {0x5, 0x0, 0x81, 0x3, 0x8, 0xffffffff}, {0x8001, 0x4, 0x3c9, 0x9, 0x0, 0x418}, {0x17e, 0x578ab16c, 0x2, 0xffffffc1, 0x71, 0x1}, {0x10001, 0x74, 0x1, 0xcf, 0x4, 0x8}, {0x100, 0x0, 0x2000000, 0x4, 0x8, 0x8}, {0x0, 0x7, 0x7, 0x0, 0x40, 0x3ff}, {0x7, 0x10000, 0x1, 0x2, 0xfff, 0x8}, {0xfffffffc, 0x100, 0x4, 0x7, 0x9, 0x101}, {0x6, 0x101, 0xffffffff, 0x7, 0xba, 0x2}, {0x8, 0x33ac, 0x0, 0x7, 0x1000, 0x9}, {0x1, 0x9, 0x400, 0x10000, 0x6, 0x3f}, {0x4cf, 0x3f, 0x40, 0x3, 0x80000000, 0x401}, {0x6, 0x1, 0xfff, 0x2, 0xffffff50, 0x1}, {0x0, 0x1, 0x85f1, 0x3, 0x539, 0xffff}, {0x6, 0x200, 0x5, 0x4, 0x80000000, 0x27}, {0xbccd, 0x2, 0xfffffff8, 0x10000, 0x40, 0xc8}, {0x7fff, 0x200, 0x6, 0x4, 0x80000000, 0x1c00}, {0x3, 0x0, 0x40, 0x27, 0x8, 0xdc}, {0x6, 0x6, 0xffff, 0xffffff3e, 0x7fff, 0x1}, {0x8, 0x1, 0x8, 0x0, 0x9c7, 0x8}, {0x2, 0x8, 0x930, 0xfffffff8, 0x2, 0xfff}, {0x200, 0x4, 0x8, 0xb2, 0x8, 0x4}, {0xbd, 0x5, 0x5, 0x5, 0x4, 0x9}, {0x2, 0x4, 0x900, 0xb8d, 0x0, 0x7f}, {0x5, 0x76cc75a3, 0x1000, 0x4, 0xce68}, {0xffff, 0x720, 0x5, 0x9, 0x9, 0x8}, {0x1ff, 0x0, 0x2, 0x1, 0x4, 0xcd27}, {0x1, 0x1, 0x9e15, 0x8, 0x1, 0x6e9}, {0x72, 0xe0b, 0xac, 0x10000, 0x0, 0x10001}, {0x9, 0x7, 0x7, 0x8000, 0x3, 0x7f8}, {0x6174, 0x5, 0x1ff, 0x9, 0x10001, 0x4e3b}, {0x81, 0x1, 0x101, 0x2, 0x10001, 0x1}, {0xfffffffd, 0x7, 0x7c3, 0x9, 0x7, 0x6}, {0x7fff, 0x5, 0x7, 0x9242, 0x401, 0x3}, {0x4540, 0xfff, 0x80000000, 0x0, 0x8000, 0x4}, {0x1, 0x3f, 0x7fffffff, 0x6, 0x10001, 0x3218}, {0x20, 0x2ccb, 0x800, 0x7ff, 0x1, 0x80000001}, {0x9, 0x0, 0x6, 0xf1, 0x5, 0x4}, {0x4, 0x40, 0x8, 0x80000001, 0x3ff, 0x9}, {0x7, 0xcc57, 0x1, 0x401, 0x3, 0x400}, {0x2, 0x98, 0x9, 0xd83, 0xb, 0x4}, {0x9, 0x5, 0x8000, 0x5, 0x7, 0x91}, {0x40, 0x2e6b, 0x400, 0xffffffff, 0x0, 0x1000}, {0x2, 0x1, 0x80, 0xef8, 0x1000, 0x100}, {0x92c8, 0x7b, 0x0, 0x1, 0x7, 0x3ff}, {0x3, 0x7, 0x0, 0xdb, 0x5, 0x7fffffff}, {0x6, 0x6f1, 0x0, 0x1ff, 0x7, 0x3}, {0x9, 0x9d, 0x0, 0xfffffff8, 0x100, 0xa}, {0x5, 0x9, 0x5, 0x0, 0x4, 0x1}, {0x6, 0x80000000, 0x99, 0x8, 0x3, 0x9}, {0x401, 0x6, 0xa2, 0x8e5, 0x1, 0x6}, {0x7fff, 0x1f, 0x517, 0xc1ee, 0x4f6b1720, 0x3b7b}, {0x800, 0x1, 0x5, 0x1ff, 0x8, 0x401}, {0x10000, 0x5, 0x1, 0xc8e4, 0x4, 0x5}, {0x7fff, 0x7f, 0x20, 0x48a7, 0x7, 0x9}, {0x80000000, 0xffff, 0x1, 0x3f, 0x3, 0x8}, {0x1, 0x4, 0x2, 0xffffffff, 0x0, 0x7}, {0x800, 0x6, 0x1, 0xfff0, 0x4, 0x61}, {0x6, 0x7, 0x0, 0x8, 0x8, 0x8}, {0xfffffffc, 0x9, 0x40000, 0x80000000, 0x4, 0x800}, {0x6, 0xe6f4, 0x1000, 0x8, 0xa38d, 0xfffff800}, {0xdc, 0x80000001, 0x1664c902, 0x7, 0x6, 0x7fff}, {0x8, 0x3, 0x7, 0x5, 0x400, 0x200}, {0xfffffffe, 0x7, 0x6, 0x4, 0x6, 0x9}, {0xfffffffe, 0x81, 0x4, 0xc, 0xd56a, 0x552}, {0x10000, 0xf0f, 0x3, 0x1cd, 0x10000, 0xffffffff}, {0x643, 0x1ff, 0x3ff, 0x8, 0x3, 0x3}, {0x2, 0x8d3, 0x2b7, 0x3, 0x57fd835}, {0x0, 0xfffffffd, 0xfff, 0x800, 0x1ff}, {0x8, 0x6, 0x2, 0x22, 0xfffffc01, 0xbcf}, {0x297a, 0x80000001, 0x3ff, 0x90, 0x0, 0x3ff}, {0x8001, 0x1000, 0x7, 0x44e, 0x0, 0x7ff}], [{0x2, 0x1}, {0x2, 0x1}, {0x5}, {0x1, 0x1}, {0x3}, {0x2}, {0x4, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2}, {0x3}, {0x6, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x5}, {0x3}, {0x3, 0x1}, {0x4}, {0x5}, {}, {0x3}, {0x1}, {0x0, 0x92180b8f7aa9b009}, {0x5, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x2}, {0x3}, {0x5}, {0x0, 0x1}, {0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x3}, {0x5, 0x1}, {0x2}, {0x5, 0x1}, {0x2}, {0x3}, {0x3, 0x1}, {0x3, 0x1}, {}, {0x2}, {0x1, 0x1}, {0x2, 0x1}, {}, {0x3}, {0x4}, {0x5, 0x1}, {0x5}, {0x5}, {0x2, 0x1}, {0x7}, {0x3, 0x1}, {0x3}, {0x3}, {0x0, 0x1}, {0x5}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x2}, {0x2, 0x1}, {0x1, 0x3}, {0x3}, {0x4, 0x1}, {0x2, 0x1}, {0x3}, {0x3, 0x1}, {0x2}, {0x3}, {0x1, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x3}, {0x3, 0x1}, {0x3}, {0x3, 0x1}, {0x3, 0x1}, {0x5}, {0x5}, {}, {0x3}, {0x0, 0x1}, {0x1}, {0x3}, {}, {0x2}, {0x0, 0x1}, {0x4}, {0x5, 0x1}, {0x5}, {0x2}, {0x18aebd87c4d393c}, {0x1, 0x1}, {0x4, 0x1}, {0x3}, {0x4}, {0x3}, {0x4}, {0x0, 0x1}, {0x2, 0x1}, {}, {0x5}, {0x2}, {0x4, 0x1}, {0x3}, {0x4}, {0x1}, {0x3}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x3}], 0x1}}, @TCA_PEDIT_KEYS_EX={0xb0, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x44, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}]}, @TCA_PEDIT_KEYS_EX={0x68, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0xd}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}]}, @TCA_PEDIT_KEYS_EX={0x4c, 0x5, 0x0, 0x1, [{0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}]}]}, {0xa8, 0x6, "390a05ccc3282dac39a30c1ee4b7a017987aa8d5d0d10fbd267b09f263f6164f91129b8530d434eca2ea4cb9bdba4f4a0d1c83a1a723bcfc00291ad785e6a7a4dfc2e5e2bffaac161593bea66d23a675a7774ca44f765a58710733d9213e4d7064f0ba52ad78422a5511fc77c3b1afd4d92baa727451ceede43272c082d6246b21bb1819e6bb09cca2ad6b6b01bb208c7aa1f4ef2237f00f3376a0e709ca32c80664b344"}, {0xc}, {0xc, 0x8, {0x3}}}}]}]}}]}, 0x551c}, 0x1, 0x0, 0x0, 0x11}, 0x4000090) 14:22:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:08 executing program 1: [ 421.043706][ T32] audit: type=1800 audit(1595427728.880:260): pid=14310 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=92 res=0 14:22:09 executing program 3: 14:22:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:22:09 executing program 4: 14:22:09 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:09 executing program 1: 14:22:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 421.779891][ T32] audit: type=1800 audit(1595427729.610:261): pid=14319 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=92 res=0 [ 421.828152][T14329] ntfs: (device loop5): parse_options(): Invalid uid option argument: 0x00000000ffffffff 14:22:09 executing program 3: [ 422.088776][T14340] ntfs: (device loop5): parse_options(): Invalid uid option argument: 0x00000000ffffffff 14:22:10 executing program 4: 14:22:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000200)={[0x7, 0xfbfffffffffffffe, 0x4, 0x8, 0x400, 0x2, 0x7f, 0x1000, 0x1, 0x7, 0x4, 0x61, 0x2, 0x0, 0xfffffffffffffffd, 0x1], 0x1, 0x2000}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r2 = openat$vcsa(0xffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x800, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x82, &(0x7f0000000000)={r5}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000002c0)={r5, @in6={{0xa, 0x4e20, 0x1000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x8, 0xfffe}, 0x88) r6 = memfd_create(&(0x7f0000000100)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x6) ftruncate(r6, 0x40003) sendfile(r1, r6, 0x0, 0x2008000fffffffe) 14:22:10 executing program 1: 14:22:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:22:10 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:10 executing program 4: [ 422.857126][ T32] kauditd_printk_skb: 1 callbacks suppressed [ 422.857172][ T32] audit: type=1800 audit(1595427730.690:263): pid=14348 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16380 res=0 14:22:11 executing program 3: [ 423.138051][T14360] ntfs: (device loop5): parse_options(): Invalid uid option argument: 0x00000000ffffffff 14:22:11 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r2 = socket(0x10, 0x80002, 0x0) r3 = gettid() sendmmsg$unix(r2, &(0x7f0000000a80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@cred={{0x18, 0x1, 0x2, {r3, 0xee00}}}], 0x18}], 0x1, 0x0) rt_tgsigqueueinfo(r1, r3, 0x2a, &(0x7f0000000140)={0x41, 0x10001, 0x5}) r4 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x10) ftruncate(r4, 0x40003) sendfile(r0, r4, 0x0, 0x2008000fffffffe) 14:22:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:22:11 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:11 executing program 4: 14:22:11 executing program 1: 14:22:11 executing program 3: [ 423.637275][T14369] ntfs: (device loop5): parse_options(): Invalid uid option argument: 0x00000000ffffffff 14:22:11 executing program 1: 14:22:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:22:11 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) [ 423.982162][T14376] FAT-fs (loop0): bogus number of reserved sectors [ 423.989932][T14376] FAT-fs (loop0): Can't find a valid FAT filesystem [ 424.023525][ T32] audit: type=1800 audit(1595427731.860:264): pid=14379 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16371 res=0 14:22:12 executing program 1: 14:22:12 executing program 4: [ 424.269433][ T32] audit: type=1800 audit(1595427732.100:265): pid=14379 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16371 res=0 14:22:12 executing program 3: 14:22:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file1\x00', 0x0, 0x14) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:22:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 424.581260][T14388] ntfs: (device loop5): parse_options(): Invalid uid option argument: 0x00000000ffffffff 14:22:12 executing program 1: 14:22:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:12 executing program 4: 14:22:12 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid'}}]}) 14:22:13 executing program 3: 14:22:13 executing program 1: 14:22:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:13 executing program 4: 14:22:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000100)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) r3 = memfd_create(&(0x7f0000000000)='msdos\x00', 0x0) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000140)={r3, 0x1, 0xfffffffff0000000, 0x1010000}) ftruncate(r1, 0x40003) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) recvmsg$can_bcm(r5, &(0x7f0000000440)={&(0x7f0000000180)=@isdn, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/37, 0x25}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/3, 0x3}, {&(0x7f0000000280)=""/93, 0x5d}, {&(0x7f0000000300)=""/88, 0x58}], 0x5, &(0x7f0000000400)=""/52, 0x34}, 0x103) sendfile(r0, r1, 0x0, 0x2008000fffffffe) [ 425.799975][T14410] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:22:13 executing program 4: [ 426.107672][ T32] audit: type=1800 audit(1595427733.940:266): pid=14421 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=93 res=0 14:22:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:14 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid'}}]}) 14:22:14 executing program 4: 14:22:14 executing program 1: 14:22:14 executing program 3: [ 426.652327][T14428] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:22:14 executing program 4: 14:22:14 executing program 1: 14:22:14 executing program 3: 14:22:14 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000240)={0xf, 0x40, 0x1ff}) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000100)=0x3f) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='+\x00', r2}, 0x10) write$binfmt_misc(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="73797a3058019509f822c726d8c8b6c15afa13fb348160ac166f16b30148fb04b9fead163c0c1aec35dc70e3ec784ee853b9fe701a031cbd9fa14e0166626d949bf06c49dba38f052ecae7cee0b707b0e48dae80969caff094f8bbdb3b5fb0edb22f9e32ec7ec170685c782750afe3862a58fc4abe25dc3c77cc78381167c5d02bb26f6044739ad93135d5c5e909037ce183b9c3645f704be36c2aba6ae9b56babbf3dd9072df5aee7543c0bbae63f125ae1c2ee9fba07984aaf31ea1a97a906cabbed281a786290aee0bff947eb00c414b8260d734ee2de43c627d83a022dbe0cd562ee"], 0x62) r4 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r4, 0x40003) 14:22:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:22:15 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid'}}]}) 14:22:15 executing program 4: 14:22:15 executing program 1: 14:22:15 executing program 3: [ 427.689029][T14447] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:22:15 executing program 4: 14:22:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:22:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="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", 0x10b}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) lsetxattr$security_selinux(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:auditd_etc_t:s0\x00', 0x22, 0x1) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:22:16 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r0}}]}) 14:22:16 executing program 3: 14:22:16 executing program 1: 14:22:16 executing program 4: [ 428.495911][T14465] FAT-fs (loop0): bogus number of reserved sectors [ 428.503018][T14465] FAT-fs (loop0): Can't find a valid FAT filesystem [ 428.541758][T14467] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 428.566475][ T32] audit: type=1800 audit(1595427736.400:267): pid=14470 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16383 res=0 14:22:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, 0x0, 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:22:16 executing program 3: [ 428.829147][T14465] FAT-fs (loop0): bogus number of reserved sectors [ 428.836420][T14465] FAT-fs (loop0): Can't find a valid FAT filesystem 14:22:16 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r0}}]}) [ 428.930546][ T32] audit: type=1800 audit(1595427736.760:268): pid=14477 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16364 res=0 14:22:16 executing program 4: 14:22:16 executing program 1: 14:22:17 executing program 0: rt_sigaction(0x1e, &(0x7f0000000180)={&(0x7f0000000100)="8fc95801dd0fec123e0f4eebdabfc75c0000c4e17e1138e3e3c4c381cfac9f58ffffff00f031390f4e300f54ff", 0x1, &(0x7f0000000140)="c4e2b9b9a7ed000000c4c2b998b1ef000000660ff27505c4e2f9233bc4e2e19e990a000000150f0000000f9c6d08c4e1fd286d000f935e00c4c19df9c5", {[0x2, 0x6]}}, &(0x7f0000000240)={&(0x7f00000001c0)="c4e34d4b0692f36767d26a66c4e18d5812c4c2a928b300000000c7c00e000000c4c111616df7c4e1f9f523c4e263f5b1008000000f53d4f00fc78a8679b9bf", 0x0, &(0x7f0000000200)="0f38cd5a713e3626670fb7b30262c4e133d0206b9fcedc00000cde5e230f1336660ffbf0f20f1ed6663ef20f59ffc4e27d134282"}, 0x8, &(0x7f0000000280)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000002c0)=@int=0x4, 0x4) chdir(&(0x7f0000000000)='./file1\x00') r2 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r3 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r3, 0x40003) sendfile(r2, r3, 0x0, 0x2008000fffffffe) 14:22:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:17 executing program 4: [ 429.434079][T14484] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:22:17 executing program 1: 14:22:17 executing program 3: 14:22:17 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r0}}]}) 14:22:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:17 executing program 4: [ 430.033488][ T32] audit: type=1800 audit(1595427737.870:269): pid=14498 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=95 res=0 [ 430.136983][T14502] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:22:18 executing program 1: 14:22:18 executing program 3: 14:22:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x68) 14:22:18 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) [ 430.567918][ T32] audit: type=1800 audit(1595427738.390:270): pid=14500 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=95 res=0 14:22:18 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file1\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:22:18 executing program 4: [ 430.773667][T14513] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:22:18 executing program 1: 14:22:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:22:19 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:19 executing program 4: 14:22:19 executing program 3: [ 431.398226][ T32] audit: type=1800 audit(1595427739.230:271): pid=14524 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="loop0" ino=96 res=0 14:22:19 executing program 1: 14:22:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:22:19 executing program 4: [ 431.692405][T14533] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:22:19 executing program 3: 14:22:19 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffffffff, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}, {&(0x7f0000000140)="0e98f71422af58b9", 0x8, 0x1000}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x4, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000200), 0x0, 0x1}, {&(0x7f0000000240)="dd36d6ed9824310ee7ba560112cde5b31beb21d539d7818799e6ddb6ab6fc29fa25bdcd3e1206baba0ae7f2eb0336d7acec72843b4576379f074", 0x3a, 0xffff8000}, {&(0x7f0000000280)="236c1439d71fc9418caf391668618d86b99dac51858c8dcd9909008d7fe0ce", 0x1f, 0x1}, {&(0x7f00000002c0)="1c6d15b2f389ee64d035ebdc2423df4b93997e0bebfa135eee607ccc58215f73a9b9afae39975290d44ade1ee95575cd3bd2670730ae33b5f8c64244311e1117e12eb44256ad9927d856b792cd4a1a339684bd212589a4950589326dccbf66467545b04d1f50c766", 0x68, 0x7}, {&(0x7f0000000400)="f4bd872b2c832118f92e7eb0a4fdc7beebdce2eb9200ff3bc691e099d5a1a2ee06b57039d63c7b3c4e1e2e1ce0610362df3e4e488724479ee9b07eeacb46c8fff8479c12ae3852a0dc3bcf9815592f2a0c23287658b9ed665681bfe7b0423e6abb407e6d4f432d7c86c1c4d2ee2e76ed027954819b3c57a10d3f91556b36e1c9bd9a", 0x82, 0x7fffffff}, {&(0x7f0000000340)="ac144a1d693ede4b4de454d0ae667d89ecaa9f1e10963106", 0x18, 0x1}], 0x2012880, &(0x7f0000000540)={[{@fat=@discard='discard'}], [{@appraise_type='appraise_type=imasig'}, {@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000100)) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:22:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 14:22:20 executing program 1: 14:22:20 executing program 4: 14:22:20 executing program 3: 14:22:20 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r0}}]}) 14:22:20 executing program 4: 14:22:21 executing program 1: 14:22:21 executing program 2: 14:22:21 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x100, 0x0, &(0x7f0000000180), 0x1004801, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000001200)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="6afaf8e67527ffbe2a8bae88657f7bb9", 0x10}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x9, 0x2, 0x400, 0x8b4, 0x7}, &(0x7f0000000180)=0x14) r3 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r3, 0x40003) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="0907000000000000000001"], 0x14}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x100, 0x70bd2d, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x24000010}, 0x84) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) setresuid(0x0, r6, 0x0) fchownat(r4, &(0x7f0000000080)='./file0\x00', r6, 0xee00, 0x1000) sendfile(r0, r3, 0x0, 0x2008000fffffffe) 14:22:21 executing program 4: 14:22:21 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r0}}]}) 14:22:21 executing program 3: 14:22:21 executing program 1: 14:22:21 executing program 2: [ 433.855020][T14574] __ntfs_error: 3 callbacks suppressed [ 433.855055][T14574] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 433.902011][T14575] FAT-fs (loop0): bogus number of reserved sectors [ 433.908615][T14575] FAT-fs (loop0): Can't find a valid FAT filesystem 14:22:21 executing program 4: 14:22:22 executing program 1: 14:22:22 executing program 3: 14:22:22 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r0}}]}) 14:22:22 executing program 2: 14:22:22 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x2}], 0x4040, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) setresuid(0x0, r4, r4) open(&(0x7f0000000180)='./file0\x00', 0x509180, 0x132) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r6, 0x0) fchownat(r2, &(0x7f0000000100)='./file0\x00', r4, r6, 0x1000) ftruncate(r1, 0x40003) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000000080)={0x4, 0x9}) ioctl$vim2m_VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f00000001c0)={0x200, 0x686711b}) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:22:22 executing program 1: [ 434.941129][T14594] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:22:22 executing program 4: [ 435.146137][T14600] FAT-fs (loop0): invalid media value (0x74) [ 435.152460][T14600] FAT-fs (loop0): Can't find a valid FAT filesystem 14:22:23 executing program 1: [ 435.188995][ T32] audit: type=1800 audit(1595427743.020:273): pid=14600 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16384 res=0 14:22:23 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000600)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid'}}]}) 14:22:23 executing program 2: 14:22:23 executing program 3: 14:22:23 executing program 4: 14:22:23 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) r2 = inotify_init1(0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f00000038c0)=""/180, 0xb4}], 0x1) inotify_rm_watch(r2, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f00000001c0)={0x1, 0x3, 0x1000, 0x58, &(0x7f0000000100)="157c1cf7fe427673a72f4d47f6396a4af606eb69adb693f607c3014e2b706614d8c95870608519b7f7651fd198bd03e0ef88a478d45f1a580fd5b8853c8c577e4e6fa1a35a43eee2f4265bdd00b0ae5b462eba131b00729c", 0xd, 0x0, &(0x7f0000000180)="bbed64d030daa8d24e9b5ce3e6"}) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) [ 435.750074][T14611] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 436.003551][ T32] audit: type=1800 audit(1595427743.840:274): pid=14621 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16083 res=0 14:22:23 executing program 2: 14:22:24 executing program 1: 14:22:24 executing program 4: 14:22:24 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000600)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid'}}]}) [ 436.659015][ T32] audit: type=1800 audit(1595427744.490:275): pid=14619 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15921 res=0 14:22:24 executing program 3: 14:22:24 executing program 4: 14:22:24 executing program 2: 14:22:24 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000d, 0x10012, r1, 0x0) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000140)) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550d, &(0x7f0000000100)) r2 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000200)={0x1, 0x2}) r3 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r3, 0x40003) ioctl$FITHAW(r1, 0xc0045878) sendfile(r2, r3, 0x0, 0x2008000fffffffe) r4 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x7fff, 0x200) ioctl$SNAPSHOT_SET_SWAP_AREA(r4, 0x400c330d, &(0x7f00000001c0)={0x9, 0x6}) 14:22:24 executing program 1: [ 437.009432][T14634] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:22:25 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000600)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid'}}]}) 14:22:25 executing program 3: 14:22:25 executing program 4: 14:22:25 executing program 2: 14:22:25 executing program 1: [ 437.759025][T14649] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:22:25 executing program 3: 14:22:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r1 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r1, 0x40003) sendfile(r0, r1, 0x0, 0x2008000fffffffe) 14:22:25 executing program 3: 14:22:26 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:26 executing program 4: 14:22:26 executing program 2: 14:22:26 executing program 1: 14:22:26 executing program 1: [ 438.543746][ T32] audit: type=1800 audit(1595427746.380:276): pid=14661 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=98 res=0 14:22:26 executing program 3: [ 438.700413][ T32] audit: type=1800 audit(1595427746.430:277): pid=14665 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=98 res=0 14:22:26 executing program 0: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000500)=ANY=[@ANYBLOB="e0000002ac1414aa0000000005000000ac"], 0x24) close(r0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfea7) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000140)={0x8, 0x50}) r2 = open(&(0x7f0000001380)='./file0\x00', 0x1ada42, 0x0) r3 = memfd_create(&(0x7f0000000040)='/n\xcb2\x88\x1d\xf9\xff\xe7\xdc[\x17\x8b\xb2\xf7W\xf0\x06\x00\x00@\xc8k\xc0\xa5veli', 0x0) ftruncate(r3, 0x40003) sendfile(r2, r3, 0x0, 0x2008000fffffffe) 14:22:26 executing program 2: 14:22:26 executing program 1: 14:22:26 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:26 executing program 4: 14:22:27 executing program 3: [ 439.422505][T14685] __ntfs_error: 1 callbacks suppressed [ 439.422542][T14685] ntfs: (device loop5): parse_options(): Unrecognized mount option . [ 439.450590][ T32] audit: type=1800 audit(1595427747.280:278): pid=14686 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16371 res=0 14:22:27 executing program 1: 14:22:27 executing program 2: [ 439.737865][ T32] audit: type=1800 audit(1595427747.420:279): pid=14690 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16371 res=0 [ 439.759099][ T32] audit: type=1800 audit(1595427747.450:280): pid=14681 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed comm="syz-executor.0" name="cpuacct.usage_percpu_sys" dev="sda1" ino=16373 res=0 14:22:27 executing program 0: 14:22:27 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, 0x0) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:27 executing program 4: 14:22:28 executing program 2: 14:22:28 executing program 1: timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f00000000c0), 0xb, 0x0, 0x0, &(0x7f00000001c0), 0x0) [ 440.435860][T14701] ntfs: (device loop5): parse_options(): Unrecognized mount option . 14:22:28 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0x100000001) socket$inet(0x2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r3, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x1, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x5, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) 14:22:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') readlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000340)=""/143, 0x8f) 14:22:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_DEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x2, 0x9, 0x301, 0x0, 0x0, {0x0, 0x0, 0x1}, [@NFCTH_TUPLE={0x4}]}, 0x18}}, 0x0) 14:22:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000440)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x3f, 0x0, [{0x0, 0x0, 0x0, [], 0x4}, {0x1, 0x6, 0x74, [], 0xf7}, {0x5, 0x6f, 0x0, [], 0x4}, {0x29, 0x7, 0x0, [], 0x9}, {0x0, 0x81, 0x4}, {0x0, 0x0, 0x5}, {}, {}, {0x0, 0x0, 0x7f, [], 0x81}, {0x0, 0x0, 0x3, [], 0x9}, {0x0, 0xfb}, {}, {0x40, 0x7}, {}, {0x0, 0x6b}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x5e}]}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe37]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:22:28 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) [ 441.197721][ T32] audit: type=1804 audit(1595427749.030:281): pid=14727 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir367321397/syzkaller.Ho0RIs/180/memory.events" dev="sda1" ino=16384 res=1 [ 441.223711][ T32] audit: type=1800 audit(1595427749.030:282): pid=14727 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.3" name="memory.events" dev="sda1" ino=16384 res=0 14:22:29 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet6(0x10, 0x3, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e22c, 0xb) 14:22:29 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f00000002c0)="73844ae8fc00000000", 0x9, 0xfffffffffffffffc}]) 14:22:29 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:29 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffb) [ 441.735948][ T32] audit: type=1804 audit(1595427749.110:283): pid=14718 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir367321397/syzkaller.Ho0RIs/180/cgroup.controllers" dev="sda1" ino=16374 res=1 14:22:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f0000000500)=[{&(0x7f0000000100)="580000001400add427323b472545b45602117fffffff81024e224e227f000001925aa80020007b00090080007f000001e809000000ff0000f069ccdcff74fc3ac7", 0x41}, {&(0x7f0000000300)="84e4bdb8cb93bc56849414a7daf0cf2faac1555b040b7f", 0x17}], 0x2) 14:22:30 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x3, 0x0, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000440)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x3f, 0x0, [{0x0, 0x0, 0x0, [], 0x4}, {0x1, 0x6, 0x0, [], 0xf7}, {0x5, 0x6f, 0x0, [], 0x4}, {0x29, 0x0, 0x0, [], 0x9}, {0x0, 0x81}, {0x0, 0x92}, {0x0, 0x0, 0x0, [], 0xbf}, {}, {0x0, 0x0, 0x7f, [], 0x81}, {0x0, 0x0, 0x3, [], 0x9}, {0x0, 0xfb}, {}, {0x40, 0x7}, {}, {0x0, 0x6b}, {}, {}, {0x0, 0x0, 0x0, [], 0x7}, {}, {}, {}, {0x0, 0x0, 0x5e}]}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe37]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:22:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x3, 0x0, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000440)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x3f, 0x0, [{0x0, 0x0, 0x0, [], 0x4}, {0x1, 0x6, 0x74, [], 0xf7}, {0x5, 0x6f, 0x0, [], 0x4}, {0x29}, {0x0, 0x81}, {0x0, 0x92}, {0x0, 0x0, 0x0, [], 0xbf}, {}, {0x0, 0x0, 0x7f, [], 0x81}, {0x0, 0x0, 0x3, [], 0x9}, {0x0, 0xfb}, {}, {0x40, 0x7}, {}, {0x0, 0x6b}, {}, {}, {0x0, 0x0, 0x0, [], 0x7}, {}, {}, {}, {0x0, 0x0, 0x5e}]}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe37]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 442.441255][ T32] audit: type=1804 audit(1595427750.270:284): pid=14747 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir367321397/syzkaller.Ho0RIs/181/bus" dev="sda1" ino=16348 res=1 [ 442.612904][ T32] audit: type=1804 audit(1595427750.400:285): pid=14748 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir367321397/syzkaller.Ho0RIs/181/bus" dev="sda1" ino=16348 res=1 14:22:30 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 14:22:30 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000000)) 14:22:31 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:31 executing program 2: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="ff", 0x1, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r0, 0x100) [ 444.662430][ C1] not chained 10000 origins [ 444.666986][ C1] CPU: 1 PID: 13667 Comm: kworker/u4:1 Not tainted 5.8.0-rc5-syzkaller #0 [ 444.675506][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.685732][ C1] Workqueue: krdsd rds_connect_worker [ 444.691090][ C1] Call Trace: [ 444.694407][ C1] [ 444.697261][ C1] dump_stack+0x1df/0x240 [ 444.701634][ C1] kmsan_internal_chain_origin+0x6f/0x130 [ 444.707360][ C1] ? should_fail+0x72/0x9e0 [ 444.711861][ C1] ? ret_from_fork+0x22/0x30 [ 444.716456][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 444.722508][ C1] ? arch_stack_walk+0x34c/0x3e0 [ 444.727451][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 444.732654][ C1] ? __should_failslab+0x1f6/0x290 [ 444.737773][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 444.742873][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 444.748700][ C1] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 444.754864][ C1] ? tcp_parse_options+0x1ada/0x1b90 [ 444.760182][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 444.765365][ C1] __msan_chain_origin+0x50/0x90 [ 444.770296][ C1] tcp_conn_request+0x174b/0x4d10 [ 444.775359][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 444.780557][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 444.785756][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 444.791579][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 444.796802][ C1] tcp_v4_conn_request+0x19b/0x240 [ 444.801916][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 444.806937][ C1] ? inet6_sk_rx_dst_set+0x400/0x400 [ 444.812210][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 444.817571][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 444.822773][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 444.828584][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 444.834654][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 444.839865][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 444.844478][ C1] tcp_v4_rcv+0x425c/0x5040 [ 444.848976][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 444.855067][ C1] ? tcp_filter+0xf0/0xf0 [ 444.859481][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 444.864974][ C1] ip_local_deliver+0x62a/0x7c0 [ 444.869820][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 444.874841][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 444.880484][ C1] ip_rcv+0x6cf/0x750 [ 444.884487][ C1] ? ip_rcv_core+0x12c0/0x12c0 [ 444.889268][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 444.894915][ C1] process_backlog+0xfb5/0x14e0 [ 444.899823][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 444.905110][ C1] net_rx_action+0x746/0x1aa0 [ 444.909804][ C1] ? net_tx_action+0xc40/0xc40 [ 444.914670][ C1] __do_softirq+0x311/0x83d [ 444.919187][ C1] asm_call_on_stack+0x12/0x20 [ 444.923950][ C1] [ 444.926901][ C1] do_softirq_own_stack+0x7c/0xa0 [ 444.931920][ C1] __local_bh_enable_ip+0x184/0x1d0 [ 444.937170][ C1] local_bh_enable+0x36/0x40 [ 444.941873][ C1] ip_finish_output2+0x1fee/0x24a0 [ 444.947010][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 444.953101][ C1] __ip_finish_output+0xaa7/0xd80 [ 444.958132][ C1] ip_finish_output+0x166/0x410 [ 444.963038][ C1] ip_output+0x593/0x680 [ 444.967300][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 444.972581][ C1] ? ip_finish_output+0x410/0x410 [ 444.977615][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 444.982561][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 444.988115][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 444.993343][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 444.998570][ C1] ip_queue_xmit+0xcc/0xf0 [ 445.003068][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 445.007931][ C1] __tcp_transmit_skb+0x440e/0x6090 [ 445.013183][ C1] tcp_connect+0x4208/0x6830 [ 445.017794][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 445.023111][ C1] tcp_v4_connect+0x21fd/0x2370 [ 445.027986][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 445.032943][ C1] __inet_stream_connect+0x2fb/0x1340 [ 445.038325][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 445.043636][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 445.048875][ C1] inet_stream_connect+0x101/0x180 [ 445.054001][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 445.059646][ C1] rds_tcp_conn_path_connect+0x8a7/0xb70 [ 445.065309][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 445.070528][ C1] ? rds_tcp_state_change+0x390/0x390 [ 445.076343][ C1] rds_connect_worker+0x2a6/0x470 [ 445.081357][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 445.087413][ C1] ? rds_addr_cmp+0x200/0x200 [ 445.092077][ C1] process_one_work+0x1540/0x1f30 [ 445.097119][ C1] worker_thread+0xed2/0x23f0 [ 445.101839][ C1] kthread+0x515/0x550 [ 445.105916][ C1] ? process_one_work+0x1f30/0x1f30 [ 445.111117][ C1] ? kthread_blkcg+0xf0/0xf0 [ 445.115728][ C1] ret_from_fork+0x22/0x30 [ 445.120164][ C1] Uninit was stored to memory at: [ 445.125290][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 445.131010][ C1] __msan_chain_origin+0x50/0x90 [ 445.135961][ C1] tcp_conn_request+0x1781/0x4d10 [ 445.141103][ C1] tcp_v4_conn_request+0x19b/0x240 [ 445.146223][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 445.151253][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 445.156639][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 445.161236][ C1] tcp_v4_rcv+0x425c/0x5040 [ 445.165748][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 445.171216][ C1] ip_local_deliver+0x62a/0x7c0 [ 445.176075][ C1] ip_rcv+0x6cf/0x750 [ 445.180092][ C1] process_backlog+0xfb5/0x14e0 [ 445.184958][ C1] net_rx_action+0x746/0x1aa0 [ 445.189648][ C1] __do_softirq+0x311/0x83d [ 445.194142][ C1] [ 445.196464][ C1] Uninit was stored to memory at: [ 445.201493][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 445.207216][ C1] __msan_chain_origin+0x50/0x90 [ 445.212161][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 445.217463][ C1] tcp_conn_request+0x33d7/0x4d10 [ 445.222503][ C1] tcp_v4_conn_request+0x19b/0x240 [ 445.227622][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 445.232652][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 445.238032][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 445.242638][ C1] tcp_v4_rcv+0x425c/0x5040 [ 445.247145][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 445.252605][ C1] ip_local_deliver+0x62a/0x7c0 [ 445.257472][ C1] ip_rcv+0x6cf/0x750 [ 445.261891][ C1] process_backlog+0xfb5/0x14e0 [ 445.266752][ C1] net_rx_action+0x746/0x1aa0 [ 445.271432][ C1] __do_softirq+0x311/0x83d [ 445.275943][ C1] [ 445.278266][ C1] Uninit was stored to memory at: [ 445.283390][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 445.289114][ C1] __msan_chain_origin+0x50/0x90 [ 445.294054][ C1] tcp_conn_request+0x1781/0x4d10 [ 445.299082][ C1] tcp_v4_conn_request+0x19b/0x240 [ 445.304198][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 445.309230][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 445.314608][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 445.319222][ C1] tcp_v4_rcv+0x425c/0x5040 [ 445.323747][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 445.329224][ C1] ip_local_deliver+0x62a/0x7c0 [ 445.334105][ C1] ip_rcv+0x6cf/0x750 [ 445.338116][ C1] process_backlog+0xfb5/0x14e0 [ 445.342977][ C1] net_rx_action+0x746/0x1aa0 [ 445.347657][ C1] __do_softirq+0x311/0x83d [ 445.352156][ C1] [ 445.354487][ C1] Uninit was stored to memory at: [ 445.359607][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 445.365336][ C1] __msan_chain_origin+0x50/0x90 [ 445.370278][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 445.375566][ C1] tcp_conn_request+0x33d7/0x4d10 [ 445.380613][ C1] tcp_v4_conn_request+0x19b/0x240 [ 445.385726][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 445.390756][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 445.396153][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 445.400858][ C1] tcp_v4_rcv+0x425c/0x5040 [ 445.405448][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 445.410903][ C1] ip_local_deliver+0x62a/0x7c0 [ 445.415755][ C1] ip_rcv+0x6cf/0x750 [ 445.419759][ C1] process_backlog+0xfb5/0x14e0 [ 445.424626][ C1] net_rx_action+0x746/0x1aa0 [ 445.429322][ C1] __do_softirq+0x311/0x83d [ 445.433841][ C1] [ 445.436169][ C1] Uninit was stored to memory at: [ 445.441228][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 445.446963][ C1] __msan_chain_origin+0x50/0x90 [ 445.452875][ C1] tcp_conn_request+0x1781/0x4d10 [ 445.457932][ C1] tcp_v4_conn_request+0x19b/0x240 [ 445.463054][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 445.468365][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 445.473743][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 445.478347][ C1] tcp_v4_rcv+0x425c/0x5040 [ 445.482856][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 445.488321][ C1] ip_local_deliver+0x62a/0x7c0 [ 445.493176][ C1] ip_rcv+0x6cf/0x750 [ 445.497169][ C1] process_backlog+0xfb5/0x14e0 [ 445.502025][ C1] net_rx_action+0x746/0x1aa0 [ 445.506705][ C1] __do_softirq+0x311/0x83d [ 445.511196][ C1] [ 445.513519][ C1] Uninit was stored to memory at: [ 445.518556][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 445.524302][ C1] __msan_chain_origin+0x50/0x90 [ 445.529247][ C1] tcp_openreq_init_rwin+0xc21/0xc80 [ 445.534623][ C1] tcp_conn_request+0x33d7/0x4d10 [ 445.539653][ C1] tcp_v4_conn_request+0x19b/0x240 [ 445.544770][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 445.550165][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 445.554769][ C1] tcp_v4_rcv+0x425c/0x5040 [ 445.559287][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 445.564864][ C1] ip_local_deliver+0x62a/0x7c0 [ 445.569734][ C1] ip_sublist_rcv+0x125d/0x1450 [ 445.574586][ C1] ip_list_rcv+0x904/0x970 [ 445.579017][ C1] __netif_receive_skb_list_core+0x1459/0x14d0 [ 445.585181][ C1] netif_receive_skb_list_internal+0xf66/0x1610 [ 445.591428][ C1] napi_complete_done+0x439/0xe10 [ 445.596457][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 445.601834][ C1] virtnet_poll+0x1468/0x19f0 [ 445.606519][ C1] net_rx_action+0x746/0x1aa0 [ 445.611200][ C1] __do_softirq+0x311/0x83d [ 445.615689][ C1] [ 445.618015][ C1] Uninit was stored to memory at: [ 445.623045][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 445.628762][ C1] __msan_chain_origin+0x50/0x90 [ 445.633700][ C1] tcp_conn_request+0x1781/0x4d10 [ 445.638730][ C1] tcp_v4_conn_request+0x19b/0x240 [ 445.643865][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 445.649242][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 445.653836][ C1] tcp_v4_rcv+0x425c/0x5040 [ 445.658342][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 445.663801][ C1] ip_local_deliver+0x62a/0x7c0 [ 445.668655][ C1] ip_sublist_rcv+0x125d/0x1450 [ 445.673512][ C1] ip_list_rcv+0x904/0x970 [ 445.677945][ C1] __netif_receive_skb_list_core+0x1459/0x14d0 [ 445.684109][ C1] netif_receive_skb_list_internal+0xf66/0x1610 [ 445.690358][ C1] napi_complete_done+0x439/0xe10 [ 445.695405][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 445.700783][ C1] virtnet_poll+0x1468/0x19f0 [ 445.705465][ C1] net_rx_action+0x746/0x1aa0 [ 445.710151][ C1] __do_softirq+0x311/0x83d [ 445.714907][ C1] [ 445.717230][ C1] Uninit was created at: [ 445.721478][ C1] kmsan_save_stack_with_flags+0x3c/0x90 [ 445.727123][ C1] kmsan_alloc_page+0xb9/0x180 [ 445.731887][ C1] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 445.737432][ C1] alloc_pages_current+0x672/0x990 [ 445.742539][ C1] alloc_slab_page+0x122/0x1300 [ 445.747387][ C1] new_slab+0x2bc/0x1130 [ 445.751631][ C1] ___slab_alloc+0x14a3/0x2040 [ 445.756400][ C1] kmem_cache_alloc+0xb23/0xd70 [ 445.761341][ C1] inet_reqsk_alloc+0xac/0x830 [ 445.766106][ C1] tcp_conn_request+0x753/0x4d10 [ 445.771056][ C1] tcp_v4_conn_request+0x19b/0x240 [ 445.776167][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 445.781541][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 445.786137][ C1] tcp_v4_rcv+0x425c/0x5040 [ 445.790644][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 445.796107][ C1] ip_local_deliver+0x62a/0x7c0 [ 445.800956][ C1] ip_sublist_rcv+0x125d/0x1450 [ 445.805809][ C1] ip_list_rcv+0x904/0x970 [ 445.810235][ C1] __netif_receive_skb_list_core+0x1459/0x14d0 14:22:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x48) 14:22:33 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) utimes(&(0x7f0000000000)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 14:22:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000440)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x3f, 0x0, [{0x0, 0x0, 0x0, [], 0x4}, {0x1, 0x6, 0x74, [], 0xf7}, {0x5, 0x6f, 0x0, [], 0x4}, {0x29, 0x7, 0x0, [], 0x9}, {0x0, 0x81, 0x4}, {0x0, 0x92, 0x5}, {}, {}, {0x0, 0x0, 0x7f, [], 0x81}, {0x0, 0x0, 0x3}, {0x0, 0xfb}, {}, {0x40, 0x7}, {}, {0x0, 0x6b}, {}, {}, {0x0, 0x0, 0x0, [], 0x7}, {}, {}, {}, {0x0, 0x0, 0x5e}]}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe37]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:22:33 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab300884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b5399e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bca008388e736e518b98d91c22def1125d7b1e821039a95ad8d8c00b734bfbbe7985", 0xf9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:22:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab300884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d05", 0xaa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 445.816403][ C1] netif_receive_skb_list_internal+0xf66/0x1610 [ 445.822653][ C1] napi_complete_done+0x439/0xe10 [ 445.827684][ C1] virtqueue_napi_complete+0xb9/0x1f0 [ 445.833057][ C1] virtnet_poll+0x1468/0x19f0 [ 445.837738][ C1] net_rx_action+0x746/0x1aa0 [ 445.842512][ C1] __do_softirq+0x311/0x83d 14:22:34 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid', 0x3d, r1}}]}) 14:22:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f512, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001fc) getresuid(0x0, &(0x7f00000002c0), 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchmodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0) 14:22:34 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:22:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab300884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d05", 0xaa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:22:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:22:35 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x3, 0x1ad182) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000300)=[{&(0x7f0000000140)="d8", 0x1}], 0x1, 0x1809) sendfile(r0, r1, 0x0, 0x2000005) 14:22:35 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x11250c2, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208200) sendfile(r0, r1, 0x0, 0x8000fffffffe) 14:22:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 14:22:35 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}]}) 14:22:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x48) [ 447.772955][ T32] audit: type=1800 audit(1595427755.600:286): pid=14818 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16377 res=0 14:22:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) 14:22:36 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x4, 0x8, 0x3, 0x800000000000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000001540)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000c40)=""/210, 0xd2}], 0x1, &(0x7f00000028c0)=""/201, 0xc9}}, {{&(0x7f0000001600)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001700)}, 0x728b553b}, {{&(0x7f0000002a00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000380)=""/9, 0x9}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000000b00)=""/261, 0x105}], 0x3, &(0x7f00000017c0)=""/175, 0xaf}}, {{0x0, 0x0, &(0x7f00000054c0)=[{0x0}], 0x1, &(0x7f0000005500)=""/121, 0x79}}, {{&(0x7f0000000540)=@sco, 0x80, 0x0, 0x0, &(0x7f0000000940)=""/56, 0x38}}, {{&(0x7f0000001680)=@xdp, 0x80, &(0x7f00000008c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000980)=""/249, 0xf9}, 0xd9}], 0x6, 0x20, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0xfffffffffffffffe}, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0xfffffffffffffe, 0x2000) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x1fc}) 14:22:36 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}]}) 14:22:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab300884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b5399e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bca008388e736e518b98d91c22def1125d7b1e821039a95ad8d8c00b734bfbbe7985", 0xf9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:22:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000010000000000001b00000008009a0002"], 0x20}}, 0x0) [ 449.204844][T14831] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 449.241001][T14835] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 14:22:37 executing program 0: perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x440}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:22:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/252, 0xfc}], 0x1, 0x0) 14:22:37 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}]}) 14:22:37 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_UIE_OFF(r2, 0x7004) 14:22:38 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid'}}]}) 14:22:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000440)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x3f, 0x0, [{0x0, 0x0, 0x0, [], 0x4}, {0x1, 0x6, 0x74, [], 0xf7}, {0x5, 0x6f, 0x0, [], 0x4}, {0x29, 0x7, 0x0, [], 0x9}, {0x0, 0x81, 0x4}, {0x0, 0x92}, {0x0, 0x0, 0x0, [], 0xbf}, {}, {0x0, 0x0, 0x7f, [], 0x81}, {0x0, 0x0, 0x3, [], 0x9}, {0x0, 0xfb}, {}, {0x40, 0x7}, {}, {0x0, 0x6b}, {}, {}, {0x0, 0x0, 0x0, [], 0x7}, {}, {}, {}, {0x0, 0x0, 0x5e}]}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe37]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:22:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab300884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b5399e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bca008388e736e51", 0xdf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:22:38 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendfile(r2, r1, 0x0, 0x100000001) socket$inet(0x2, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0xb00000000065808, 0x0) preadv(r3, &(0x7f0000001300)=[{&(0x7f0000000200)=""/4096, 0x3ff800}], 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$batadv(0x0) 14:22:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f00000012c0)='vfat\x00', &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@numtail='nonumtail=0'}], [{@smackfsdef={'smackfsdef', 0x3d, '](--(f!\'@!!z\\!'}}]}) 14:22:38 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid'}}]}) [ 450.865424][ T32] audit: type=1804 audit(1595427758.700:287): pid=14875 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="memory.events" dev="sda1" ino=16377 res=1 [ 450.887162][ T32] audit: type=1800 audit(1595427758.700:288): pid=14875 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16377 res=0 [ 451.576439][ T32] audit: type=1804 audit(1595427759.410:289): pid=14878 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="memory.events" dev="sda1" ino=16377 res=1 [ 451.597727][ T32] audit: type=1800 audit(1595427759.410:290): pid=14878 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16377 res=0 [ 451.619294][ T32] audit: type=1804 audit(1595427759.410:291): pid=14873 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16379 res=1 [ 451.640999][ T32] audit: type=1804 audit(1595427759.410:292): pid=14875 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16379 res=1 [ 451.950960][ T32] audit: type=1804 audit(1595427759.760:293): pid=14877 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="cgroup.controllers" dev="sda1" ino=16379 res=1 14:22:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r4 = dup2(r2, r3) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xd10a) 14:22:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x102}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:22:40 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x10010000004e20}, 0x1c) syz_emit_ethernet(0x83, &(0x7f0000000480)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd601bfc97004d8880fe800001000000000600000000000600ff02000000000000000000000000000101004e20004590"], 0x0) 14:22:40 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@nls={'nls', 0x3d, 'macgreek'}}, {@uid={'uid'}}]}) 14:22:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab300884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b5399e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bca008388e736e51", 0xdf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:22:40 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f000000b180), 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000002b40)={0x0, 0x0, 0x0, 0xb, 0x0, &(0x7f0000002b00)="d364f98f0df4d997ad4bc6"}) preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 14:22:40 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@uid={'uid', 0x3d, r1}}]}) 14:22:40 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@uid={'uid', 0x3d, r1}}]}) 14:22:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup2(r2, r3) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0xd10a) 14:22:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f00000004c0)) 14:22:41 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)={[{@uid={'uid', 0x3d, r1}}]}) 14:22:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab300884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b5399e5f755563698c7e24ab61f0866f15da7f480800b100000000050000be5d2dd15b6210d53eed19bca008388e736e518b98d9", 0xe2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:22:41 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x48) 14:22:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file1\x00', 0x0) 14:22:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') preadv(r0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/252, 0xfc}], 0x1, 0x0) 14:22:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = eventfd(0x20) poll(&(0x7f0000000000)=[{r2}], 0x1, 0xa7) 14:22:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x13d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:22:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/250, 0xfa}], 0x1, 0x100002001) 14:22:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/251, 0xfb}, 0x801) 14:22:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) 14:22:43 executing program 4: semget(0x3, 0x1, 0x0) 14:22:43 executing program 0: socket$inet(0x2, 0x0, 0x0) sync() 14:22:43 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f00000003c0)=""/155, 0x9b}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x48) 14:22:44 executing program 1: getpgrp(0x0) 14:22:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) 14:22:44 executing program 4: r0 = socket(0x22, 0x3, 0x0) connect(r0, &(0x7f0000000040), 0xe) 14:22:44 executing program 5: socket$inet(0x2, 0x0, 0x1) 14:22:44 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) faccessat(r0, &(0x7f0000000180)='./file0\x00', 0x0) 14:22:46 executing program 3: r0 = socket(0x1f, 0x5, 0x0) fchown(r0, 0x0, 0x0) 14:22:46 executing program 0: mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/', 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00') 14:22:46 executing program 4: pipe2(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r0, 0x4, 0x40) 14:22:46 executing program 5: r0 = socket(0x1f, 0x5, 0x0) fcntl$setflags(r0, 0x2, 0x0) 14:22:46 executing program 1: r0 = socket(0x2, 0x10000000000003, 0x0) fcntl$getown(r0, 0x5) 14:22:46 executing program 2: sync() setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0x66, 0x0, 0x0) 14:22:46 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = dup(r0) ioctl$FIONREAD(r1, 0x4004667f, &(0x7f0000000080)) 14:22:46 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) lseek(r0, 0x0, 0x0) 14:22:46 executing program 5: mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x9a5a367c0e8d54f5, 0xffffffffffffffff, 0x0) r0 = socket(0x18, 0x3, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x0, &(0x7f0000000080), 0x10) 14:22:46 executing program 2: mkdir(0x0, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) mkdir(&(0x7f0000000040)='./file0/file1\x00', 0x0) 14:22:46 executing program 1: setgid(0x0) 14:22:47 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) getsockname$unix(r0, &(0x7f0000000080)=@abs, &(0x7f00000000c0)=0x8) 14:22:47 executing program 0: getpgid(0x0) 14:22:47 executing program 2: pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) read$char_raw(r0, &(0x7f0000000800)={""/32830}, 0x8200) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 14:22:47 executing program 1: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000000)={@local, @multicast, @void, {@ipv4={0x800, @gre={{0xf, 0x4, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x14, 0x1, 0x0, [{@empty}, {@remote}, {@multicast2}, {@dev}]}, @timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}}}}}}, 0x0) 14:22:47 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000003c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc1105518, 0x0) 14:22:47 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000100)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000000)=0x7f) 14:22:47 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') lchown(&(0x7f0000000040)='./file0\x00', 0xee00, 0x0) 14:22:47 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) 14:22:47 executing program 0: 14:22:47 executing program 3: 14:22:47 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x22440, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 14:22:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_cache\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x10001ff) 14:22:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 14:22:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={0x14, r1, 0xc91add0bf88807dd, 0x0, 0x0, {0x33}}, 0x14}}, 0x0) [ 460.463478][ T32] audit: type=1804 audit(1595427768.300:294): pid=15032 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir033755972/syzkaller.EQ3Gd7/156/bus" dev="sda1" ino=16381 res=1 [ 460.627798][ T32] audit: type=1804 audit(1595427768.370:295): pid=15032 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir033755972/syzkaller.EQ3Gd7/156/bus" dev="sda1" ino=16381 res=1 14:22:48 executing program 2: 14:22:48 executing program 3: 14:22:48 executing program 1: 14:22:48 executing program 5: 14:22:48 executing program 4: 14:22:48 executing program 0: 14:22:49 executing program 2: 14:22:49 executing program 1: 14:22:49 executing program 5: 14:22:49 executing program 3: 14:22:49 executing program 4: 14:22:49 executing program 0: 14:22:49 executing program 1: 14:22:49 executing program 2: 14:22:49 executing program 5: 14:22:49 executing program 3: 14:22:49 executing program 4: 14:22:49 executing program 0: 14:22:49 executing program 1: 14:22:50 executing program 5: 14:22:50 executing program 2: 14:22:50 executing program 4: 14:22:50 executing program 3: 14:22:50 executing program 0: 14:22:50 executing program 1: 14:22:50 executing program 5: 14:22:50 executing program 4: 14:22:50 executing program 2: 14:22:50 executing program 3: 14:22:50 executing program 0: 14:22:50 executing program 4: 14:22:50 executing program 5: 14:22:50 executing program 1: 14:22:51 executing program 2: 14:22:51 executing program 3: 14:22:51 executing program 4: 14:22:51 executing program 0: 14:22:51 executing program 1: 14:22:51 executing program 2: 14:22:51 executing program 5: 14:22:51 executing program 3: 14:22:51 executing program 0: 14:22:51 executing program 4: 14:22:51 executing program 1: 14:22:51 executing program 2: 14:22:51 executing program 5: 14:22:52 executing program 3: 14:22:52 executing program 2: 14:22:52 executing program 4: 14:22:52 executing program 1: 14:22:52 executing program 0: 14:22:52 executing program 5: 14:22:52 executing program 4: 14:22:52 executing program 3: 14:22:52 executing program 5: 14:22:52 executing program 2: 14:22:52 executing program 1: 14:22:52 executing program 0: 14:22:53 executing program 4: 14:22:53 executing program 3: 14:22:53 executing program 5: 14:22:53 executing program 1: 14:22:53 executing program 2: 14:22:53 executing program 0: 14:22:53 executing program 4: 14:22:53 executing program 3: 14:22:53 executing program 5: 14:22:53 executing program 1: 14:22:53 executing program 2: 14:22:54 executing program 0: 14:22:54 executing program 4: 14:22:54 executing program 3: 14:22:54 executing program 5: 14:22:54 executing program 1: 14:22:54 executing program 2: 14:22:54 executing program 0: 14:22:54 executing program 4: 14:22:54 executing program 5: 14:22:54 executing program 3: 14:22:54 executing program 1: 14:22:54 executing program 2: 14:22:54 executing program 0: 14:22:55 executing program 4: 14:22:55 executing program 5: 14:22:55 executing program 3: 14:22:55 executing program 1: [ 467.657079][ C0] not chained 20000 origins [ 467.661634][ C0] CPU: 0 PID: 1067 Comm: kworker/u4:18 Not tainted 5.8.0-rc5-syzkaller #0 [ 467.670137][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.680231][ C0] Workqueue: krdsd rds_connect_worker [ 467.685610][ C0] Call Trace: [ 467.688902][ C0] [ 467.691766][ C0] dump_stack+0x1df/0x240 [ 467.696124][ C0] kmsan_internal_chain_origin+0x6f/0x130 [ 467.701852][ C0] ? should_fail+0x72/0x9e0 [ 467.706374][ C0] ? ret_from_fork+0x22/0x30 [ 467.710980][ C0] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 467.717062][ C0] ? arch_stack_walk+0x34c/0x3e0 [ 467.722019][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 467.727255][ C0] ? __should_failslab+0x1f6/0x290 [ 467.732383][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 467.737508][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 467.743328][ C0] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 467.749934][ C0] ? tcp_parse_options+0x1ada/0x1b90 [ 467.755266][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 467.760481][ C0] __msan_chain_origin+0x50/0x90 [ 467.765438][ C0] tcp_conn_request+0x1781/0x4d10 [ 467.770513][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 467.775722][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 467.780931][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 467.786766][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 467.791991][ C0] tcp_v4_conn_request+0x19b/0x240 [ 467.797128][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 467.802167][ C0] ? inet6_sk_rx_dst_set+0x400/0x400 [ 467.807459][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 467.812865][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 467.818090][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 467.823916][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 467.830016][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 467.835258][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 467.839886][ C0] tcp_v4_rcv+0x425c/0x5040 [ 467.844414][ C0] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 467.850588][ C0] ? tcp_filter+0xf0/0xf0 [ 467.854936][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 467.860418][ C0] ip_local_deliver+0x62a/0x7c0 [ 467.865309][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 467.870342][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 467.875986][ C0] ip_rcv+0x6cf/0x750 [ 467.880252][ C0] ? ip_rcv_core+0x12c0/0x12c0 [ 467.885463][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 467.891131][ C0] process_backlog+0xfb5/0x14e0 [ 467.896129][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 467.901425][ C0] net_rx_action+0x746/0x1aa0 [ 467.906161][ C0] ? net_tx_action+0xc40/0xc40 [ 467.910931][ C0] __do_softirq+0x311/0x83d [ 467.915463][ C0] asm_call_on_stack+0x12/0x20 [ 467.920224][ C0] [ 467.923190][ C0] do_softirq_own_stack+0x7c/0xa0 [ 467.928239][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 467.933481][ C0] local_bh_enable+0x36/0x40 [ 467.938104][ C0] ip_finish_output2+0x1fee/0x24a0 [ 467.943233][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 467.949266][ C0] __ip_finish_output+0xaa7/0xd80 [ 467.954358][ C0] ip_finish_output+0x166/0x410 [ 467.959236][ C0] ip_output+0x593/0x680 [ 467.963540][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 467.968839][ C0] ? ip_finish_output+0x410/0x410 [ 467.973888][ C0] __ip_queue_xmit+0x1b5c/0x21a0 [ 467.978951][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 467.984523][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 467.989751][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 467.996367][ C0] ip_queue_xmit+0xcc/0xf0 [ 468.000803][ C0] ? tcp_v4_fill_cb+0x580/0x580 [ 468.005669][ C0] __tcp_transmit_skb+0x440e/0x6090 [ 468.010927][ C0] tcp_connect+0x4208/0x6830 [ 468.015532][ C0] ? __msan_poison_alloca+0xf0/0x120 [ 468.020867][ C0] tcp_v4_connect+0x21fd/0x2370 [ 468.025771][ C0] ? tcp_twsk_unique+0xba0/0xba0 [ 468.030720][ C0] __inet_stream_connect+0x2fb/0x1340 [ 468.036102][ C0] ? __local_bh_enable_ip+0x97/0x1d0 [ 468.041411][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 468.046644][ C0] inet_stream_connect+0x101/0x180 [ 468.051782][ C0] ? __inet_stream_connect+0x1340/0x1340 [ 468.057429][ C0] rds_tcp_conn_path_connect+0x8a7/0xb70 [ 468.063087][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 468.068296][ C0] ? rds_tcp_state_change+0x390/0x390 [ 468.073676][ C0] rds_connect_worker+0x2a6/0x470 [ 468.078714][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 468.084794][ C0] ? rds_addr_cmp+0x200/0x200 [ 468.089505][ C0] process_one_work+0x1540/0x1f30 [ 468.094574][ C0] worker_thread+0xed2/0x23f0 [ 468.099313][ C0] kthread+0x515/0x550 [ 468.103389][ C0] ? process_one_work+0x1f30/0x1f30 [ 468.108599][ C0] ? kthread_blkcg+0xf0/0xf0 [ 468.113197][ C0] ret_from_fork+0x22/0x30 [ 468.117627][ C0] Uninit was stored to memory at: [ 468.122689][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 468.128426][ C0] __msan_chain_origin+0x50/0x90 [ 468.133370][ C0] tcp_conn_request+0x1781/0x4d10 [ 468.138420][ C0] tcp_v4_conn_request+0x19b/0x240 [ 468.143540][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 468.148925][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 468.154303][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 468.158908][ C0] tcp_v4_rcv+0x425c/0x5040 [ 468.163414][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 468.169139][ C0] ip_local_deliver+0x62a/0x7c0 [ 468.173998][ C0] ip_rcv+0x6cf/0x750 [ 468.177985][ C0] process_backlog+0xfb5/0x14e0 [ 468.182852][ C0] net_rx_action+0x746/0x1aa0 [ 468.187539][ C0] __do_softirq+0x311/0x83d [ 468.192060][ C0] [ 468.194387][ C0] Uninit was stored to memory at: [ 468.199426][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 468.205168][ C0] __msan_chain_origin+0x50/0x90 [ 468.210502][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 468.215803][ C0] tcp_conn_request+0x33d7/0x4d10 [ 468.221275][ C0] tcp_v4_conn_request+0x19b/0x240 [ 468.226400][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 468.231434][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 468.236814][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 468.241408][ C0] tcp_v4_rcv+0x425c/0x5040 [ 468.245914][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 468.251374][ C0] ip_local_deliver+0x62a/0x7c0 [ 468.256226][ C0] ip_rcv+0x6cf/0x750 [ 468.260222][ C0] process_backlog+0xfb5/0x14e0 [ 468.265079][ C0] net_rx_action+0x746/0x1aa0 [ 468.269774][ C0] __do_softirq+0x311/0x83d [ 468.274266][ C0] [ 468.276591][ C0] Uninit was stored to memory at: [ 468.281623][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 468.287471][ C0] __msan_chain_origin+0x50/0x90 [ 468.292410][ C0] tcp_conn_request+0x1781/0x4d10 [ 468.297437][ C0] tcp_v4_conn_request+0x19b/0x240 [ 468.302552][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 468.307576][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 468.312957][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 468.317551][ C0] tcp_v4_rcv+0x425c/0x5040 [ 468.322063][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 468.327523][ C0] ip_local_deliver+0x62a/0x7c0 [ 468.332462][ C0] ip_rcv+0x6cf/0x750 [ 468.336463][ C0] process_backlog+0xfb5/0x14e0 [ 468.341316][ C0] net_rx_action+0x746/0x1aa0 [ 468.346009][ C0] __do_softirq+0x311/0x83d [ 468.350501][ C0] [ 468.352825][ C0] Uninit was stored to memory at: [ 468.357870][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 468.363641][ C0] __msan_chain_origin+0x50/0x90 [ 468.368590][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 468.373968][ C0] tcp_conn_request+0x33d7/0x4d10 [ 468.379000][ C0] tcp_v4_conn_request+0x19b/0x240 [ 468.384117][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 468.389145][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 468.394516][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 468.399107][ C0] tcp_v4_rcv+0x425c/0x5040 [ 468.403613][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 468.409071][ C0] ip_local_deliver+0x62a/0x7c0 [ 468.413931][ C0] ip_rcv+0x6cf/0x750 [ 468.417921][ C0] process_backlog+0xfb5/0x14e0 [ 468.422793][ C0] net_rx_action+0x746/0x1aa0 [ 468.427476][ C0] __do_softirq+0x311/0x83d [ 468.431983][ C0] [ 468.434331][ C0] Uninit was stored to memory at: [ 468.439364][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 468.445095][ C0] __msan_chain_origin+0x50/0x90 [ 468.450054][ C0] tcp_conn_request+0x1781/0x4d10 [ 468.455178][ C0] tcp_v4_conn_request+0x19b/0x240 [ 468.460323][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 468.465370][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 468.470771][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 468.475372][ C0] tcp_v4_rcv+0x425c/0x5040 [ 468.479912][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 468.485381][ C0] ip_local_deliver+0x62a/0x7c0 [ 468.490240][ C0] ip_rcv+0x6cf/0x750 [ 468.494232][ C0] process_backlog+0xfb5/0x14e0 [ 468.499090][ C0] net_rx_action+0x746/0x1aa0 [ 468.503771][ C0] __do_softirq+0x311/0x83d [ 468.509567][ C0] [ 468.511914][ C0] Uninit was stored to memory at: [ 468.516943][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 468.522680][ C0] __msan_chain_origin+0x50/0x90 [ 468.527645][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 468.532932][ C0] tcp_conn_request+0x33d7/0x4d10 [ 468.537971][ C0] tcp_v4_conn_request+0x19b/0x240 [ 468.543090][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 468.548122][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 468.553505][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 468.558101][ C0] tcp_v4_rcv+0x425c/0x5040 [ 468.562613][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 468.568073][ C0] ip_local_deliver+0x62a/0x7c0 [ 468.572923][ C0] ip_rcv+0x6cf/0x750 [ 468.576908][ C0] process_backlog+0xfb5/0x14e0 [ 468.581762][ C0] net_rx_action+0x746/0x1aa0 [ 468.590875][ C0] __do_softirq+0x311/0x83d [ 468.595378][ C0] [ 468.597697][ C0] Uninit was stored to memory at: [ 468.602814][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 468.608543][ C0] __msan_chain_origin+0x50/0x90 [ 468.613584][ C0] tcp_conn_request+0x1781/0x4d10 [ 468.618614][ C0] tcp_v4_conn_request+0x19b/0x240 [ 468.623733][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 468.628782][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 468.634152][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 468.638747][ C0] tcp_v4_rcv+0x425c/0x5040 [ 468.643265][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 468.648722][ C0] ip_local_deliver+0x62a/0x7c0 [ 468.653574][ C0] ip_rcv+0x6cf/0x750 [ 468.657563][ C0] process_backlog+0xfb5/0x14e0 [ 468.662414][ C0] net_rx_action+0x746/0x1aa0 [ 468.667091][ C0] __do_softirq+0x311/0x83d [ 468.674101][ C0] [ 468.676420][ C0] Uninit was created at: [ 468.680662][ C0] kmsan_save_stack_with_flags+0x3c/0x90 [ 468.686292][ C0] kmsan_alloc_page+0xb9/0x180 [ 468.691055][ C0] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 468.696598][ C0] alloc_pages_current+0x672/0x990 [ 468.701714][ C0] alloc_slab_page+0x122/0x1300 [ 468.706563][ C0] new_slab+0x2bc/0x1130 [ 468.710807][ C0] ___slab_alloc+0x14a3/0x2040 [ 468.715570][ C0] kmem_cache_alloc+0xb23/0xd70 [ 468.720419][ C0] inet_reqsk_alloc+0xac/0x830 [ 468.725196][ C0] tcp_conn_request+0x753/0x4d10 [ 468.730132][ C0] tcp_v4_conn_request+0x19b/0x240 [ 468.735244][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 468.740618][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 468.745211][ C0] tcp_v4_rcv+0x425c/0x5040 [ 468.749718][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 468.755181][ C0] ip_local_deliver+0x62a/0x7c0 [ 468.760121][ C0] ip_sublist_rcv+0x125d/0x1450 [ 468.764974][ C0] ip_list_rcv+0x904/0x970 [ 468.769408][ C0] __netif_receive_skb_list_core+0x1459/0x14d0 [ 468.775565][ C0] netif_receive_skb_list_internal+0xf66/0x1610 [ 468.781826][ C0] napi_complete_done+0x439/0xe10 [ 468.786870][ C0] virtqueue_napi_complete+0xb9/0x1f0 [ 468.792245][ C0] virtnet_poll+0x1468/0x19f0 [ 468.796936][ C0] net_rx_action+0x746/0x1aa0 [ 468.801615][ C0] __do_softirq+0x311/0x83d 14:22:57 executing program 5: 14:22:57 executing program 1: 14:22:57 executing program 4: 14:22:57 executing program 2: 14:22:57 executing program 3: 14:22:57 executing program 5: 14:22:57 executing program 1: 14:22:58 executing program 0: 14:22:58 executing program 4: 14:22:58 executing program 2: 14:22:58 executing program 3: 14:22:58 executing program 5: 14:22:58 executing program 1: 14:22:58 executing program 3: 14:22:58 executing program 4: 14:22:58 executing program 5: 14:22:58 executing program 0: 14:22:58 executing program 2: 14:22:58 executing program 1: 14:22:58 executing program 3: 14:22:58 executing program 5: 14:22:58 executing program 4: 14:22:58 executing program 1: 14:22:58 executing program 0: 14:22:58 executing program 2: 14:22:59 executing program 5: 14:22:59 executing program 1: 14:22:59 executing program 4: 14:22:59 executing program 3: 14:22:59 executing program 2: 14:22:59 executing program 0: 14:22:59 executing program 4: 14:22:59 executing program 5: 14:22:59 executing program 1: 14:22:59 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x0, 0x3938700}, 0x0, 0x0) 14:22:59 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000100)={0x80, 0x1}) 14:22:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6a00, 0x0, 0x0, 0x0, 0x1f, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f", 0x4c}], 0x1}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:23:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) fchown(0xffffffffffffffff, 0x0, 0x0) 14:23:00 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0xffff, 0x0) 14:23:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) get_thread_area(0x0) 14:23:00 executing program 0: pipe(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x6, 0x0, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f0000000300)) timer_settime(0x0, 0x1, &(0x7f0000000340), 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) getpid() sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x81, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 14:23:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) write$vhci(0xffffffffffffffff, 0x0, 0x0) [ 472.628449][T15169] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 472.638335][T15169] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 14:23:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) 14:23:01 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) uname(&(0x7f0000000080)=""/80) 14:23:01 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000140)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)="17db1e1e91afd69e584ad8c16e8ad9eb95c6331373976a4834f92d2cf959716f1a6f93fefe9501e514316aa4d9dadd6659499406877fe302f99d81dbf721c3e976a7b2fc9a2a24abc1288555d3849ae5d387bbf60f3a77210c6a0438ef91e1fd749e8cc5150ac560411c29739f293fb4d8d8e49e42df6f22255093d43297ca3743ca062f67f5e05ccf290af4fec52ac464b8a548bcb73084d556f54f1512c7d22d922f3427958d55464a8c21e87a6295b7cc9f4aeec237156ed46dce958b21e5959c0b3148bd41fb6403d1694e52c467f20133a589e3083a84b4dc18fabc226970d17f60cb6cbfc7c06face875af47662602378e29dd0bdc740d79b792e101c02c3d52d3e3d074e4842afc7a21cdd0d0826c70378e350036e1865a311427d84c814a89c23af4d72a86f174f570279899d43f87640addaada533181375a96b43da54de225f7680708eb58216ce862331914e3353f2e81a7c08542ca67b643193ead3ba93e997113946430c58ff7459b6af7a3045380579d6e651b283e7584a46e750614d700785fb920279898141b376aa091650d1e506dd5d3e31a7485701bccec232ce3cc5ef2cdc1b1c99d0c3345d2a1742d7f651d0f8039f2ec8577e8ebbdae7bc52863825c80f5733df17e08cd7ce1eff7ac38a1d9251f44a8bac98cd5d5a47a0e4e3b29c1fed02288c06f038bc9a33ebc231853a8502292305a16b3c629c5ee616a72d4e4750c72a5590db70c7794ba9ab6c5bc03519cb8c483e932f7b37c29b17baf5127cdbd5cdb2a07e691d3afadfeea4b15fb240f6a357d3d8ac5cbda42f9e49ee27c7ad132fefcdab7d014e7861ebb314da2dc73c97413fb2ceb4bf43202c6ee0520ff0b5d0438f1902faf04e04e1dd503ba478d915dbee869b5b6d98ba203e9823cb1a0cfc0011952eafeb70a0d9c57e37b5856a10290bad704ae11538d003843fb2ffd5938eef82056ef53a8193b1e447ffe38c6eab82eed31b9702e3a428a2a7d519d62658bafb69cc495931a0707d3a582d08848708948401047e81e5ea118fda94e2a39a77ff351398d49c2ca056bae9654c5719ed336d6b95cd272e4b8a5a9ef9bafb318d578487df665384f2ca9ea534a79413be52e9da114a0ebe27406b767556d2213d6ad9aeab5b0cf3a5eb88cab819a75d6e6295002a52f0dc9570bddbc94bc53ab2c84f0eccd11d023c2a9bef0874bea90dddc78fd513959028ba6322706704395e0cbfd6db7656a91fbef3c0186668f185fcadcb0f98ea38911ac2e40390287cde680038af560efade1945d8fe321071b97cd8f904c9a2f04055fec66b1780deaf3edf118924792bb82e0048071c8c0ef31125e042bfde6b2ac31d8e32ffe55e2feca57285d7581ba9a2799e26dc5a1da0f542511cbaa6b1a7f668dc5a969215c8bc1b3e0a1adf63cae0feed08d699ebf189bbf3e"}) 14:23:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000100)={0x80, 0x1}) 14:23:01 executing program 2: 14:23:01 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6c) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r2, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 14:23:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) getrlimit(0x0, &(0x7f0000000000)) 14:23:01 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 14:23:01 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 14:23:01 executing program 1: socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1d}}], 0x1, 0x4, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r3, 0x0) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200800000}, 0x0, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') 14:23:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6c) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) fchown(r0, 0x0, 0x0) 14:23:01 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:23:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) getrlimit(0x0, &(0x7f0000000000)) 14:23:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 14:23:02 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f48", 0x4d}], 0x1}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 14:23:02 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) 14:23:02 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x0, 0x0, "cd87b39a843f0ade5f741f5d087b521c32d368"}) [ 474.650389][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 474.699823][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 474.723412][T15224] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 474.733204][T15224] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. 14:23:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000600)={0x7, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001680), 0x1, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x92, 0x0, 0x0, 0x0, 0x79f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x1000100) lseek(r4, 0x0, 0x3) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') pipe(&(0x7f00000004c0)) r5 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r5, 0x0) 14:23:02 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) io_setup(0x45, &(0x7f00000001c0)) [ 474.921413][T15231] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. [ 474.931241][T15231] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. 14:23:02 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6a00, 0x0, 0x0, 0x0, 0x1f, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="4c0000001200ef09fffefd956fa283b7270fd917df226c24a6008000200000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f48", 0x4d}], 0x1}, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:23:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000001100)='/dev/nvram\x00', 0x0, 0x0) 14:23:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6c) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200047fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[], 0x1000001bd) 14:23:03 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x1, 0x7fff7ffe}]}) msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="bb7a02d2f16cfb4dd14bf093b937a28ccf1fc39147a1b3806631606fc023c6bbbd836981e0d25e3f65470cebdfca2261181b51584855c633a7e30aaa72bf867147e41888e84811bafb971d96e57ce533238694814242f46cbce189bf936732"], 0x85, 0x0) [ 475.383513][T15241] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 475.394562][T15241] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 475.477582][T15247] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 475.487789][T15247] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 14:23:03 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='pstore\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6c) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @multicast1}, 0x7, 0x4, 0x4, 0x3}}, 0x80) setsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f0000000080)={@multicast1, @broadcast, @private=0xa010101}, 0xc) socket$inet6(0xa, 0x3, 0x6c) sendmsg$key(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x4, 0x0, &(0x7f00008feff0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020d0000100000002f3144e80000000003000600072000009f8f78262feb4f68ec1482540b02005600e0000001000000f500000000080012000200010000f3ffffffffffff2f006c000101009f83ae02000000adb20200000000152c008000000000000001020014bb0000012671f27cc3040000000000000000030005000020000002"], 0x80}}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x3}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200047fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[], 0x1000001bd) 14:23:03 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000100)={0x80, 0x0, 0x0, 0x9}) 14:23:03 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) getitimer(0x0, &(0x7f0000000000)) 14:23:03 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 14:23:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) ioperm(0x0, 0x20, 0x0) 14:23:03 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200047fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[], 0x1000001bd) 14:23:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) ioprio_get$uid(0x3, 0x0) 14:23:04 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) creat(&(0x7f00000001c0)='./bus\x00', 0x0) io_setup(0xd, &(0x7f0000000100)=0x0) io_submit(r0, 0x0, 0x0) 14:23:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff8000}]}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:04 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff8000}]}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:04 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000100)={0x80}) 14:23:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, 0x0, 0x0, 0x0) 14:23:04 executing program 5: socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r1, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) sendfile(r1, r1, &(0x7f0000000200), 0xff8) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200800000}, 0x0, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='Z\x00') 14:23:04 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff8000}]}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:05 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6c) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 14:23:05 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:05 executing program 5: r0 = getpid() waitid(0x1, r0, 0x0, 0x8, 0x0) 14:23:05 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) listen(0xffffffffffffffff, 0x0) 14:23:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff8000}]}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:05 executing program 2: fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) ptrace$getsig(0x4202, 0x0, 0x0, 0x0) 14:23:05 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000400)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "02"}}, 0x119) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)='\b\x00\x00\x00', 0x4}, {&(0x7f00000007c0)="13", 0x1}], 0x2) 14:23:06 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) setuid(0x0) ioprio_get$uid(0x3, 0x0) 14:23:06 executing program 1: getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:06 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000200000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000dfffffffffffffff00000000000000000000000000bd000000000000000000"], 0x1d5) writev(r0, &(0x7f0000000780)=[{&(0x7f00000003c0)='\b\x00\x00\x00', 0x4}, {&(0x7f00000006c0), 0x1000000}], 0x2) 14:23:06 executing program 2: fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:06 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getitimer(0x0, &(0x7f00000001c0)) 14:23:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) recvmsg(0xffffffffffffffff, 0x0, 0x0) 14:23:06 executing program 1: getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:06 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000100)={0x80, 0x0, 0x0, 0x3ff}) dup(0xffffffffffffffff) 14:23:06 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f0000000000)) 14:23:06 executing program 2: fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:07 executing program 1: getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:07 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x42080, 0x0) 14:23:07 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chdir(&(0x7f00000002c0)='./file0/file0\x00') rmdir(&(0x7f0000000000)='./file0\x00') 14:23:07 executing program 0: socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x91}, 0x0) r0 = getpid() socket$inet6(0xa, 0x3, 0x8) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r1, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ed2", 0x40) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) sendfile(r1, r1, &(0x7f0000000200), 0xff8) r2 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200800000}, 0x0, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='Z\x00') 14:23:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) r0 = socket$inet6(0xa, 0x3, 0x6c) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @empty}, 0x1c) 14:23:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) link(0x0, 0x0) 14:23:07 executing program 5: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) mq_notify(r0, &(0x7f0000000380)) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = mq_open(&(0x7f00000000c0)='eth0\x00\x192K\x19\x1c=RH\t\x06o', 0x0, 0x0, 0x0) mq_notify(r4, 0x0) 14:23:07 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:07 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x138, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "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"}]}}]}, 0x138}}, 0x0) 14:23:07 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) dup3(r1, r2, 0x0) 14:23:08 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000012c0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000410ffffa6fffff7", @ANYRES32=r2, @ANYBLOB="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"], 0x8d0}}, 0x0) 14:23:08 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:08 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) 14:23:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:08 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/seq\x00', 0x0) r1 = shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmdt(r1) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000100)) [ 480.687688][T15378] netlink: 1164 bytes leftover after parsing attributes in process `syz-executor.0'. 14:23:08 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) 14:23:08 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:08 executing program 0: r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000040)="250000003a00d17da53a6d52fef7001d0a0b49ffede7ff0804000000000000001112a4a83e", 0x25) recvmmsg(r0, &(0x7f00000064c0)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f00000001c0)=""/4085, 0xff5}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x3ffffffffffffdf, 0x0, 0x0) 14:23:09 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_open(&(0x7f00000000c0)='eth0\x00\x192K\x19\x1c=RH\t\x06o', 0x0, 0x0, 0x0) 14:23:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:09 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x44, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x4}}]}}]}, 0x44}}, 0x0) 14:23:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:09 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000340)=ANY=[], 0x1f) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x2, 0x803, 0xff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000009c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x390, 0x130, 0x260, 0x130, 0x98, 0x0, 0x2f8, 0x2f8, 0x2f8, 0x2f8, 0x2f8, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2e}}}, {{@ip={@multicast2, @local, 0x0, 0x0, '\x00', 'erspan0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r4 = dup(r1) r5 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 14:23:09 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xa66, &(0x7f0000000a80)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "03ce02", 0xa30, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @local, @loopback, [{0x0, 0x1c, "4af5ed2889818240dc00f9586dec836b24d9e09ba7e0fb6e4c019b4732fd79632c80bb666d8f5a808608b246fc603f877c685a675cb034a0ddb7eb3c38c032cd3ffb476625604425fcf538f900fe1e8620324a7bca06bff4240845a2a973ce2730239a4500fad8463ea3d15488ee45084422fdf2866cb0b6558965b498dad3dd1a5432899f0fabb29cba922f36f764b00cd3f01e326df76472497507404bfcbedc42a2ca950d30761a714b7aae774a9be298555b1515212289cf6ac35e7ea841c678a08c2734ef8978954ce5834d50ebc2a996fe612ecce8e3f13004a125a762ec04cafda5"}, {0x0, 0xc, "fec66e9673c146e28aadb1944f860641e8d1066a616aa6ea66d4e5a32a217c9e5b38d9a18e306363928312d03e4f56052d089037ab233aaf7985a5de3e1facc57a2cb994808c029227bd864b9be08c87b6af8095282184684c0ff2e40a8a"}, {0x0, 0x15, "4b4ccace0e2cd3e600b445f3d7d11a992e1cc9e9b220204daf71bfd2e65f462acc3248c27c20bfbc2a3786e9115397d5d81b16c23c236454b22b3543ee787e0251976e87856d133c39f2273ada1a5b2cc8bdd362e5fe928dc28352c4af70fb0113af334cd62eb2cd6ef02ca0e2b3e9ee4d4fe282d3b43e40211446c00866b139735ac95a41ef8a7a3835cc79a07484341b33f849c6b96c4db62f2c0e12cc438b5c29144c48371df6d55e"}, {0x0, 0x18, "c21fbfd4293c4c2362ea4b3038efb9eaa2ea539cfbf1927a6e247af06611cb36074337fb4c22f15998978255d62a2b2ea7667b07ebfd0737df7f6a8c4b961c3cf16160929035fa424ed50b84b7c6ac6a7d68bc3a7e753e7568713d51ae8a8e16f4303dcd3e083eef3a56ae9d61c45586bd08fd6591921b4dedae300b7b404232e9cde672931e5141757d1eec5804316917717baeab4b424cded5ade5b239382f2a213bd839e14dfa084e2debbe87b2cb2f73dfa41346a0cc4900"/195}, {0x0, 0x2, "12c28128d032a47e8cc46a551f41f9f132704dd5"}, {0x0, 0xe7, "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"}]}}}}}}, 0x0) 14:23:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:09 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:09 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, 0x0}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 481.852385][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 481.861665][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:09 executing program 3: inotify_init() [ 481.964502][ T32] audit: type=1804 audit(1595427789.800:296): pid=15415 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="bus" dev="sda1" ino=16361 res=1 14:23:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:10 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:10 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f0000000080)="7bc3d22c", 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r4, &(0x7f00000000c0)) bind(r3, &(0x7f0000000200)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="07830000"], 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 14:23:10 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000440)='./bus\x00', 0x4d00, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) truncate(0x0, 0x0) write$FUSE_STATFS(r0, &(0x7f00000001c0)={0x60}, 0x60) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) dup3(r1, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r6, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 14:23:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x5453, 0x0) [ 482.596533][ T32] audit: type=1804 audit(1595427790.430:297): pid=15439 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir033755972/syzkaller.EQ3Gd7/195/file0/bus" dev="sda1" ino=16344 res=1 [ 482.622314][ T32] audit: type=1800 audit(1595427790.430:298): pid=15439 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16344 res=0 14:23:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 482.643154][ T32] audit: type=1804 audit(1595427790.430:299): pid=15439 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir033755972/syzkaller.EQ3Gd7/195/file0/bus" dev="sda1" ino=16344 res=1 14:23:10 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) getdents(0xffffffffffffffff, 0x0, 0x0) [ 482.732377][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 482.742116][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 482.750916][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 482.759695][ T1067] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 482.772353][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:10 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 482.795101][ T1067] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 482.803967][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 482.830352][ T1067] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:10 executing program 4: r0 = inotify_init1(0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvram\x00', 0xc4000, 0x0) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, 0x0, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f0000000000)=[{&(0x7f0000000140)=""/53, 0x35}], 0x1, &(0x7f00000000c0)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) 14:23:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000004d90"], 0x0) 14:23:10 executing program 3: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1e8, 0x0, 0x0, 0x98, 0x0, 0x98, 0x180, 0x178, 0x178, 0x180, 0x178, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x248) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000040)='Z', 0x359}, {&(0x7f0000000080)='\b', 0x1}], 0x31d, 0x0) [ 483.081297][T15450] ptrace attach of "/root/syz-executor.4"[10829] was attempted by "/root/syz-executor.4"[15450] [ 483.141365][ T32] audit: type=1804 audit(1595427790.540:300): pid=15439 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir033755972/syzkaller.EQ3Gd7/195/file0/file0/bus" dev="sda1" ino=16348 res=1 [ 483.167793][ T32] audit: type=1800 audit(1595427790.540:301): pid=15439 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16348 res=0 [ 483.188607][ T32] audit: type=1804 audit(1595427790.540:302): pid=15441 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir033755972/syzkaller.EQ3Gd7/195/file0/file0/bus" dev="sda1" ino=16348 res=1 14:23:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000180)={0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{}]}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) [ 483.262843][T15450] ptrace attach of "/root/syz-executor.4"[10829] was attempted by "/root/syz-executor.4"[15450] 14:23:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:11 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c0000000706f1118316e7f375f4533705e8af012100010006"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x207fff, 0x0) 14:23:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000004d90"], 0x0) 14:23:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lseek(0xffffffffffffffff, 0x0, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r2, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) r3 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x1f}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') sendfile(r3, r4, 0x0, 0xa808) 14:23:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) getdents(0xffffffffffffffff, 0x0, 0x0) [ 484.278436][T15485] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 484.286903][T15485] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 484.297207][T15485] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 14:23:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff8000}]}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000004d90"], 0x0) 14:23:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff7ffe}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000004d90"], 0x0) 14:23:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff8000}]}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000200000e00000004000000d0030000300200000000000000030000000000003002000000030000000300000003000000030000000300000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e5ffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a80008010000000000000000000000000000000000000000000000006000484d41524b00000000000000000000000000000000000000000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000f900000000000000000000040000000000000000000000fe880000000000000000000000000001fe8800000000000000000000000000010000000000ebfd00000000000000000000000000000000000000000000000000726f73653000000000000000000000006e657464657673696d300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000128010000000000000000000000000000000000000000000000005800686173686c696d697400000000000000000000000000000000000100000176657468315f746f5f687372000000000c000000000000000900000000000000000000000400000001000000004c000000000000000000002800000000000000000000000000000000008706ad98357672e3ffff00000000fbffffff000000000000002500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d000000000000000000000000000000000000000000000000000280052454a45435400000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x52) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}]}]}, 0x3c}}, 0x0) 14:23:13 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(0xffffffffffffffff, r5) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000080)={0x90, 0x0, 0x1, {0x0, 0x0, 0x0, 0x0, 0x4, 0x1000, {0x2, 0x758e, 0x2, 0x3, 0x0, 0x9, 0x0, 0x8819, 0x3, 0x3, 0x9, 0x0, 0x0, 0x2, 0x80}}}, 0x90) ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x368, 0xffffffff, 0xa0, 0xa0, 0x200, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @empty, 0x0, 0x0, 'macvlan0\x00', 'netpci0\x00'}, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@ip={@local, @local, 0x0, 0x0, 'veth1_to_bridge\x00', 'geneve1\x00'}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@unspec=@conntrack3={{0xc8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv6=@mcast1, [], @ipv4=@private, [], @ipv6=@remote}}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ip={@dev, @multicast1, 0x0, 0xffffffff, 'veth0_virt_wifi\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) r6 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000004c0)=@security={'security\x00', 0xe, 0x4, 0x368, 0xffffffff, 0xa0, 0xa0, 0x200, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @empty, 0x0, 0x0, 'macvlan0\x00', 'netpci0\x00'}, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@ip={@local, @local, 0x0, 0x0, 'veth1_to_bridge\x00', 'geneve1\x00'}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@unspec=@conntrack3={{0xc8, 'conntrack\x00'}, {{@ipv4=@multicast1, [], @ipv6=@mcast1, [], @ipv4=@private, [], @ipv6=@remote}}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ip={@dev, @multicast1, 0x0, 0xffffffff, 'veth0_virt_wifi\x00', 'ip6gretap0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) 14:23:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000004d90"], 0x0) 14:23:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fff8000}]}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:13 executing program 3: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000200)=""/201) io_setup(0x42e, &(0x7f00000004c0)=0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) fallocate(r0, 0x0, 0x0, 0x3) 14:23:13 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x8001141042, 0x0) ftruncate(r0, 0x2007fff) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000100)=@filter={'filter\x00', 0xe, 0x4, 0x3b0, 0xd0, 0x2e0, 0x0, 0xd0, 0xd0, 0x2c0, 0x2e0, 0x2e0, 0x2e0, 0x2c0, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0xfffa}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @local, [], [], '\x00', '\x00', {}, {}, 0x0, 0x0, 0x5}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private0, 'wg1\x00'}}}, {{@ipv6={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'bridge_slave_1\x00', 'ipvlan0\x00', {}, {}, 0x11}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@inet=@multiport={{0x50, 'multiport\x00'}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x410) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='+'], 0x1) sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) r3 = socket$inet6(0xa, 0x3, 0x2c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000540), 0x20) sendfile(r3, r6, 0x0, 0x8482) 14:23:13 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000004d90"], 0x0) 14:23:13 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 486.432486][ T32] audit: type=1326 audit(1595427794.260:303): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15507 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7fab549 code=0x0 [ 486.589811][ T32] audit: type=1804 audit(1595427794.300:304): pid=15530 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=16364 res=1 14:23:14 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000004d90"], 0x0) 14:23:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 486.753826][ T32] audit: type=1326 audit(1595427794.450:305): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15524 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f38549 code=0x0 14:23:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 486.865327][T11562] net_ratelimit: 1512 callbacks suppressed [ 486.865352][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 486.882175][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 486.961727][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 486.970655][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 487.019108][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 487.028143][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 487.037301][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 487.163369][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 487.165526][ T32] audit: type=1804 audit(1595427795.000:306): pid=15541 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="bus" dev="sda1" ino=16364 res=1 [ 487.172204][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 487.243065][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:15 executing program 5: syz_emit_ethernet(0x83, 0x0, 0x0) 14:23:15 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) getdents(0xffffffffffffffff, 0x0, 0x0) [ 487.370646][ T32] audit: type=1326 audit(1595427795.040:307): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15537 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7fab549 code=0x0 14:23:15 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000002ec0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@rthdrdstopts={{0x18}}], 0x18}}], 0x1, 0x0) 14:23:15 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)='./file0/file0\x00') rename(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 14:23:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 487.743179][ T32] audit: type=1326 audit(1595427795.570:308): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15547 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f38549 code=0x0 14:23:15 executing program 5: syz_emit_ethernet(0x83, 0x0, 0x0) 14:23:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:15 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:23:16 executing program 5: syz_emit_ethernet(0x83, 0x0, 0x0) 14:23:16 executing program 4: lsetxattr(&(0x7f0000fc0000)='./file1\x00', &(0x7f0000000100)=@random={'user.', 'us\xa0\xd0\x99u\xde\xa3\xd1\x14]\x87\xe2U\xbd\xba\xe6B*\x81\x86Q)G\xda\v~\x1dD(3U$\xe1\x9f\x91\x92\xb9\xdeh\x8e\f\xe8\xc5\x15\x98\xba\x0fu\xa1\xb0$\xf6\xfe\xb4\xe8\xda\x95\xdb\x8ca\xbd\x87D\xd7\x1f%\xc7!\x83\xdcdzr7\xecF\x14\xc4[\x10-\x0f\xe73\x89\xf3oY\x9d\xb9\xd2\xcb\xf4\xb8\xfbd\xf0-\x02\x8al0\b\xce\xbc\xba\xd0\xf5\x146o\xba\x85\xc5\x9d\x02\xe1\x81\xb3o\x13z^\xd9UWF0ci\x86\xb6##\xf6\xea\xd5K\xcb61!U\x96\x05\xa3Y\x026\xe6<\x95\x0f\xab\xb2T\r\x97\xb4\xa1ZH\x9dTW\xe8\xfajk\x80I\xe8:\a\xd0\x1b\x0e\xdc\x05\xd1\x93\x17\xdb\xde\xf9\x9e\x93\rJ\x1f9\xea9x\xbe\x01%\x9e\r\xcd\xf0>\fW\xa1'}, &(0x7f0000fc0000)='//selinux\x00\x00\x01\x10', 0xd, 0x0) [ 488.394771][ T32] audit: type=1326 audit(1595427796.230:309): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15564 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7fab549 code=0x0 14:23:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) getdents(0xffffffffffffffff, 0x0, 0x0) 14:23:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:16 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[], 0x0) [ 488.932448][ T32] audit: type=1326 audit(1595427796.760:310): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=15571 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=40000003 syscall=265 compat=1 ip=0xf7f38549 code=0x0 14:23:16 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000002ec0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @local}, 0x6a, 0x0, 0x0, &(0x7f0000000080)=[@rthdrdstopts={{0x18}}], 0x18}}], 0x1, 0x0) 14:23:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:17 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)='./file0/file0\x00') rename(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 14:23:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x400000000000030, 0x0) 14:23:17 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[], 0x0) 14:23:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:17 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000280)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "001900", 0x14, 0x6, 0x0, @private0, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 14:23:17 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[], 0x0) 14:23:17 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, 0x0, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000300)) socket(0x10, 0x3, 0x0) 14:23:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/171, 0xab}], 0x1, 0xfffffffe) 14:23:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:18 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) 14:23:18 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$inet6(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='`\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x007'], 0x60}, 0x0) 14:23:18 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./bus\x00', 0x40600, 0x0) 14:23:18 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)='./file0/file0\x00') rename(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 14:23:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:18 executing program 1: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000fc0000)='./file1\x00', &(0x7f0000000040)=@random={'user.', 'user.\xfb\xde\xa3\xd1\x14]\x87\xe2U\xbd\xba\xe6B*\x81\x86Q)G\xda\v~\x1dD(3U$\xe1\x9f\x91\x92\xb9\xdeh\x8e\f\xe8\xc5\x15\x98\xba\x0fu\xa1\xb0$\xf6\xfe\xb4\xe8\x95\xdb\x11'}, &(0x7f0000fc0000)='//selinux\x00\x00\x01\x10', 0xd, 0x0) 14:23:18 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) 14:23:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000012c0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000410ffffa6fffff7", @ANYRES32=r4, @ANYBLOB="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"], 0x8d0}}, 0x0) 14:23:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x140042, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fallocate(r2, 0x0, 0x6cc4, 0x4000004) io_setup(0x1, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 14:23:19 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 491.140949][T15629] netlink: 1164 bytes leftover after parsing attributes in process `syz-executor.4'. 14:23:19 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) 14:23:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x4) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) dup3(r1, r2, 0x0) 14:23:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000000890"], 0x0) 14:23:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x2000c0c6, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) 14:23:19 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe8000000000000000"], 0x0) [ 491.880647][T13667] net_ratelimit: 1883 callbacks suppressed [ 491.880671][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 491.902200][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 491.964646][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 491.973394][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:19 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4ba0ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)='./file0/file0\x00') rename(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00') 14:23:19 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:19 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = dup(r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000040)=0x32, 0x4) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 14:23:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@bridge_getneigh={0x20, 0x1e, 0x209}, 0x20}}, 0x0) clock_gettime(0x0, &(0x7f0000006280)) recvmmsg(r0, &(0x7f00000061c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 492.017338][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 492.026458][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 492.035420][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 14:23:20 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe8000000000000000"], 0x0) [ 492.155325][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 492.172306][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 492.193842][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:20 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:20 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlockall() 14:23:20 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe8000000000000000"], 0x0) 14:23:20 executing program 0: r0 = socket(0x0, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:21 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fd/3\x00') r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x145042, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='./file0/file0\x00', 0x20000000) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) mknod$loop(&(0x7f0000000040)='./file0/file0/file0\x00', 0x1, 0x0) pwritev(r2, &(0x7f0000000200)=[{&(0x7f0000000140)="fb", 0x1}], 0x1, 0x81808) sendfile(r1, r2, 0x0, 0x200000f) 14:23:21 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe80000000000000"], 0x0) 14:23:21 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:22 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x4, 0x368, 0x1c0, 0xc0, 0xc0, 0xc0, 0x0, 0x288, 0x2d0, 0x2d0, 0x2d0, 0x288, 0x4, 0x0, {[{{@ip={@rand_addr, @empty, 0x0, 0x0, '\x00', 'syzkaller0\x00', {}, {}, 0x1}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "bd38"}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@multicast2, @broadcast, 0x0, 0x0, 'vxcan1\x00', 'veth0_to_hsr\x00'}, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, {{@uncond, 0x0, 0x130, 0x158, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x370f, 'bm\x00', "9426a6f8e655a1092027027303b21c30ede1cbe70859dbc2a7c4e466d4312684259b63bcab9c2b060070e3ba84ba9a61bfe1d16b6155833697c536713465aa01b96ef6a93cc4414e13418a2f088bf9c41186d6a1d52b438f1f2ae7f75ae2b086d69314bca15afae5d120a2198b2966aa9e1c9fdce048b18a386028dbb5063e87", 0xd}}]}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fd/3\x00') write$cgroup_type(r3, &(0x7f0000000000)='threaded\x00', 0x9) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 14:23:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x3087a00, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.cpus\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x80000000) 14:23:22 executing program 0: r0 = socket(0x0, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:22 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe80000000000000"], 0x0) 14:23:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:22 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@bridge_delneigh={0x28, 0x1c, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r1, 0x80, 0xffffff1e}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 14:23:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:22 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe80000000000000"], 0x0) 14:23:22 executing program 0: r0 = socket(0x0, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@bridge_getneigh={0x20, 0x1e, 0x209}, 0x20}}, 0x0) 14:23:22 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(0x0, 0x0, 0xffffffdf) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000003c0)='./file0\x00') 14:23:22 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa"], 0x0) 14:23:23 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="5f000002", @ANYRES16, @ANYBLOB="000827bd700afedbdf251000008a819117b7dd7762000300000040000180080008"], 0x3}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="7000000000011905030000000040000002000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 14:23:23 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0x151342, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010048) 14:23:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:23 executing program 0: r0 = socket(0x10, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:23 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa"], 0x0) 14:23:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:23 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa"], 0x0) 14:23:23 executing program 0: r0 = socket(0x10, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000012c0)=ANY=[@ANYBLOB="d00800002400ffffff7f00000410ffffa6fffff7", @ANYRES32=r2, @ANYBLOB="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"], 0x8d0}}, 0x0) [ 496.098565][T15737] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 14:23:24 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) tkill(r3, 0x18) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @dev}, 0x8) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$setopts(0x4200, 0x0, 0x0, 0x100028) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) [ 496.291712][T15744] netlink: 1164 bytes leftover after parsing attributes in process `syz-executor.2'. 14:23:24 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) [ 496.374396][T15746] netlink: 1164 bytes leftover after parsing attributes in process `syz-executor.2'. 14:23:24 executing program 0: r0 = socket(0x10, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:24 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) 14:23:24 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000"], 0x0) 14:23:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000380)={r0, r3}) close(r4) 14:23:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:24 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) tkill(r3, 0x18) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @dev}, 0x8) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$setopts(0x4200, 0x0, 0x0, 0x100028) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) 14:23:24 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) [ 496.883556][ T1067] net_ratelimit: 1900 callbacks suppressed [ 496.883581][ T1067] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 496.898475][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 496.907660][ T1067] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 496.993133][ T1067] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 497.002276][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 497.040742][ T1067] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 497.049605][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 497.113908][ T1067] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 497.122846][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 497.132343][ T1067] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:25 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000"], 0x0) 14:23:25 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) tkill(r3, 0x18) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @dev}, 0x8) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$setopts(0x4200, 0x0, 0x0, 0x100028) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) 14:23:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x10004) r2 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000340)="f65576290360854355927338c190bcb59725", 0x12, 0xfffffffffffffffe) keyctl$read(0xb, r2, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, r2) socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, 0x0, &(0x7f0000000000)=0xf) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) 14:23:25 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000"], 0x0) 14:23:25 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) tkill(r3, 0x18) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @dev}, 0x8) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$setopts(0x4200, 0x0, 0x0, 0x100028) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_procfs(0x0, 0x0) 14:23:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x10004) r2 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000340)="f65576290360854355927338c190bcb59725", 0x12, 0xfffffffffffffffe) keyctl$read(0xb, r2, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, r2) socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, 0x0, &(0x7f0000000000)=0xf) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) 14:23:26 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x94, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb, 0x1, 'taprio\x00'}, {0x64, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [], 0x0, [0x81]}}, @TCA_TAPRIO_ATTR_FLAGS={0x8}]}}]}, 0x94}}, 0x0) 14:23:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:26 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) tkill(r3, 0x18) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @dev}, 0x8) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$setopts(0x4200, 0x0, 0x0, 0x100028) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:23:26 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000004d"], 0x0) 14:23:26 executing program 1: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000186000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f00007a3000/0x2000)=nil) madvise(&(0x7f0000000000/0x600000)=nil, 0x60fe01, 0x14) ioctl$SOUND_MIXER_WRITE_RECSRC(0xffffffffffffffff, 0xc0044dff, 0x0) io_setup(0x9, &(0x7f0000000180)) 14:23:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:26 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x44, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0xd, 0x0, 0x4}}]}}]}, 0x44}}, 0x0) 14:23:26 executing program 1: 14:23:27 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000004d"], 0x0) 14:23:27 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) tkill(r3, 0x18) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @dev}, 0x8) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$setopts(0x4200, 0x0, 0x0, 0x100028) dup(0xffffffffffffffff) 14:23:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:27 executing program 1: 14:23:27 executing program 5: syz_emit_ethernet(0x83, &(0x7f00000000c0)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000086dd6042e631004d8800fe800000000000000000000000000000fe8000000000000000000000000000aa00000000004d"], 0x0) 14:23:27 executing program 2: 14:23:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:27 executing program 4: r0 = socket(0x10, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:27 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) tkill(r3, 0x18) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @dev}, 0x8) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$setopts(0x4200, 0x0, 0x0, 0x100028) 14:23:28 executing program 1: 14:23:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)={0x28, r3, 0x21, 0x0, 0x0, {}, [@NL80211_ATTR_IE_PROBE_RESP={0x12, 0x7f, "6d0c93f13ffc94fcd05318038bd0"}]}, 0x28}}, 0x0) 14:23:28 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0xfffffffe, 0x4) sendto$inet6(r0, &(0x7f0000847fff)="05", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:23:28 executing program 1: 14:23:28 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) tkill(r3, 0x18) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @dev}, 0x8) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 14:23:28 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:28 executing program 2: 14:23:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0xfffffffe, 0x4) sendto$inet6(r0, &(0x7f0000847fff)="05", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:23:29 executing program 1: 14:23:29 executing program 2: 14:23:29 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) tkill(r3, 0x18) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @dev}, 0x8) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f0000000080)) 14:23:29 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:29 executing program 1: [ 501.894259][T11562] net_ratelimit: 1630 callbacks suppressed [ 501.894377][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 501.912245][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0xfffffffe, 0x4) sendto$inet6(r0, &(0x7f0000847fff)="05", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 502.000300][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 502.009193][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:29 executing program 2: [ 502.085970][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 502.095026][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 502.103984][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:30 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) tkill(r3, 0x18) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000200)={@broadcast, @dev}, 0x8) 14:23:30 executing program 4: r0 = socket(0x0, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) [ 502.202499][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 502.211499][T11562] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 502.220344][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:30 executing program 1: 14:23:30 executing program 2: 14:23:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0xfffffffe, 0x4) sendto$inet6(r0, &(0x7f0000847fff)="05", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 14:23:30 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) tkill(r3, 0x18) 14:23:30 executing program 2: 14:23:30 executing program 1: 14:23:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:30 executing program 4: r0 = socket(0x0, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:31 executing program 5: 14:23:31 executing program 2: 14:23:31 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) r3 = gettid() ptrace$setopts(0x4200, r3, 0x0, 0x0) 14:23:31 executing program 1: 14:23:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:31 executing program 4: r0 = socket(0x0, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:31 executing program 5: 14:23:31 executing program 2: 14:23:31 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) gettid() 14:23:31 executing program 1: 14:23:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:32 executing program 4: r0 = socket(0x10, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:32 executing program 5: 14:23:32 executing program 2: 14:23:32 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f000006e000/0x4000)=nil, 0x4000, 0xb, 0x100010, r2, 0x0) 14:23:32 executing program 1: 14:23:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:32 executing program 4: r0 = socket(0x10, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:32 executing program 2: 14:23:32 executing program 5: 14:23:33 executing program 1: 14:23:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:33 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) 14:23:33 executing program 4: r0 = socket(0x10, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:33 executing program 5: [ 505.446745][ C0] not chained 30000 origins [ 505.451298][ C0] CPU: 0 PID: 13667 Comm: kworker/u4:1 Not tainted 5.8.0-rc5-syzkaller #0 [ 505.459797][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 505.469874][ C0] Workqueue: krdsd rds_connect_worker [ 505.475263][ C0] Call Trace: [ 505.478544][ C0] [ 505.481418][ C0] dump_stack+0x1df/0x240 [ 505.485768][ C0] kmsan_internal_chain_origin+0x6f/0x130 [ 505.491493][ C0] ? should_fail+0x72/0x9e0 [ 505.496000][ C0] ? ret_from_fork+0x22/0x30 [ 505.500595][ C0] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 505.506668][ C0] ? arch_stack_walk+0x34c/0x3e0 [ 505.511612][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.516829][ C0] ? __should_failslab+0x1f6/0x290 [ 505.521948][ C0] ? kmsan_get_metadata+0x4f/0x180 [ 505.527067][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 505.532887][ C0] ? __msan_metadata_ptr_for_store_2+0x13/0x20 [ 505.539041][ C0] ? tcp_parse_options+0x1ada/0x1b90 [ 505.544361][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.549564][ C0] __msan_chain_origin+0x50/0x90 [ 505.554513][ C0] tcp_conn_request+0x13ce/0x4d10 [ 505.559564][ C0] ? ret_from_fork+0x22/0x30 [ 505.564170][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.569390][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.574612][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.579813][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 505.585808][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.591025][ C0] tcp_v4_conn_request+0x19b/0x240 [ 505.596239][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 505.601269][ C0] ? inet6_sk_rx_dst_set+0x400/0x400 [ 505.606564][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 505.611945][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.617150][ C0] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 505.622970][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 505.630009][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.635220][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 505.639834][ C0] tcp_v4_rcv+0x425c/0x5040 [ 505.644341][ C0] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 505.650465][ C0] ? tcp_filter+0xf0/0xf0 [ 505.654798][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 505.660274][ C0] ip_local_deliver+0x62a/0x7c0 [ 505.665147][ C0] ? ip_local_deliver+0x7c0/0x7c0 [ 505.670173][ C0] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 505.675810][ C0] ip_rcv+0x6cf/0x750 [ 505.679812][ C0] ? ip_rcv_core+0x12c0/0x12c0 [ 505.684591][ C0] ? ip_local_deliver_finish+0x350/0x350 [ 505.690235][ C0] process_backlog+0xfb5/0x14e0 [ 505.695125][ C0] ? rps_trigger_softirq+0x2e0/0x2e0 [ 505.700412][ C0] net_rx_action+0x746/0x1aa0 [ 505.705118][ C0] ? net_tx_action+0xc40/0xc40 [ 505.709889][ C0] __do_softirq+0x311/0x83d [ 505.714415][ C0] asm_call_on_stack+0x12/0x20 [ 505.719190][ C0] [ 505.722138][ C0] do_softirq_own_stack+0x7c/0xa0 [ 505.727170][ C0] __local_bh_enable_ip+0x184/0x1d0 [ 505.733273][ C0] local_bh_enable+0x36/0x40 [ 505.737872][ C0] ip_finish_output2+0x1fee/0x24a0 [ 505.743001][ C0] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 505.749043][ C0] __ip_finish_output+0xaa7/0xd80 [ 505.754104][ C0] ip_finish_output+0x166/0x410 [ 505.759005][ C0] ip_output+0x593/0x680 [ 505.763272][ C0] ? ip_mc_finish_output+0x6c0/0x6c0 [ 505.768567][ C0] ? ip_finish_output+0x410/0x410 [ 505.773689][ C0] __ip_queue_xmit+0x1b5c/0x21a0 [ 505.778645][ C0] ? kmsan_set_origin_checked+0x95/0xf0 [ 505.784200][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.789420][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.794637][ C0] ip_queue_xmit+0xcc/0xf0 [ 505.799089][ C0] ? tcp_v4_fill_cb+0x580/0x580 [ 505.803945][ C0] __tcp_transmit_skb+0x440e/0x6090 [ 505.809194][ C0] tcp_connect+0x4208/0x6830 [ 505.813796][ C0] ? __msan_poison_alloca+0xf0/0x120 [ 505.819136][ C0] tcp_v4_connect+0x21fd/0x2370 [ 505.824033][ C0] ? tcp_twsk_unique+0xba0/0xba0 [ 505.828996][ C0] __inet_stream_connect+0x2fb/0x1340 [ 505.834376][ C0] ? __local_bh_enable_ip+0x97/0x1d0 [ 505.839705][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.844932][ C0] inet_stream_connect+0x101/0x180 [ 505.850065][ C0] ? __inet_stream_connect+0x1340/0x1340 [ 505.855805][ C0] rds_tcp_conn_path_connect+0x8a7/0xb70 [ 505.861460][ C0] ? kmsan_get_metadata+0x11d/0x180 [ 505.866679][ C0] ? rds_tcp_state_change+0x390/0x390 [ 505.872062][ C0] rds_connect_worker+0x2a6/0x470 [ 505.877098][ C0] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 505.883182][ C0] ? rds_addr_cmp+0x200/0x200 [ 505.887889][ C0] process_one_work+0x1540/0x1f30 [ 505.892954][ C0] worker_thread+0xed2/0x23f0 [ 505.897692][ C0] kthread+0x515/0x550 [ 505.902117][ C0] ? process_one_work+0x1f30/0x1f30 [ 505.907327][ C0] ? kthread_blkcg+0xf0/0xf0 [ 505.911927][ C0] ret_from_fork+0x22/0x30 [ 505.916379][ C0] Uninit was stored to memory at: [ 505.921417][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 505.927138][ C0] __msan_chain_origin+0x50/0x90 [ 505.932083][ C0] tcp_conn_request+0x1781/0x4d10 [ 505.937110][ C0] tcp_v4_conn_request+0x19b/0x240 [ 505.942225][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 505.947255][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 505.953149][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 505.957743][ C0] tcp_v4_rcv+0x425c/0x5040 [ 505.962259][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 505.967740][ C0] ip_local_deliver+0x62a/0x7c0 [ 505.972593][ C0] ip_rcv+0x6cf/0x750 [ 505.976582][ C0] process_backlog+0xfb5/0x14e0 [ 505.981548][ C0] net_rx_action+0x746/0x1aa0 [ 505.986234][ C0] __do_softirq+0x311/0x83d [ 505.990725][ C0] [ 505.993047][ C0] Uninit was stored to memory at: [ 505.998082][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 506.003802][ C0] __msan_chain_origin+0x50/0x90 [ 506.008741][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 506.014027][ C0] tcp_conn_request+0x33d7/0x4d10 [ 506.019053][ C0] tcp_v4_conn_request+0x19b/0x240 [ 506.025231][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 506.030252][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 506.035622][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 506.040213][ C0] tcp_v4_rcv+0x425c/0x5040 [ 506.044713][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 506.050168][ C0] ip_local_deliver+0x62a/0x7c0 [ 506.055019][ C0] ip_rcv+0x6cf/0x750 [ 506.058997][ C0] process_backlog+0xfb5/0x14e0 [ 506.063849][ C0] net_rx_action+0x746/0x1aa0 [ 506.068527][ C0] __do_softirq+0x311/0x83d [ 506.073038][ C0] [ 506.075361][ C0] Uninit was stored to memory at: [ 506.080388][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 506.086108][ C0] __msan_chain_origin+0x50/0x90 [ 506.091047][ C0] tcp_conn_request+0x1781/0x4d10 [ 506.096071][ C0] tcp_v4_conn_request+0x19b/0x240 [ 506.101182][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 506.106206][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 506.111578][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 506.116172][ C0] tcp_v4_rcv+0x425c/0x5040 [ 506.120678][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 506.126146][ C0] ip_local_deliver+0x62a/0x7c0 [ 506.130996][ C0] ip_rcv+0x6cf/0x750 [ 506.134986][ C0] process_backlog+0xfb5/0x14e0 [ 506.139838][ C0] net_rx_action+0x746/0x1aa0 [ 506.144522][ C0] __do_softirq+0x311/0x83d [ 506.149013][ C0] [ 506.151336][ C0] Uninit was stored to memory at: [ 506.156375][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 506.162788][ C0] __msan_chain_origin+0x50/0x90 [ 506.167740][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 506.173028][ C0] tcp_conn_request+0x33d7/0x4d10 [ 506.178054][ C0] tcp_v4_conn_request+0x19b/0x240 [ 506.183165][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 506.188185][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 506.193573][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 506.198164][ C0] tcp_v4_rcv+0x425c/0x5040 [ 506.202665][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 506.208130][ C0] ip_local_deliver+0x62a/0x7c0 [ 506.212979][ C0] ip_rcv+0x6cf/0x750 [ 506.216985][ C0] process_backlog+0xfb5/0x14e0 [ 506.221836][ C0] net_rx_action+0x746/0x1aa0 [ 506.226519][ C0] __do_softirq+0x311/0x83d [ 506.231016][ C0] [ 506.233347][ C0] Uninit was stored to memory at: [ 506.238427][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 506.244149][ C0] __msan_chain_origin+0x50/0x90 [ 506.249088][ C0] tcp_conn_request+0x1781/0x4d10 [ 506.254139][ C0] tcp_v4_conn_request+0x19b/0x240 [ 506.259253][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 506.264283][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 506.269654][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 506.274242][ C0] tcp_v4_rcv+0x425c/0x5040 [ 506.278746][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 506.284202][ C0] ip_local_deliver+0x62a/0x7c0 [ 506.289051][ C0] ip_rcv+0x6cf/0x750 [ 506.293036][ C0] process_backlog+0xfb5/0x14e0 [ 506.297883][ C0] net_rx_action+0x746/0x1aa0 [ 506.302561][ C0] __do_softirq+0x311/0x83d [ 506.307050][ C0] [ 506.309372][ C0] Uninit was stored to memory at: [ 506.314400][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 506.320118][ C0] __msan_chain_origin+0x50/0x90 [ 506.325063][ C0] tcp_openreq_init_rwin+0xc21/0xc80 [ 506.330613][ C0] tcp_conn_request+0x33d7/0x4d10 [ 506.335639][ C0] tcp_v4_conn_request+0x19b/0x240 [ 506.340758][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 506.345788][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 506.351161][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 506.355753][ C0] tcp_v4_rcv+0x425c/0x5040 [ 506.360280][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 506.365737][ C0] ip_local_deliver+0x62a/0x7c0 [ 506.370589][ C0] ip_rcv+0x6cf/0x750 [ 506.374572][ C0] process_backlog+0xfb5/0x14e0 [ 506.379420][ C0] net_rx_action+0x746/0x1aa0 [ 506.384450][ C0] __do_softirq+0x311/0x83d [ 506.388967][ C0] [ 506.391288][ C0] Uninit was stored to memory at: [ 506.396333][ C0] kmsan_internal_chain_origin+0xad/0x130 [ 506.402072][ C0] __msan_chain_origin+0x50/0x90 [ 506.407014][ C0] tcp_conn_request+0x1781/0x4d10 [ 506.412041][ C0] tcp_v4_conn_request+0x19b/0x240 [ 506.417157][ C0] tcp_v6_conn_request+0xb5/0x2d0 [ 506.422376][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 506.427752][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 506.432343][ C0] tcp_v4_rcv+0x425c/0x5040 [ 506.436851][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 506.442326][ C0] ip_local_deliver+0x62a/0x7c0 [ 506.447180][ C0] ip_rcv+0x6cf/0x750 [ 506.451160][ C0] process_backlog+0xfb5/0x14e0 [ 506.456013][ C0] net_rx_action+0x746/0x1aa0 [ 506.460689][ C0] __do_softirq+0x311/0x83d [ 506.465180][ C0] [ 506.467934][ C0] Uninit was created at: [ 506.472182][ C0] kmsan_save_stack_with_flags+0x3c/0x90 [ 506.477813][ C0] kmsan_alloc_page+0xb9/0x180 [ 506.482579][ C0] __alloc_pages_nodemask+0x56a2/0x5dc0 [ 506.488386][ C0] alloc_pages_current+0x672/0x990 [ 506.493519][ C0] alloc_slab_page+0x122/0x1300 [ 506.498755][ C0] new_slab+0x2bc/0x1130 [ 506.503021][ C0] ___slab_alloc+0x14a3/0x2040 [ 506.507788][ C0] kmem_cache_alloc+0xb23/0xd70 [ 506.512639][ C0] inet_reqsk_alloc+0xac/0x830 [ 506.517405][ C0] tcp_conn_request+0x753/0x4d10 [ 506.522358][ C0] tcp_v4_conn_request+0x19b/0x240 [ 506.527471][ C0] tcp_rcv_state_process+0x26b/0x71c0 [ 506.532845][ C0] tcp_v4_do_rcv+0xb0f/0xd70 [ 506.537440][ C0] tcp_v4_rcv+0x425c/0x5040 [ 506.541953][ C0] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 506.547413][ C0] ip_local_deliver+0x62a/0x7c0 [ 506.552273][ C0] ip_sublist_rcv+0x125d/0x1450 [ 506.557211][ C0] ip_list_rcv+0x904/0x970 [ 506.561632][ C0] __netif_receive_skb_list_core+0x1459/0x14d0 [ 506.567791][ C0] netif_receive_skb_list_internal+0xf66/0x1610 [ 506.574037][ C0] napi_complete_done+0x439/0xe10 [ 506.579071][ C0] virtqueue_napi_complete+0xb9/0x1f0 [ 506.585051][ C0] virtnet_poll+0x1468/0x19f0 [ 506.589902][ C0] net_rx_action+0x746/0x1aa0 [ 506.594580][ C0] __do_softirq+0x311/0x83d 14:23:34 executing program 2: 14:23:34 executing program 1: [ 506.902163][T13667] net_ratelimit: 1408 callbacks suppressed [ 506.902188][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.918853][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.927626][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.939260][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.948266][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.957499][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.974427][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.986159][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.994883][ C0] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 507.009862][T13667] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:35 executing program 1: 14:23:35 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast1}, {0x0, @random="0000000200"}, 0xa, {0x2, 0x4e22, @loopback}, 'veth0_to_hsr\x00'}) 14:23:35 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) r1 = socket$inet(0x2, 0x803, 0x1) getsockopt(r1, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:35 executing program 2: 14:23:35 executing program 5: 14:23:35 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) getsockopt(0xffffffffffffffff, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:36 executing program 5: 14:23:36 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) getsockopt(0xffffffffffffffff, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:36 executing program 1: 14:23:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:36 executing program 2: 14:23:36 executing program 2: 14:23:36 executing program 5: 14:23:36 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)={0x0}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000001c0)={r0}, 0x10) getsockopt(0xffffffffffffffff, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:36 executing program 1: 14:23:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:36 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:36 executing program 2: 14:23:36 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x5, &(0x7f0000000180)) r0 = socket$inet(0x2, 0x803, 0x1) getsockopt(r0, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:37 executing program 5: 14:23:37 executing program 1: 14:23:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:37 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x0, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:37 executing program 2: 14:23:37 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x803, 0x1) getsockopt(r0, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:37 executing program 5: 14:23:37 executing program 1: 14:23:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:38 executing program 2: 14:23:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:38 executing program 3: r0 = socket$inet(0x2, 0x803, 0x1) getsockopt(r0, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:38 executing program 5: 14:23:38 executing program 1: 14:23:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:38 executing program 2: 14:23:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:38 executing program 5: 14:23:38 executing program 3: r0 = socket$inet(0x2, 0x0, 0x1) getsockopt(r0, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:38 executing program 1: 14:23:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:39 executing program 2: 14:23:39 executing program 5: 14:23:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x0, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:39 executing program 1: 14:23:39 executing program 2: 14:23:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:39 executing program 3: r0 = socket$inet(0x2, 0x0, 0x1) getsockopt(r0, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:39 executing program 5: [ 511.911906][ C1] net_ratelimit: 2025 callbacks suppressed [ 511.911930][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 511.940042][ T1435] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 511.949314][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 511.962815][ T1435] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:39 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:39 executing program 1: [ 512.032549][ T1435] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 512.052269][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 512.154051][ T1067] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 512.163150][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 512.193127][ T1067] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:40 executing program 5: 14:23:40 executing program 0: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:40 executing program 2: [ 512.202171][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:40 executing program 3: r0 = socket$inet(0x2, 0x0, 0x1) getsockopt(r0, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:40 executing program 5: 14:23:40 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:40 executing program 1: 14:23:40 executing program 2: 14:23:40 executing program 0: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:40 executing program 5: 14:23:41 executing program 2: 14:23:41 executing program 1: 14:23:41 executing program 3: r0 = socket$inet(0x2, 0x803, 0x0) getsockopt(r0, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:41 executing program 0: socket(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:41 executing program 2: 14:23:41 executing program 5: 14:23:41 executing program 1: 14:23:41 executing program 3: r0 = socket$inet(0x2, 0x803, 0x0) getsockopt(r0, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, 0x0, 0x0) 14:23:41 executing program 2: 14:23:42 executing program 5: 14:23:42 executing program 1: 14:23:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, 0x0, 0x0) 14:23:42 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:42 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xffffff0b) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000000000000000000010000000001000"}) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'batadv0\x00'}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x0, 0xf, 0x0, 0x0, {0xf, 0x0, 0xf000}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}]}, 0x1c}}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, 0x0, 0x1b) 14:23:42 executing program 3: r0 = socket$inet(0x2, 0x803, 0x0) getsockopt(r0, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x43) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$hwrng(0xffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4c8]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000100)=0x1, 0x4) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0x8001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) setresgid(0x0, 0xee01, 0x0) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000001000300", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\b', @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="5a83979bfab9d476c3655424735b7f25db7ab482b2c5dd94f0e34c978f2a614476bc6a8654ce1c656ea38132bafcbdc9b962fb80db6fab9fc4fe2aca889bcfcf9b96923fd36f97487159da0a3b502fe14bfa7f0a46796e19637c224fe3486dd308edf75e0c13a6aea7146253ea494e0e6fea296f31635d3f7056bfd462e6c8c009d4f86b1f443af67e3ecd9f02739f402bcd2ae3e67ff9706f9d3a8148915dabe852666b914dd769d4f50c52461f1d96c9208ff041a0d9e7b412238e4f72e7b2cf9ee433cd56b3030f6a4ef23f61827f25b6d2"], 0x94, 0x0) 14:23:42 executing program 1: 14:23:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, 0x0, 0x0) 14:23:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:43 executing program 2: 14:23:43 executing program 5: 14:23:43 executing program 1: 14:23:43 executing program 3: socket$inet(0x2, 0x803, 0x1) getsockopt(0xffffffffffffffff, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 14:23:43 executing program 2: syz_emit_ethernet(0xa2, &(0x7f0000000180)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x6c, 0x88, 0x0, @remote, @mcast2, {[@routing={0x0, 0x0, 0x0, 0x0, 0x1000000}], {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "3ec130b1f47dc5b2f6d82c8e50e07e97ecf4e12c5e9d45cddab1b5c852a7ce75", "912d1b03957a8b49faf027da86dc9bb5", {"765394b12a9fb4029b671e618b5aa45b", "0604dfc07b940525e4a606a103cfaff5"}}}}}}}}, 0x0) 14:23:43 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:43 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r0, 0x2008002) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff374d, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) 14:23:43 executing program 5: syz_emit_ethernet(0xa2, &(0x7f0000000180)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x6c, 0x88, 0x0, @remote, @mcast2, {[@routing], {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "3ec130b1f47dc5b2f6d82c8e50e07e97ecf4e12c5e9d45cddab1b5c852a7ce75", "912d1b03957a8b49faf027da86dc9bb5", {"765394b12a9fb4029b671e618b5aa45b", "0604dfc07b940525e4a606a103cfaff5"}}}}}}}}, 0x0) 14:23:44 executing program 3: socket$inet(0x2, 0x803, 0x1) getsockopt(0xffffffffffffffff, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 14:23:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499cde2bbaf4b06d3585a09a87507ebf4e43bc06"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) open(0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 14:23:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x803, 0x0) dup2(r3, r2) 14:23:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, 0x0, 0x0, 0x0, 0x0) 14:23:44 executing program 3: socket$inet(0x2, 0x803, 0x1) getsockopt(0xffffffffffffffff, 0xff, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 14:23:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) [ 516.925498][ T1435] net_ratelimit: 1663 callbacks suppressed [ 516.925524][ T1435] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 516.942151][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:44 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f00000001c0)={0x2, 0x4e23, @empty}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth0_macvtap\x00', 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) [ 517.033808][ T1435] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 517.042621][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) socket$inet_icmp(0x2, 0x2, 0x1) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d413f00efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000200)=@v3={0x3000000, [{0x1}, {0x1ff}]}, 0x18, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vhost_msg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000300)) sync() socket$unix(0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 517.108563][ T1435] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 517.117761][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 517.126775][ T1435] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 517.216730][ T1435] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 517.232220][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 517.273340][ T1435] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 14:23:45 executing program 3: r0 = socket$inet(0x2, 0x803, 0x1) getsockopt(r0, 0x0, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000000)='./bus\x00', 0x16b342, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r5, r4, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 518.162737][ T32] audit: type=1804 audit(1595427825.990:311): pid=16157 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir222582951/syzkaller.6EqvBy/322/bus" dev="sda1" ino=16343 res=1 [ 518.325446][ T32] audit: type=1804 audit(1595427826.070:312): pid=16157 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir222582951/syzkaller.6EqvBy/322/bus" dev="sda1" ino=16343 res=1 14:23:46 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @link_local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "5ee551", 0x0, 0x11, 0x0, @local, @private1, {[@routing={0x0, 0x0, 0x0, 0x0, 0x0, [@remote, @ipv4={[], [], @remote}, @private1, @ipv4]}, @dstopts={0x0, 0x0, [], [@hao={0xc9, 0x0, @mcast1}, @ra, @calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x0, "ee4378c97cdf466f356e6a3f7daacb615752c9fa946c87303ed465d0b70722d93490a57a1f17a861388ab8ab5fb38fe43d009ce39a9b0c3386370d6922405b088dcf606c5b01cc31f6d2372248529122fc0a12d374a51f568f615dc61a4cfde2020fd95d4d7279016a1dc6a7201b3a9b2055549d09f2f1ab7d3b04b38e1705869fd4b8cbac6d3e78be77a6533431a24c85fdbeec513d59bbd88c5e2713b9b6d518b81fe9a809d9a90f3f863d96627bc0a910cad8c8ece4559315929dddf143aae71eb0e02103aba74e96ddee66492845188b714a9ecc16"}, @calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @jumbo, @pad1, @enc_lim, @ra, @pad1]}, @srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, [@ipv4={[], [], @loopback}, @loopback, @rand_addr=' \x01\x00', @dev, @mcast1]}, @routing={0x0, 0x0, 0x0, 0x0, 0x0, [@loopback, @empty, @local, @private2, @remote]}, @dstopts={0x0, 0x0, [], [@ra, @jumbo, @enc_lim]}, @hopopts={0x0, 0x0, [], [@calipso={0x7, 0x0, {0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0]}}, @generic, @pad1, @hao={0xc9, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic={0x0, 0x0, "74791520c2a25bc625098528d31f1febdc127af0a3b5715960029a5dc9fcd4748df1d9f6830e1dac987ed28b6a7599a323bc14abb8e1637b85f2f24a65950cdcc29235803951db6b629c4fe8c427"}, @enc_lim]}], {0x0, 0x0, 0x0, 0x0, @opaque="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"}}}}}}, 0x0) 14:23:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 14:23:46 executing program 3: r0 = socket$inet(0x2, 0x803, 0x1) getsockopt(r0, 0x0, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:46 executing program 1: pipe(&(0x7f0000000180)) openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/bus/input/devices\x00', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) socket(0x100000000011, 0x2, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000540), 0x0, &(0x7f0000000200)={0x1ff}, &(0x7f0000000440)={0x0, r0+30000000}, 0x0) 14:23:46 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:46 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) socket$inet_icmp(0x2, 0x2, 0x1) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d413f00efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000200)=@v3={0x3000000, [{0x1}, {0x1ff}]}, 0x18, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$vhost_msg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000300)) sync() socket$unix(0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 14:23:47 executing program 3: r0 = socket$inet(0x2, 0x803, 0x1) getsockopt(r0, 0x0, 0x1, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) 14:23:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:47 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc3376003639405cb4aed12f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479aed75d492b415bcee00a06dc9d380dadaf81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d6f2c59957ab364884b3c5d05692e664ebf68e6faa53367f05f4ad6142134b62f11e931e7d62ead037cd2157df6b2bcb47fb53455560ccef00fca", 0x97}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 14:23:47 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r0, 0x2008002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000003c0)='security.ima\x00', &(0x7f00000004c0)=@v1={0x2, '-'}, 0x2, 0x0) 14:23:47 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/locks\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 14:23:47 executing program 3: r0 = socket$inet(0x2, 0x803, 0x1) getsockopt(r0, 0xff, 0x0, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) [ 519.887247][T16184] ptrace attach of "/root/syz-executor.1"[16183] was attempted by "/root/syz-executor.1"[16184] 14:23:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:47 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x40) process_vm_writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)=""/63, 0x3f}], 0x1, &(0x7f0000002740)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, 0x0) 14:23:47 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[], 0x14}}, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @generic={{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@lsrr={0x83, 0xb, 0x38, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev]}, @timestamp={0x10, 0x14, 0x0, 0x3, 0x0, [0x0, 0x0, 0x0, 0x0]}]}}}}}}, 0x0) [ 520.351968][T16198] ptrace attach of "/root/syz-executor.1"[16196] was attempted by "/root/syz-executor.1"[16198] 14:23:48 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000040)={0x5, 0x2, 0x1002, 0x7}, 0x40) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r4 = open(&(0x7f0000002940)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r6, 0x1000000000000003, 0x0) sendfile(r5, r5, 0x0, 0x0) 14:23:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:48 executing program 3: r0 = socket$inet(0x2, 0x803, 0x1) getsockopt(r0, 0xff, 0x0, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:48 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[], 0x14}}, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @generic={{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@lsrr={0x83, 0xb, 0x38, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev]}, @timestamp={0x10, 0x14, 0x0, 0x3, 0x0, [0x0, 0x0, 0x0, 0x0]}]}}}}}}, 0x0) 14:23:49 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r0, 0x2008002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000003c0)='security.ima\x00', &(0x7f00000004c0)=@v1={0x2, '-'}, 0x2, 0x0) 14:23:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:49 executing program 3: r0 = socket$inet(0x2, 0x803, 0x1) getsockopt(r0, 0xff, 0x0, &(0x7f0000001180)=""/166, &(0x7f0000000040)=0x9) 14:23:49 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r0, 0x2008002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f00000003c0)='security.ima\x00', &(0x7f00000004c0)=@v1={0x2, '-'}, 0x2, 0x0) 14:23:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[], 0x14}}, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @generic={{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@lsrr={0x83, 0xb, 0x38, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev]}, @timestamp={0x10, 0x14, 0x0, 0x3, 0x0, [0x0, 0x0, 0x0, 0x0]}]}}}}}}, 0x0) 14:23:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:49 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:49 executing program 3: r0 = socket$inet(0x2, 0x803, 0x1) getsockopt(r0, 0xff, 0x1, 0x0, &(0x7f0000000040)) [ 521.933719][ T475] net_ratelimit: 1804 callbacks suppressed [ 521.933743][ T475] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 521.948956][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 521.958356][ T475] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 521.992777][ T475] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 522.002231][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 522.016625][ T475] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 522.025443][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 522.039610][ T475] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 522.048675][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 522.057658][ T475] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 14:23:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x1500}) 14:23:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 14:23:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[], 0x14}}, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @generic={{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@lsrr={0x83, 0xb, 0x38, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev]}, @timestamp={0x10, 0x14, 0x0, 0x3, 0x0, [0x0, 0x0, 0x0, 0x0]}]}}}}}}, 0x0) 14:23:50 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xf, 0xffff}}}, 0x24}}, 0x0) 14:23:50 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c27bc3376003639405cb4aed1736b533f9e1623a7cf73af21532ad62f0000001500ae47a825d86800278dcff47d010000805acf4f8f36460000000079aed75d492b415bcee00a06dc9d8e99ad2f81dcfc6afd983f79e65199615607676f8f9fc0ebf8b0b16d86a6a402ce783aa5bfb89e6f2c64884b3c5d052563def19f8b1200eaf284124422d8a4d302e96ea0cdfe02eaf9b66be609c68408e2b060e57495c8613f2351a27be673948c4b8c75a568955bf9da055a6cd0bf8e3b1bf111ed414f039ca4a74e7875034cc371152fa82459bc507495c9a659", 0xde}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 522.827284][ C1] ===================================================== [ 522.835364][ C1] BUG: KMSAN: uninit-value in update_stack_state+0x1ee/0xb40 [ 522.843365][ C1] CPU: 1 PID: 475 Comm: kworker/u4:8 Not tainted 5.8.0-rc5-syzkaller #0 [ 522.851872][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.861957][ C1] Workqueue: krdsd rds_connect_worker [ 522.867600][ C1] Call Trace: [ 522.873160][ C1] [ 522.876033][ C1] dump_stack+0x1df/0x240 [ 522.880480][ C1] kmsan_report+0xf7/0x1e0 [ 522.884924][ C1] __msan_warning+0x58/0xa0 [ 522.889441][ C1] update_stack_state+0x1ee/0xb40 [ 522.894502][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 522.899658][ C1] unwind_next_frame+0x8c6/0xed0 [ 522.904613][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 522.910448][ C1] ? __msan_poison_alloca+0xe3/0x120 [ 522.915757][ C1] arch_stack_walk+0x33e/0x3e0 [ 522.920545][ C1] ? stack_trace_save+0x1a0/0x1a0 [ 522.925610][ C1] ? __msan_poison_alloca+0xe3/0x120 [ 522.930935][ C1] stack_trace_save+0x117/0x1a0 [ 522.935827][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 522.941569][ C1] ? __do_softirq+0x311/0x83d [ 522.946277][ C1] ? asm_call_on_stack+0x12/0x20 [ 522.951751][ C1] ? do_softirq_own_stack+0x7c/0xa0 [ 522.956960][ C1] ? kmsan_internal_chain_origin+0xad/0x130 [ 522.962893][ C1] ? kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 522.969082][ C1] ? kmsan_memcpy_metadata+0xb/0x10 [ 522.974472][ C1] ? __msan_memcpy+0x43/0x50 [ 522.979065][ C1] ? kstrdup+0x140/0x1a0 [ 522.983315][ C1] ? security_netlbl_sid_to_secattr+0x2f3/0x5d0 [ 522.989564][ C1] ? selinux_netlbl_inet_conn_request+0x126/0x520 [ 522.995984][ C1] ? selinux_inet_conn_request+0x580/0x620 [ 523.001800][ C1] ? security_inet_conn_request+0x111/0x200 [ 523.007722][ C1] ? tcp_conn_request+0x1b23/0x4d10 [ 523.012942][ C1] ? tcp_v4_conn_request+0x19b/0x240 [ 523.018240][ C1] ? tcp_v6_conn_request+0xb5/0x2d0 [ 523.023447][ C1] ? tcp_rcv_state_process+0x26b/0x71c0 [ 523.029098][ C1] ? tcp_v4_do_rcv+0xb0f/0xd70 [ 523.033887][ C1] ? tcp_v4_rcv+0x425c/0x5040 [ 523.038575][ C1] ? ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 523.047400][ C1] ? ip_local_deliver+0x62a/0x7c0 [ 523.052434][ C1] ? ip_rcv+0x6cf/0x750 [ 523.056609][ C1] ? process_backlog+0xfb5/0x14e0 [ 523.061639][ C1] ? net_rx_action+0x746/0x1aa0 [ 523.066504][ C1] ? __do_softirq+0x311/0x83d [ 523.071191][ C1] ? asm_call_on_stack+0x12/0x20 [ 523.076136][ C1] ? do_softirq_own_stack+0x7c/0xa0 [ 523.081353][ C1] ? __irq_exit_rcu+0x226/0x270 [ 523.086213][ C1] ? irq_exit_rcu+0xe/0x10 [ 523.090640][ C1] ? sysvec_call_function_single+0x107/0x130 [ 523.096637][ C1] ? asm_sysvec_call_function_single+0x12/0x20 [ 523.102809][ C1] ? __msan_poison_alloca+0xe3/0x120 [ 523.108125][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.113344][ C1] ? __should_failslab+0x1f6/0x290 [ 523.118467][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.123677][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 523.129500][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 523.135584][ C1] ? __kmalloc_track_caller+0x221/0xef0 [ 523.141145][ C1] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 523.147150][ C1] kmsan_memcpy_metadata+0xb/0x10 [ 523.152184][ C1] __msan_memcpy+0x43/0x50 [ 523.156612][ C1] kstrdup+0x140/0x1a0 [ 523.160718][ C1] security_netlbl_sid_to_secattr+0x2f3/0x5d0 [ 523.166823][ C1] selinux_netlbl_inet_conn_request+0x126/0x520 [ 523.173102][ C1] selinux_inet_conn_request+0x580/0x620 [ 523.178794][ C1] ? selinux_sctp_bind_connect+0x4c0/0x4c0 [ 523.184630][ C1] security_inet_conn_request+0x111/0x200 [ 523.190380][ C1] tcp_conn_request+0x1b23/0x4d10 [ 523.195458][ C1] ? tcp_v4_reqsk_destructor+0x70/0x70 [ 523.200950][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.206165][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.211375][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 523.217230][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.223145][ C1] tcp_v4_conn_request+0x19b/0x240 [ 523.228278][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 523.233318][ C1] ? inet6_sk_rx_dst_set+0x400/0x400 [ 523.238626][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 523.244036][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.249253][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 523.255082][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 523.261181][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.266403][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 523.271022][ C1] tcp_v4_rcv+0x425c/0x5040 [ 523.275545][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 523.281693][ C1] ? tcp_filter+0xf0/0xf0 [ 523.286037][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 523.291531][ C1] ip_local_deliver+0x62a/0x7c0 [ 523.296412][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 523.301445][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 523.307088][ C1] ip_rcv+0x6cf/0x750 [ 523.311093][ C1] ? ip_rcv_core+0x12c0/0x12c0 [ 523.315873][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 523.321531][ C1] process_backlog+0xfb5/0x14e0 [ 523.326402][ C1] ? lapic_next_event+0x6e/0xa0 [ 523.331295][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 523.336595][ C1] net_rx_action+0x746/0x1aa0 [ 523.341314][ C1] ? net_tx_action+0xc40/0xc40 [ 523.346097][ C1] __do_softirq+0x311/0x83d [ 523.350638][ C1] asm_call_on_stack+0x12/0x20 [ 523.355419][ C1] [ 523.358369][ C1] do_softirq_own_stack+0x7c/0xa0 [ 523.363407][ C1] __irq_exit_rcu+0x226/0x270 [ 523.368104][ C1] irq_exit_rcu+0xe/0x10 [ 523.372360][ C1] sysvec_call_function_single+0x107/0x130 [ 523.378192][ C1] asm_sysvec_call_function_single+0x12/0x20 [ 523.384186][ C1] RIP: 0010:__msan_poison_alloca+0xe3/0x120 [ 523.391046][ C1] Code: 00 e8 11 c8 d0 02 65 44 0f c1 3d 48 e2 f1 6d 41 ff cf 75 34 89 c3 e8 bc 6d 2e ff 48 8b 44 24 08 48 89 44 24 10 ff 74 24 10 9d <4c> 89 e7 44 89 f6 89 da e8 10 f5 ff ff 48 8d 65 d8 5b 41 5c 41 5d [ 523.411362][ C1] RSP: 0018:ffffafb24178aef0 EFLAGS: 00000246 [ 523.417448][ C1] RAX: 0000000000000246 RBX: 0000000007880008 RCX: ffffffff915863fa [ 523.425436][ C1] RDX: 0000000000000a20 RSI: 000000000006885d RDI: 000000009e826c1e [ 523.433425][ C1] RBP: ffffafb24178af70 R08: 0000000000000002 R09: ffffafb24178af28 [ 523.441419][ C1] R10: 0000000000000004 R11: ffffffff9c28d4c0 R12: ffffafb24178af90 [ 523.449411][ C1] R13: 0000000000000001 R14: 0000000000000008 R15: 0000000000000000 [ 523.457435][ C1] ? gred_enqueue+0x26a0/0x26a0 [ 523.462309][ C1] ? __local_bh_enable_ip+0xea/0x1d0 [ 523.467629][ C1] ? __local_bh_enable_ip+0xea/0x1d0 [ 523.472935][ C1] ? __local_bh_enable_ip+0xea/0x1d0 [ 523.478853][ C1] __local_bh_enable_ip+0xea/0x1d0 [ 523.483991][ C1] local_bh_enable+0x36/0x40 [ 523.488595][ C1] ip_finish_output2+0x1fee/0x24a0 [ 523.493732][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 523.499755][ C1] __ip_finish_output+0xaa7/0xd80 [ 523.504812][ C1] ip_finish_output+0x166/0x410 [ 523.509704][ C1] ip_output+0x593/0x680 [ 523.513975][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 523.519276][ C1] ? ip_finish_output+0x410/0x410 [ 523.524421][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 523.529377][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 523.534938][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.540604][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.545827][ C1] ip_queue_xmit+0xcc/0xf0 [ 523.550262][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 523.555120][ C1] __tcp_transmit_skb+0x440e/0x6090 [ 523.560372][ C1] tcp_connect+0x4208/0x6830 [ 523.565499][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 523.570854][ C1] tcp_v4_connect+0x21fd/0x2370 [ 523.575753][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 523.580703][ C1] __inet_stream_connect+0x2fb/0x1340 [ 523.586101][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 523.591411][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.596631][ C1] inet_stream_connect+0x101/0x180 [ 523.601766][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 523.607427][ C1] rds_tcp_conn_path_connect+0x8a7/0xb70 [ 523.613082][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.618556][ C1] ? rds_tcp_state_change+0x390/0x390 [ 523.623940][ C1] rds_connect_worker+0x2a6/0x470 [ 523.628996][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 523.635081][ C1] ? rds_addr_cmp+0x200/0x200 [ 523.639767][ C1] process_one_work+0x1540/0x1f30 [ 523.644833][ C1] worker_thread+0xed2/0x23f0 [ 523.649564][ C1] kthread+0x515/0x550 [ 523.653643][ C1] ? process_one_work+0x1f30/0x1f30 [ 523.660159][ C1] ? kthread_blkcg+0xf0/0xf0 [ 523.664756][ C1] ret_from_fork+0x22/0x30 [ 523.669190][ C1] [ 523.671518][ C1] Local variable ----_tcph@nf_conntrack_tcp_packet created at: [ 523.679076][ C1] nf_conntrack_tcp_packet+0x10d/0x74b0 [ 523.684629][ C1] nf_conntrack_tcp_packet+0x10d/0x74b0 [ 523.690160][ C1] ===================================================== [ 523.697109][ C1] Disabling lock debugging due to kernel taint [ 523.703264][ C1] Kernel panic - not syncing: panic_on_warn set ... [ 523.709862][ C1] CPU: 1 PID: 475 Comm: kworker/u4:8 Tainted: G B 5.8.0-rc5-syzkaller #0 [ 523.719577][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.729661][ C1] Workqueue: krdsd rds_connect_worker [ 523.735058][ C1] Call Trace: [ 523.738365][ C1] [ 523.741226][ C1] dump_stack+0x1df/0x240 [ 523.750383][ C1] panic+0x3d5/0xc3e [ 523.754332][ C1] kmsan_report+0x1df/0x1e0 [ 523.758853][ C1] __msan_warning+0x58/0xa0 [ 523.763372][ C1] update_stack_state+0x1ee/0xb40 [ 523.768433][ C1] ? kmsan_get_metadata+0x4f/0x180 [ 523.773570][ C1] unwind_next_frame+0x8c6/0xed0 [ 523.778523][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 523.784360][ C1] ? __msan_poison_alloca+0xe3/0x120 [ 523.789654][ C1] arch_stack_walk+0x33e/0x3e0 [ 523.794467][ C1] ? stack_trace_save+0x1a0/0x1a0 [ 523.801968][ C1] ? __msan_poison_alloca+0xe3/0x120 [ 523.807276][ C1] stack_trace_save+0x117/0x1a0 [ 523.812156][ C1] kmsan_internal_chain_origin+0xad/0x130 [ 523.817886][ C1] ? __do_softirq+0x311/0x83d [ 523.822568][ C1] ? asm_call_on_stack+0x12/0x20 [ 523.827511][ C1] ? do_softirq_own_stack+0x7c/0xa0 [ 523.832715][ C1] ? kmsan_internal_chain_origin+0xad/0x130 [ 523.838619][ C1] ? kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 523.844779][ C1] ? kmsan_memcpy_metadata+0xb/0x10 [ 523.849994][ C1] ? __msan_memcpy+0x43/0x50 [ 523.854601][ C1] ? kstrdup+0x140/0x1a0 [ 523.858856][ C1] ? security_netlbl_sid_to_secattr+0x2f3/0x5d0 [ 523.867804][ C1] ? selinux_netlbl_inet_conn_request+0x126/0x520 [ 523.874229][ C1] ? selinux_inet_conn_request+0x580/0x620 [ 523.880044][ C1] ? security_inet_conn_request+0x111/0x200 [ 523.885975][ C1] ? tcp_conn_request+0x1b23/0x4d10 [ 523.891187][ C1] ? tcp_v4_conn_request+0x19b/0x240 [ 523.896482][ C1] ? tcp_v6_conn_request+0xb5/0x2d0 [ 523.901687][ C1] ? tcp_rcv_state_process+0x26b/0x71c0 [ 523.907241][ C1] ? tcp_v4_do_rcv+0xb0f/0xd70 [ 523.912011][ C1] ? tcp_v4_rcv+0x425c/0x5040 [ 523.916699][ C1] ? ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 523.922351][ C1] ? ip_local_deliver+0x62a/0x7c0 [ 523.927399][ C1] ? ip_rcv+0x6cf/0x750 [ 523.931556][ C1] ? process_backlog+0xfb5/0x14e0 [ 523.936586][ C1] ? net_rx_action+0x746/0x1aa0 [ 523.941445][ C1] ? __do_softirq+0x311/0x83d [ 523.946144][ C1] ? asm_call_on_stack+0x12/0x20 [ 523.951090][ C1] ? do_softirq_own_stack+0x7c/0xa0 [ 523.956302][ C1] ? __irq_exit_rcu+0x226/0x270 [ 523.961185][ C1] ? irq_exit_rcu+0xe/0x10 [ 523.965614][ C1] ? sysvec_call_function_single+0x107/0x130 [ 523.971609][ C1] ? asm_sysvec_call_function_single+0x12/0x20 [ 523.977771][ C1] ? __msan_poison_alloca+0xe3/0x120 [ 523.983073][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.988291][ C1] ? __should_failslab+0x1f6/0x290 [ 523.994371][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 523.999586][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 524.005412][ C1] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 524.011491][ C1] ? __kmalloc_track_caller+0x221/0xef0 [ 524.017054][ C1] kmsan_memcpy_memmove_metadata+0x272/0x2e0 [ 524.023061][ C1] kmsan_memcpy_metadata+0xb/0x10 [ 524.028128][ C1] __msan_memcpy+0x43/0x50 [ 524.032558][ C1] kstrdup+0x140/0x1a0 [ 524.036650][ C1] security_netlbl_sid_to_secattr+0x2f3/0x5d0 [ 524.042839][ C1] selinux_netlbl_inet_conn_request+0x126/0x520 [ 524.049111][ C1] selinux_inet_conn_request+0x580/0x620 [ 524.054780][ C1] ? selinux_sctp_bind_connect+0x4c0/0x4c0 [ 524.060605][ C1] security_inet_conn_request+0x111/0x200 [ 524.066358][ C1] tcp_conn_request+0x1b23/0x4d10 [ 524.071430][ C1] ? tcp_v4_reqsk_destructor+0x70/0x70 [ 524.076927][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 524.083025][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 524.088247][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 524.094078][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 524.099323][ C1] tcp_v4_conn_request+0x19b/0x240 [ 524.104464][ C1] tcp_v6_conn_request+0xb5/0x2d0 [ 524.109507][ C1] ? inet6_sk_rx_dst_set+0x400/0x400 [ 524.114807][ C1] tcp_rcv_state_process+0x26b/0x71c0 [ 524.120313][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 524.125553][ C1] ? kmsan_get_shadow_origin_ptr+0x81/0xb0 [ 524.136086][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 524.142195][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 524.147419][ C1] tcp_v4_do_rcv+0xb0f/0xd70 [ 524.152045][ C1] tcp_v4_rcv+0x425c/0x5040 [ 524.156735][ C1] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 524.162870][ C1] ? tcp_filter+0xf0/0xf0 [ 524.167232][ C1] ip_protocol_deliver_rcu+0x4b7/0xbc0 [ 524.172719][ C1] ip_local_deliver+0x62a/0x7c0 [ 524.177602][ C1] ? ip_local_deliver+0x7c0/0x7c0 [ 524.182639][ C1] ? ip_protocol_deliver_rcu+0xbc0/0xbc0 [ 524.188630][ C1] ip_rcv+0x6cf/0x750 [ 524.192646][ C1] ? ip_rcv_core+0x12c0/0x12c0 [ 524.197415][ C1] ? ip_local_deliver_finish+0x350/0x350 [ 524.203065][ C1] process_backlog+0xfb5/0x14e0 [ 524.207938][ C1] ? lapic_next_event+0x6e/0xa0 [ 524.212837][ C1] ? rps_trigger_softirq+0x2e0/0x2e0 [ 524.218137][ C1] net_rx_action+0x746/0x1aa0 [ 524.223288][ C1] ? net_tx_action+0xc40/0xc40 [ 524.228065][ C1] __do_softirq+0x311/0x83d [ 524.232599][ C1] asm_call_on_stack+0x12/0x20 [ 524.237363][ C1] [ 524.240317][ C1] do_softirq_own_stack+0x7c/0xa0 [ 524.245353][ C1] __irq_exit_rcu+0x226/0x270 [ 524.250047][ C1] irq_exit_rcu+0xe/0x10 [ 524.254303][ C1] sysvec_call_function_single+0x107/0x130 [ 524.260151][ C1] asm_sysvec_call_function_single+0x12/0x20 [ 524.266150][ C1] RIP: 0010:__msan_poison_alloca+0xe3/0x120 [ 524.272056][ C1] Code: 00 e8 11 c8 d0 02 65 44 0f c1 3d 48 e2 f1 6d 41 ff cf 75 34 89 c3 e8 bc 6d 2e ff 48 8b 44 24 08 48 89 44 24 10 ff 74 24 10 9d <4c> 89 e7 44 89 f6 89 da e8 10 f5 ff ff 48 8d 65 d8 5b 41 5c 41 5d [ 524.292970][ C1] RSP: 0018:ffffafb24178aef0 EFLAGS: 00000246 [ 524.299062][ C1] RAX: 0000000000000246 RBX: 0000000007880008 RCX: ffffffff915863fa [ 524.307046][ C1] RDX: 0000000000000a20 RSI: 000000000006885d RDI: 000000009e826c1e [ 524.315030][ C1] RBP: ffffafb24178af70 R08: 0000000000000002 R09: ffffafb24178af28 [ 524.323033][ C1] R10: 0000000000000004 R11: ffffffff9c28d4c0 R12: ffffafb24178af90 [ 524.331104][ C1] R13: 0000000000000001 R14: 0000000000000008 R15: 0000000000000000 [ 524.339734][ C1] ? gred_enqueue+0x26a0/0x26a0 [ 524.344607][ C1] ? __local_bh_enable_ip+0xea/0x1d0 [ 524.350008][ C1] ? __local_bh_enable_ip+0xea/0x1d0 [ 524.355305][ C1] ? __local_bh_enable_ip+0xea/0x1d0 [ 524.360694][ C1] __local_bh_enable_ip+0xea/0x1d0 [ 524.365837][ C1] local_bh_enable+0x36/0x40 [ 524.372184][ C1] ip_finish_output2+0x1fee/0x24a0 [ 524.377315][ C1] ? nf_ct_deliver_cached_events+0x403/0x6c0 [ 524.383344][ C1] __ip_finish_output+0xaa7/0xd80 [ 524.388406][ C1] ip_finish_output+0x166/0x410 [ 524.393314][ C1] ip_output+0x593/0x680 [ 524.397588][ C1] ? ip_mc_finish_output+0x6c0/0x6c0 [ 524.402910][ C1] ? ip_finish_output+0x410/0x410 [ 524.407946][ C1] __ip_queue_xmit+0x1b5c/0x21a0 [ 524.413677][ C1] ? kmsan_set_origin_checked+0x95/0xf0 [ 524.419326][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 524.424553][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 524.429779][ C1] ip_queue_xmit+0xcc/0xf0 [ 524.434655][ C1] ? tcp_v4_fill_cb+0x580/0x580 [ 524.439518][ C1] __tcp_transmit_skb+0x440e/0x6090 [ 524.444806][ C1] tcp_connect+0x4208/0x6830 [ 524.449414][ C1] ? __msan_poison_alloca+0xf0/0x120 [ 524.454752][ C1] tcp_v4_connect+0x21fd/0x2370 [ 524.459741][ C1] ? tcp_twsk_unique+0xba0/0xba0 [ 524.464697][ C1] __inet_stream_connect+0x2fb/0x1340 [ 524.470094][ C1] ? __local_bh_enable_ip+0x97/0x1d0 [ 524.475406][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 524.480629][ C1] inet_stream_connect+0x101/0x180 [ 524.485778][ C1] ? __inet_stream_connect+0x1340/0x1340 [ 524.491429][ C1] rds_tcp_conn_path_connect+0x8a7/0xb70 [ 524.497091][ C1] ? kmsan_get_metadata+0x11d/0x180 [ 524.502307][ C1] ? rds_tcp_state_change+0x390/0x390 [ 524.507703][ C1] rds_connect_worker+0x2a6/0x470 [ 524.512757][ C1] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 524.518842][ C1] ? rds_addr_cmp+0x200/0x200 [ 524.523535][ C1] process_one_work+0x1540/0x1f30 [ 524.528609][ C1] worker_thread+0xed2/0x23f0 [ 524.533339][ C1] kthread+0x515/0x550 [ 524.537426][ C1] ? process_one_work+0x1f30/0x1f30 [ 524.542646][ C1] ? kthread_blkcg+0xf0/0xf0 [ 524.547249][ C1] ret_from_fork+0x22/0x30 [ 524.552852][ C1] Kernel Offset: 0x10000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 524.564486][ C1] Rebooting in 86400 seconds..